Science.gov

Sample records for air piracy threats

  1. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  2. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  3. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  4. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  5. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  6. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546.301 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Threat...

  7. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1546.301 Section 1546.301 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Threat...

  8. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1546.301 Section 1546.301 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Threat...

  9. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1546.301 Section 1546.301 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Threat...

  10. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1546.301 Section 1546.301 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Threat...

  11. Non-Traditional Security Threats in the Border Areas: Terrorism, Piracy, Environmental Degradation in Southeast Asian Maritime Domain

    NASA Astrophysics Data System (ADS)

    Dabova, E. L.

    2013-11-01

    with other subsystems like South East Asia may have different approaches to global governance, international constitutional order, or particular cases such as the measure of infringement of human rights when targeting individuals suspected of terrorist links. Yet international law remains the key part of the Asian and global security regime. The hypothesis of this study is that the "void of governance" regime in territorial and international waters provides lucrative environment for developing terrorism, piracy, environmental degradation, and other criminal activities that pose untraditional threats to the regional security. This "void of governance" regime can be caused by either, or both, de jure or de facto insufficient control over particular marine territories.

  12. 49 CFR 1540.117 - Threat assessments regarding aliens holding or applying for FAA certificates, ratings, or...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the Assistant Administrator for Intelligence for TSA. Date of service means— (1) The date of personal...— (1) A threat to transportation or national security; (2) A threat of air piracy or terrorism; (3)...

  13. 49 CFR 1540.117 - Threat assessments regarding aliens holding or applying for FAA certificates, ratings, or...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the Assistant Administrator for Intelligence for TSA. Date of service means— (1) The date of personal...— (1) A threat to transportation or national security; (2) A threat of air piracy or terrorism; (3)...

  14. Piracy in Southeast Asia: A Growing Threat to the United States’ Vital Strategic and Commercial Interests

    DTIC Science & Technology

    2002-01-01

    BIN LADIN’S AL-QA-IDA TERRORIST ORGANIZATION AND THE ISLAMIC FUNDAMENTALISTS IN THE SOUTHERN PHILIPPINES AND INDONESIA . DISCUSSION: SOUTHEAST ASIA...CAMOUFLAGE, ABU SAYYAF, ISLAMIC FUNDAMENTALISM, SPRATLY ISLANDS, INDONESIA , PHILIPPINES, SINGAPORE STRAITS, NPA, MNLF, MILF, RAMZI AHMED YOUSEF...Islamic fundamentalists in the southern Philippines and Indonesia . Discussion: Southeast Asia has been a breeding ground and haven for maritime piracy

  15. Piracy and Its Impact on the Economy

    DTIC Science & Technology

    2010-12-01

    maximum 200 words) This thesis attempts to shed light on the growing threat maritime piracy has on the economy along with possible solutions...shed light on the growing threat maritime piracy has on the economy along with possible solutions (military and diplomatic operations) the world...would like to thank my wife, Kathleen, for her constant support and understanding with all the effort that was put into this thesis. I would also

  16. Controlling Software Piracy.

    ERIC Educational Resources Information Center

    King, Albert S.

    1992-01-01

    Explains what software manufacturers are doing to combat software piracy, recommends how managers should deal with this problem, and provides a role-playing exercise to help students understand the issues in software piracy. (SR)

  17. Law, Pirates, and Piracy

    ERIC Educational Resources Information Center

    Middleton, Tiffany Willey

    2010-01-01

    Maritime piracy has increasingly been in the news, and in the courtroom, in recent years. This article presents an interview with international legal and overseas piracy expert Douglas Guilfoyle. In this interview, Guilfoyle discusses why piracy is a growing problem and some of the challenges it creates for the international community. He also…

  18. Strategic Implications of Piracy in Benin’s Territorial Waters

    DTIC Science & Technology

    2013-03-01

    Because the seaport of Cotonou is the main source of revenue for the Government, piracy is a critical threat to the existence of the state. Consequently...governance. Because the seaport of Cotonou is the main source of revenue for the Government, piracy is a critical threat to the existence of the state...Benin’s government, the seaport of Cotonou constitutes a vital national interest. Cotonou is crucial to commercial ties with Europe, America and

  19. Piracy and Maritime Terrorism; A Seamless Transition

    DTIC Science & Technology

    2004-05-18

    26 March 2004]. Day, Phillip. “Security in a Straitjacket?---Why It’s So Hard to Make a Key Asian Waterway Safe From Terror.” Wall Street Journal ...afp_asiapacific/view/62963/1/.html> [23 April 2004]. “Piracy remains a threat in Melaka Straits.” Malaysian National News Agency. 28 July 2003. <http...Security in a Straitjacket?---Why It’s So Hard to Make a Key Asian Waterway Safe From Terror,” Wall Street Journal , 13 June 2003, sec. A, p.5; John Owen

  20. Analyzing Software Piracy in Education.

    ERIC Educational Resources Information Center

    Lesisko, Lee James

    This study analyzes the controversy of software piracy in education. It begins with a real world scenario that presents the setting and context of the problem. The legalities and background of software piracy are explained and true court cases are briefly examined. Discussion then focuses on explaining why individuals and organizations pirate…

  1. Piracy the Somali Way

    DTIC Science & Technology

    2009-04-01

    his History of the Peloponnesian War, that Minos, the King of Crete, “first possessed a navy for suppression of piracy.”3 In 75 B.C. Julius Caesar was...kidnapped for ransom by pirates operating on the Mediterranean. Legend has it that Caesar was insulted by the ransom of 20 talents and instructed...the pirates to raise their demand to 50. Caesar also promised the pirates when freed he would hunt them down. The ransom was paid and good to the

  2. Nowhere to Hide: The Growing Threat to Air Bases

    DTIC Science & Technology

    2013-06-01

    to hunt his flying birds in the air.”2 Douhet’s observation still rings true, as demonstrated by the aforemen- tioned attack on the Helmand air base...for military and intelligence organizations. Take the case of a protest group called SHARK (Showing Animals Respect and Kindness). This group planned...to use a Mikrokopter drone to vid- eotape a live pigeon shoot as a means of deterring and interfering with a legal hunting outing. On 21 February

  3. Design, Development, and Innovation of an Interactive Multimedia Training Simulator for Responding to Air Transportation Bomb Threats

    NASA Technical Reports Server (NTRS)

    Chung, Christopher A.; Marwaha, Shweta

    2005-01-01

    This paper describes an interactive multimedia simulator for air transportation bomb threat training. The objective of this project is to improve the air transportation sector s capability to respond to bomb threats received by commercial airports and aircraft. The simulator provides realistic training on receiving and responding to a variety of bomb threats that might not otherwise be possible due to time, cost, or operational constraints. Validation analysis indicates that the use of the simulator resulted in statistically significant increases in individual ability to respond to these types of bomb threats.

  4. Congress Seeks Tales of Piracy

    ERIC Educational Resources Information Center

    Read, Brock

    2007-01-01

    This month, leaders of two committees in the U.S. House of Representatives sent letters warning of an epidemic of online music and movie piracy to 19 colleges, singling out those schools that, in the eyes of entertainment-industry officials, have been unable to stop students from illegally downloading music and movies. Enclosed with each message…

  5. Understanding Modern Maritime Piracy: A Complex Adaptive System Approach

    DTIC Science & Technology

    2014-03-12

    8. 9 Jonathan Bellish, The Economic Cost of Somali Piracy 2012 (Denver, CO: Oceans Beyond Piracy, One Earth Future Foundation, 2013...Conor Seyle, The Human Cost of Maritime Piracy 2012 (Denver, CO: Oceans Beyond Piracy, One Earth Future Foundation, 2013), www.oceansbeyondpiracy.org...Economic Cost of Somali Piracy 2012. Denver, CO: Oceans Beyond Piracy, One Earth Future Foundation, 2013, www.oceansbeyondpiracy.org (accessed September

  6. Somalia Piracy: Challenges and Solutions

    DTIC Science & Technology

    2013-04-01

    vessels re-route to avoid the HOA, and increased delays in delivery of goods.31 Kenya’s major exported items, including tea, coffee , and other...agricultural goods are the most threatened. Agricultural goods like mangoes, avocadoes and canned beans are exported by sea. 9 The value of these...Unlawful Acts Against the Safety of Maritime Navigation (SUA); and 1851 (2008), which authorized the creation of the Contact Group on Piracy off the

  7. Deindividuation and Internet software piracy.

    PubMed

    Hinduja, Sameer

    2008-08-01

    Computer crime has increased exponentially in recent years as hardware, software, and network resources become more affordable and available to individuals from all walks of life. Software piracy is one prevalent type of cybercrime and has detrimentally affected the economic health of the software industry. Moreover, piracy arguably represents a rend in the moral fabric associated with the respect of intellectual property and reduces the financial incentive of product creation and innovation. Deindividuation theory, originating from the field of social psychology, argues that individuals are extricated from responsibility for their actions simply because they no longer have an acute awareness of the identity of self and of others. That is, external and internal constraints that would typically regulate questionable behavior are rendered less effective via certain anonymizing and disinhibiting conditions of the social and environmental context. This exploratory piece seeks to establish the role of deindividuation in liberating individuals to commit software piracy by testing the hypothesis that persons who prefer the anonymity and pseudonymity associated with interaction on the Internet are more likely to pirate software. Through this research, it is hoped that the empirical identification of such a social psychological determinant will help further illuminate the phenomenon.

  8. Piracy: The Best Business Model Available

    DTIC Science & Technology

    2013-11-01

    this can be an expensive, but legally safe, option.145 Another serious consideration is the consequences of use of force, espe - cially deadly force...19 5. Legal Aspects .................................................................... 25 6. Costs of Piracy...many of the thorny legal considerations that contex- tually color any efforts to address counter-piracy. SOF have certainly been utilized to

  9. Modern Piracy: The Impact on Maritime Security

    DTIC Science & Technology

    2008-01-01

    consequences. There are accounts of piracy incidents as far back as 2000 B.C. amongst the Phoenicians and Greeks.2 It is rumored, that in 75 B.C. Julius ... Caesar was captured by pirates, only to escape and then return to crucify his captors.3 Piracy has threatened maritime transportation since the

  10. A five states survivability model for missions with ground-to-air threats

    NASA Astrophysics Data System (ADS)

    Erlandsson, Tina; Niklasson, Lars

    2013-05-01

    Fighter pilots are exposed to the risk of getting hit by enemy fire when flying missions with ground-to-air threats. A tactical support system including a survivability model could aid the pilot to assess and handle this risk. The survivability model presented here is a Markov model with five states; Undetected, Detected, Tracked, Engaged and Hit. The output from the model is the probabilities that the aircraft is in these states during the mission. The enemy's threat systems are represented with sensor and weapon areas and the transitions between the states depend on whether or not the aircraft is within any of these areas. Contrary to previous work, the model can capture the behaviors that the enemy's sensor systems communicate and that the risk of getting hit depends on the enemy's knowledge regarding the aircraft's kinematics. The paper includes a discussion regarding the interpretation of the states and the factors that influence the transitions between the states. Further developments are also identified for using the model to aid fighter pilots and operators of unmanned aerial vehicles with planning and evaluating missions as well as analyzing the situation during flight.

  11. China’s Participation in Anti-Piracy Operations off the Horn of Africa: Drivers and Implications

    DTIC Science & Technology

    2009-07-01

    such as the mangrove swamps of the Niger Delta, may offer pirates safe havens in terms of geography, the HoA region offers them political...rises, the HOA is likely to remain a key transit route, making piracy in the region an ever- more-pressing threat. Fisheries : China’s fishing

  12. Multiple Threats to Child Health from Fossil Fuel Combustion: Impacts of Air Pollution and Climate Change

    PubMed Central

    Perera, Frederica P.

    2016-01-01

    Background: Approaches to estimating and addressing the risk to children from fossil fuel combustion have been fragmented, tending to focus either on the toxic air emissions or on climate change. Yet developing children, and especially poor children, now bear a disproportionate burden of disease from both environmental pollution and climate change due to fossil fuel combustion. Objective: This commentary summarizes the robust scientific evidence regarding the multiple current and projected health impacts of fossil fuel combustion on the young to make the case for a holistic, child-centered energy and climate policy that addresses the full array of physical and psychosocial stressors resulting from fossil fuel pollution. Discussion: The data summarized here show that by sharply reducing our dependence on fossil fuels we would achieve highly significant health and economic benefits for our children and their future. These benefits would occur immediately and also play out over the life course and potentially across generations. Conclusion: Going beyond the powerful scientific and economic arguments for urgent action to reduce the burning of fossil fuels is the strong moral imperative to protect our most vulnerable populations. Citation: Perera FP. 2017. Multiple threats to child health from fossil fuel combustion: impacts of air pollution and climate change. Environ Health Perspect 125:141–148; http://dx.doi.org/10.1289/EHP299 PMID:27323709

  13. A Process Model for Deployment Planning of Ground-based Air Defense System Against Asymmetric Homeland Threat

    DTIC Science & Technology

    2009-01-01

    A Process Model for Deployment Planning of Ground-based Air Defense System Against Asymmetric Homeland Threat Ronald L. Cypert Scientific...units, along with coordination at the state and federal agency level, a dynamic process modeling capability was chosen to chart the myriad...COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE A Process Model for Deployment Planning of Ground-based Air Defense System Against

  14. Countering Piracy off the Horn of Africa

    DTIC Science & Technology

    2011-01-26

    6 Source: Conciliation Resources.14 Piracy operations at the Horn of Africa are carried out using a method unique compared to piracy...option would continue to treat the system with the same medicine , but increase the dose. This may include strengthening the task forces to allow...visualization.googlemap&I temid=219 (accessed January 18, 2011). 14 Conciliation Resources Home Page, Map of Somalia, http://www.c-r.org/our- work

  15. Digital Piracy: An Assessment of Consumer Piracy Risk and Optimal Supply Chain Coordination Strategies

    ERIC Educational Resources Information Center

    Jeong, Bong-Keun

    2010-01-01

    Digital piracy and the emergence of new distribution channels have changed the dynamics of supply chain coordination and created many interesting problems. There has been increased attention to understanding the phenomenon of consumer piracy behavior and its impact on supply chain profitability. The purpose of this dissertation is to better…

  16. Analysis of the Strategy to Combat Maritime Piracy

    DTIC Science & Technology

    2009-12-11

    to reason that this factor always exist to some extent and that its influence is mostly affected by the other factors to ensure that the cost of...social and economic factor that contribute to piracy in the Horn of Africa are not adequately addressed. 15. SUBJECT TERMS Piracy, pirate...piracy is ineffective because the social and economic factor that contribute to piracy in the Horn of Africa are not adequately addressed. v TABLE OF

  17. Software Piracy in Research: A Moral Analysis.

    PubMed

    Santillanes, Gary; Felder, Ryan Marshall

    2015-08-01

    Researchers in virtually every discipline rely on sophisticated proprietary software for their work. However, some researchers are unable to afford the licenses and instead procure the software illegally. We discuss the prohibition of software piracy by intellectual property laws, and argue that the moral basis for the copyright law offers the possibility of cases where software piracy may be morally justified. The ethics codes that scientific institutions abide by are informed by a rule-consequentialist logic: by preserving personal rights to authored works, people able to do so will be incentivized to create. By showing that the law has this rule-consequentialist grounding, we suggest that scientists who blindly adopt their institutional ethics codes will commit themselves to accepting that software piracy could be morally justified, in some cases. We hope that this conclusion will spark debate over important tensions between ethics codes, copyright law, and the underlying moral basis for these regulations. We conclude by offering practical solutions (other than piracy) for researchers.

  18. Counter Piracy: A More Comprehensive Approach

    DTIC Science & Technology

    2012-04-25

    almost non-existent. The lack of governance allowed local and foreign fishing vessels to take advantage and overfish Somali waters. The local Any...piracy. 18 populace was powerless to stop them from overfishing those grounds that once provided subsistence.67 This situation enabled the

  19. Piracy off the Horn of Africa

    DTIC Science & Technology

    2011-04-27

    approach. 112 Secretary of State Hillary Clinton, Hearing on the Proposed FY2012 Budget Request for the...has noted a request from the TFG President for support to develop Somalia’s security forces and train its coast guards as part of international...Special Advisor has proposed , among other recommendations, the creation of three specialized piracy courts for Somalia to address current obstacles

  20. Piracy Off the Horn of Africa

    DTIC Science & Technology

    2009-09-28

    response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing...towards the Seychelles, and using more sophisticated weaponry.”1 Data attributed to the International Maritime Bureau (IMB) stated that, as of late...and extract fines. Today, the pirates are collectively referred to by Somalis as burcad badeed (sea bandits).18 Nevertheless, piracy appears to

  1. On the dynamics of stream piracy

    NASA Astrophysics Data System (ADS)

    Goren, L.; Willett, S. D.

    2012-04-01

    Drainage network reorganization by stream piracy is invoked repeatedly to explain the morphology of unique drainage patterns and as a possible mechanism inducing abrupt variations of sediment accumulation rates. However, direct evidence of stream piracy is usually rare, and is highly interpretation dependent. As a first step in assessing how probable capture events are and establishing the conditions that favor stream piracy versus the those that favor stable landscapes, we formulate analytically the physics of divide migration and capture events and study this formulation from a dynamical system point of view. The formulation is based on a one-dimensional topographic cross section between two channels that share a water divide. Two hillslope profiles diverge from the divide and drain into two fluvial bedrock tributaries, whose erosion rate is controlled by a stream power law. The rate of erosion at the bounding channels is thus a function of the upstream drainage area and local slope. A tectonically induced downward perturbation of the elevation of one of the bounding channels lowers the channel slope but at the same time increases the drainage area due to outward migration of the water divide. The changes in slope and area have opposing effect on the erosion rate at the bounding channels, so that the perturbation may either grow or be damped. We define the geomorphic and tectonic parameters that control the behavior of the system and find the regimes that lead to stable landscapes and to capture events.

  2. Curbing International Piracy of Intellectual Property. Policy Options for a Major Exporting Country.

    ERIC Educational Resources Information Center

    Hoffman, Gary M.; Marcou, George T.

    This report of the International Piracy Project addresses three major topics: (1) The Costs and Complications of Piracy; (2) Rights Enforcement Today; and (3) Policy Options for Curbing Piracy. The first section discusses piracy of copyrights, patents, and other intellectual property, including economic losses and damage to the finances and…

  3. Asset Allocation to Cover a Region of Piracy

    DTIC Science & Technology

    2011-09-01

    Technology Organisation DSTO-TN-1030 ABSTRACT Piracy in the Gulf of Aden and the waters around Somalia has increased in recent years, with...a uniform piracy risk and where some areas are more vulnerable than others. Simulated annealing was used to allocate the patrolling naval assets

  4. China’s Role in Counter-Piracy Operations

    DTIC Science & Technology

    2015-06-01

    in Piracy, Maritime Terrorism and Securing the Malacca Straits, ed. Graham Gerard Ong -Webb (Singapore: Institute of Southeast Asian Studies, 2006...Southeast Asia, 1511 to 1839: A Chinese Perspective.” In Piracy, Maritime Terrorism and Securing the Malacca Straits, edited by Graham Gerard Ong - Webb

  5. College Students; Justification for Digital Piracy: A Mixed Methods Study

    ERIC Educational Resources Information Center

    Yu, Szde

    2012-01-01

    A mixed methods project was devoted to understanding college students' justification for digital piracy. The project consisted of two studies, a qualitative one and a quantitative one. Qualitative interviews were conducted to identify main themes in students' justification for digital piracy, and then the findings were tested in a quantitative…

  6. A parametric design of ceramic faced composite armor subject to air weapon threats

    NASA Astrophysics Data System (ADS)

    Guo, Y. N.; Sun, Q.

    2015-12-01

    By taking into consideration the two categories of military projectile threats to aircraft structures, an optimal layer configuration of ceramic faced composite armor was designed in this paper. Using numerical simulations and the same layer arrangement of ceramic, UHMWPE, and carbon fiber laminates, a parametric finite element model using LS-DYNA code was built. Several thickness combinations were analyzed in order to determine the final lightest configuration that is capable of supporting a high-speed impact load and HEI blast wave load, which implements a high anti-penetration design for aircraft armor. This configuration can be used to improve the anti-impact ability of aircraft structures as well as achieve a structure/function integration design that considers a lighter weight.

  7. Self-control, deviant peers, and software piracy.

    PubMed

    Higgins, George E; Makin, David A

    2004-12-01

    Tests of self-control theory have examined a substantial number of criminal behaviors, but no study has examined the correlation of low self-control with software piracy. Using data collected from 302 students in this university, this study examined the correlation of low self-control with software piracy and the moderating role of associating with deviant peers in this correlation. Low self-control correlated with software piracy more strongly for those who had high associations with deviant peers than for students with low associations with deviant peers. Analysis indicated differential links for lack of moral attitude in relation to software piracy and favorable attitudes for software piracy for varying association with deviant peers.

  8. A methodology for the evaluation of the turbine jet engine fragment threat to generic air transportable containers

    SciTech Connect

    Harding, D.C.; Pierce, J.D.

    1993-06-01

    Uncontained, high-energy gas turbine engine fragments are a potential threat to air-transportable containers carried aboard jet aircraft. The threat to a generic example container is evaluated by probability analyses and penetration testing to demonstrate the methodology to be used in the evaluation of a specific container/aircraft/engine combination. Fragment/container impact probability is the product of the uncontained fragment release rate and the geometric probability that a container is in the path of this fragment. The probability of a high-energy rotor burst fragment from four generic aircraft engines striking one of the containment vessels aboard a transport aircraft is approximately 1.2 {times} 10{sup {minus}9} strikes/hour. Finite element penetration analyses and tests can be performed to identify specific fragments which have the potential to penetrate a generic or specific containment vessel. The relatively low probability of engine fragment/container impacts is primarily due to the low release rate of uncontained, hazardous jet engine fragments.

  9. Autonomous Agent-Based Simulation of a Model Simulating the Human Air-Threat Assessment Process

    DTIC Science & Technology

    2004-03-01

    multi - agent system (MAS) technology and is implemented in Java programming language. This research is a portion of Red Intent Project whose goal is to ultimately implement a model to predict the intent of any given track in the environment. For any air track in the simulation, two sets of agents are created, one for controlling track actions and one for predicting its identity and intent based on information received from track, the geopolitical situation and intelligence. The simulation is also capable of identifying coordinated actions between air tracks. We

  10. Threat to future global food security from climate change and ozone air pollution

    NASA Astrophysics Data System (ADS)

    Tai, Amos P. K.; Martin, Maria Val; Heald, Colette L.

    2014-09-01

    Future food production is highly vulnerable to both climate change and air pollution with implications for global food security. Climate change adaptation and ozone regulation have been identified as important strategies to safeguard food production, but little is known about how climate and ozone pollution interact to affect agriculture, nor the relative effectiveness of these two strategies for different crops and regions. Here we present an integrated analysis of the individual and combined effects of 2000-2050 climate change and ozone trends on the production of four major crops (wheat, rice, maize and soybean) worldwide based on historical observations and model projections, specifically accounting for ozone-temperature co-variation. The projections exclude the effect of rising CO2, which has complex and potentially offsetting impacts on global food supply. We show that warming reduces global crop production by >10% by 2050 with a potential to substantially worsen global malnutrition in all scenarios considered. Ozone trends either exacerbate or offset a substantial fraction of climate impacts depending on the scenario, suggesting the importance of air quality management in agricultural planning. Furthermore, we find that depending on region some crops are primarily sensitive to either ozone (for example, wheat) or heat (for example, maize) alone, providing a measure of relative benefits of climate adaptation versus ozone regulation for food security in different regions.

  11. 49 CFR 1540.115 - Threat assessments regarding citizens of the United States holding or applying for FAA...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES... Federal Aviation Administration. Individual means an individual whom TSA determines poses a security... piracy or terrorism; (3) A threat to airline or passenger security; or (4) A threat to civil...

  12. Stream piracy in the Black Hills: A geomorphology lab exercise

    USGS Publications Warehouse

    Zaprowski, B.J.; Evenson, E.B.; Epstein, J.B.

    2002-01-01

    The Black Hills of South Dakota exhibits many fine examples of stream piracy that are very suitable for teaching geomorphology lab exercises. This lab goes beyond standard topographic map interpretation by using geologic maps, well logs, gravel provenance and other types of data to teach students about stream piracy. Using a step-by-step method in which the lab exercises ramp up in difficulty, students hone their skills in deductive reasoning and data assimilation. The first exercises deal with the identification of stream piracy at a variety of spatial scales and the lab culminates with an exercise on landscape evolution and drainage rearrangement.

  13. Widespread Piracy by Students Frustrates Developers of Computer Software.

    ERIC Educational Resources Information Center

    DeLoughry, Thomas J.

    1987-01-01

    Computer software producers view students' illegal copying of programs as lost revenue and feel powerless to stop the piracy. Some propose to change student attitudes about copying, others suggest reducing software prices, and still others are calling for prosecution. (MSE)

  14. Imperial boyhood: piracy and the play ethic.

    PubMed

    Deane, Bradley

    2011-01-01

    Representations of perpetual boyhood came to fascinate the late Victorians, partly because such images could naturalize a new spirit of imperial aggression and new policies of preserving power. This article traces the emergence of this fantasy through a series of stories about the relationship of the boy and the pirate, figures whose opposition in mid-Victorian literature was used to articulate the moral legitimacy of colonialism, but who became doubles rather than antitheses in later novels, such as R.L. Stevenson's "Treasure Island" and Joseph Conrad's "Lord Jim." Masculine worth needed no longer to be measured by reference to transcendent, universal laws, but by a morally flexible ethic of competitive play, one that bound together boyishness and piracy in a satisfying game of international adventure.

  15. USAFRICOM’s Role in Counter-Piracy Operations Within the Horn of Africa

    DTIC Science & Technology

    2009-05-04

    2008), 3. 45 “A Cooperative Strategy for 21 st Century Seapower”, October 2007. 46 Jacquelyn S. Porth , “Piracy Off the Horn of Africa Threatens...owens.piracy.html, (accessed 19 April 2009). Porth , Jacquelyn S. “Piracy Off the Horn of Africa Threatens Relief Efforts, Trade.” America.gov. http

  16. Growth of desferrioxamine-deficient Streptomyces mutants through xenosiderophore piracy of airborne fungal contaminations.

    PubMed

    Arias, Anthony Argüelles; Lambert, Stéphany; Martinet, Loïc; Adam, Delphine; Tenconi, Elodie; Hayette, Marie-Pierre; Ongena, Marc; Rigali, Sébastien

    2015-07-01

    Due to the necessity of iron for housekeeping functions, nutrition, morphogenesis and secondary metabolite production, siderophore piracy could be a key strategy in soil and substrate colonization by microorganisms. Here we report that mutants of bacterium Streptomyces coelicolor unable to produce desferrioxamine siderophores could recover growth when the plates were contaminated by indoor air spores of a Penicillium species and Engyodontium album. UPLC-ESI-MS analysis revealed that the HPLC fractions with the extracellular 'resuscitation' factors of the Penicillium isolate were only those that contained siderophores, i.e. Fe-dimerum acid, ferrichrome, fusarinine C and coprogen. The restored growth of the Streptomyces mutants devoid of desferrioxamine is most likely mediated through xenosiderophore uptake as the cultivability depends on the gene encoding the ABC-transporter-associated DesE siderophore-binding protein. That a filamentous fungus allows the growth of desferrioxamine non-producing Streptomyces in cocultures confirms that xenosiderophore piracy plays a vital role in nutritional interactions between these taxonomically unrelated filamentous microorganisms.

  17. Stream-piracy impact on the long-term evolution of the Meuse basin. Physical approach "modeling with GOLEM"

    NASA Astrophysics Data System (ADS)

    Benaichouche, A.; Stab, O.; Cojan, I.; Brulhet, J.; Tijani, M.; Tessier, B.

    2012-04-01

    Landscape evolution results of antagonistic processes. In the Paris basin (France): tectonic uplift seems to be globally balanced by river incision. But the dynamic equilibrium of the relief can be disturbed by other processes and singularities may appear. A remarkable example is observed in the Meuse basin (NE of France), where the river is actually perched at more than +50m above the surrounding valleys: the Marne valley to the west and the Moselle valley to the east. This special morphology is the result of several stream piracies (at the expense of the Meuse) which has interested numerous researchers since a long time (Davis 1895, Blache 1943, Lesson-Quinif 2001 & Le Roux Harmand 1997-2009…). The most important ones of these piracies are: 1) the well-known capture of the Haute-Moselle by a tributary of the Meurthe near Toul; 2) at the north-west, the capture of the river Aire by the Aisne. On-going evolution suggests that similar events can be expected in the long-term future. Where and when next streams piracies could occur, what consequences may be expected? Our approach is to simulate the dynamic evolution of the landscape with an improved version of GOLEM (Geomorphic / Orogenic Landscape Evolution Model - LEM), software developed by Tucker & Slingerland in 1994 (http://csdms.colorado.edu/wiki/Model:GOLEM). The LEM characterizes erosion by incorporating diffusion and advection equations whose parameters must be fixed, according to local conditions. First simulations for next millions years with « detachment-limited » mode, let us locate several potential captures of the Meuse river by tributaries of the Moselle, therefore inducing a complete reorganization of the hydrographic network. The results of the localizations agree with local topography/geometry analysis. The first capture induces the propagation of a knickpoint and a significant lowering of the upstream part of the Meuse's basin. Downstream of the capture, the orientation of the abandoned valley

  18. Removing the Threat in the Air: Teacher Transparency and the Creation of Identity-Safe Graduate Classrooms

    ERIC Educational Resources Information Center

    Tuitt, Franklin

    2008-01-01

    Through a qualitative investigation, the author examined the experiences of 12 Black graduate students to understand better the impact of stereotype threat (Steele, 1997a , 1999) and performance anxieties (Osborne, 2001) on their education in a traditionally white institution (TWI). The results of this study illustrate how some students enter the…

  19. Laser Threat Analysis System (LTAS)

    NASA Astrophysics Data System (ADS)

    Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.

    2002-11-01

    LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.

  20. Movie Piracy Networks at Alaba International Market, Lagos, Nigeria.

    PubMed

    Tade, Oludayo; Mmahi, Okoro Paul

    2017-02-01

    This study examined the veiled chain of film piracy, a major crime in the Nigeria entertainment industry. Studies on film piracy in Nigeria have focused on its economic implications, both on the copyright owners and on the Nigerian economy. The organization of the activities of the film pirates has, however, been neglected. Narratives were extracted through in-depth interviews with pirates, "marketers," and "producers." Data indicated that pirates were insiders in the film marketing industry and included importers of foreign movies, registered and nonregistered retailers of Nigerian films, as well as marketers appointed by copyright owners to distribute their films. With the connivance of sales girls working with the copyright owners and dubbing companies, original copies of films (white face) are "procured." Pirates distributed pirated copies, also secretly known as "green face," without issuing receipts or putting the logo of the company on it. For security reasons, pirated films are sold only to buyers introduced by a member in the piracy network. Efforts aimed at fighting piracy must take into account this veiled network to effectively combat intellectual theft via aggressive ban on the public sale of such products.

  1. Piracy in cyber space: consumer complicity, pirates and enterprise enforcement

    NASA Astrophysics Data System (ADS)

    Chaudhry, Peggy E.; Chaudhry, Sohail S.; Stumpf, Stephen A.; Sudler, Hasshi

    2011-05-01

    This article presents an overview of the growth of internet piracy in the global marketplace. The ethical perceptions (or lack of) of the younger generation is addressed, in terms of their willingness to consume counterfeit goods on the web. Firms face the task of educating the consumer that downloading music, software, movies and the like, without compensation, is unethical. This awareness is critical for decreasing the demand for counterfeit goods in the virtual marketplace, where a consumer can exhibit a rogue behaviour with a limited fear of prosecution. We address the pyramid of internet piracy, which encompasses sophisticated suppliers/facilitators, such as the Warez group. Recent sting operations, such as Operation Buccaneer, are also depicted to highlight successful tactical manoeuvres of enforcement agencies. An overview of the Digital Millennium Copyright Act and the No Electronic Theft Act is included to debate the controversy surrounding this legislation. A discussion of enterprise enforcement mechanisms and novel anti-piracy technology for cyberspace is provided to reveal some of the tools used to fight the pirates, such as innovations in digital watermarking and NEC's recently announced video content identification technology. Enterprise information systems and its interdependence on the internet are also demanding new technologies that enable internet investigators to rapidly search, verify and potentially remove pirated content using web services. The quality of service of web services designed to efficiently detect pirated content is a growing consideration for new anti-piracy technology.

  2. Windows of War: A View on African Piracy

    DTIC Science & Technology

    2011-03-24

    Since the beginning of state-sponsored navies, piracy suppression has been one of their major responsibilities-when Julius Caesar was captured by...ships to take his revenge.” 2 From the tactical level of Caesars ‟ revenge, this paper makes the 2 time travelled leap into the United States theory

  3. Post-mating clutch piracy in an amphibian.

    PubMed

    Vieites, David R; Nieto-Román, Sandra; Barluenga, Marta; Palanca, Antonio; Vences, Miguel; Meyer, Axel

    2004-09-16

    Female multiple mating and alternative mating systems can decrease the opportunity for sexual selection. Sperm competition is often the outcome of females mating with multiple males and has been observed in many animals, and alternative reproductive systems are widespread among species with external fertilization and parental care. Multiple paternity without associated complex behaviour related to mating or parental care is also seen in simultaneously spawning amphibians and fishes that release gametes into water. Here we report 'clutch piracy' in a montane population of the common frog Rana temporaria, a reproductive behaviour previously unknown in vertebrates with external fertilization. Males of this species clasp the females and the pair deposits one spherical clutch of eggs. No parental care is provided. 'Pirate' males search for freshly laid clutches, clasp them as they would do a female and fertilize the eggs that were left unfertilized by the 'parental' male. This behaviour does not seem to be size-dependent, and some males mate with a female and perform clutch piracy in the same season. Piracy affected 84% of the clutches and in some cases increased the proportion of eggs fertilized, providing direct fitness benefits both for the pirate males and the females. Sexual selection--probably caused by a strong male-biased sex ratio--occurs in this population, as indicated by size-assortative mating; however, clutch piracy may reduce its impact. This provides a good model to explore how alternative mating strategies can affect the intensity of sexual selection.

  4. Small-Business Computing: Is Software Piracy Justified?

    ERIC Educational Resources Information Center

    Immel, A. Richard

    1983-01-01

    Presents several different perspectives on the copying of computer software (discs, tapes, etc.) in an attempt to determine whether such infringement of copyright, often called "software piracy," can ever be justified. Implications for both the hardware and software firms and the users are also discussed. (EAO)

  5. Publishers Press Colleges To Stop Software Piracy by Their Students.

    ERIC Educational Resources Information Center

    Haworth, Karla

    1997-01-01

    Software piracy among college students is increasing, and the software publishing industry insists colleges are responsible for the activities of their computer nets' users. Colleges generally cooperate with publishers when their students are found infringing on copyrights. The Software Publishers Association is holding a University of Puget Sound…

  6. What Do Computer Science Students Think about Software Piracy?

    ERIC Educational Resources Information Center

    Konstantakis, Nikos I.; Palaigeorgiou, George E.; Siozos, Panos D.; Tsoukalas, Ioannis A.

    2010-01-01

    Today, software piracy is an issue of global importance. Computer science students are the future information and communication technologies professionals and it is important to study the way they approach this issue. In this article, we attempt to study attitudes, behaviours and the corresponding reasoning of computer science students in Greece…

  7. USAF Weapons Of Mass Destruction (WMD) Threat Planning And Response Handbook - Air Force Handbook 10-2502

    DTIC Science & Technology

    2006-05-31

    among the emerging transnational threats. The absence of other dominating global powers and the existence of overwhelming capability of United...determines the parameters of the incident site hot and warm zones and provides com- mand and control of the immediate incident site itself. Direct control...and control of the entire incident scene, including hot, warm , and cold zones. The first responders will approach the incident site from an

  8. Check Six Begins on the Ground: Responding to the Evolving Ground Threat to U.S. Air Force Bases.

    DTIC Science & Technology

    1995-01-01

    Jalibah and Talil, destroying 29 aircraft in the process. See Rick Atkinson, Crusade: The Untold Story of the Persian Gulf War, New York: Houghton... Riordan , Air Base Ground Defense: Key Issues for the 1990s, Maxwell AFB, Ala.: Air War College Research Report, 1987. Nystrom, Charles W., Air Base...Press, "Salvadoran Rebels Hit Military Posts," Chicago Tribune, November 21,1990, p. 3. 86 "Check Six begins on the ground" Atkinson, Rick

  9. Somali Piracy and Anti-Shipping Activity Messages: Lessons for a Successful Counterpiracy Strategy

    DTIC Science & Technology

    2014-06-01

    coast of Somalia. Broomfield, CO: One Earth Future and Oceans Beyond Piracy. Retrieved from http://oceansbeyondpiracy.org/sites/default/files...security. The safety and economic security of the United States depends on the secure use of the world’s oceans (NSMS, 2005). Background of the...piracy trends to confirm that the Indian Ocean and East African piracy 8 Adapted from “On the Success

  10. Organizing Chaos: Restructuring Counter-Piracy Forces Off the Coast of Somalia

    DTIC Science & Technology

    2011-05-04

    Counter- Piracy Forces Off the Coast of Somalia 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) LT M. Brian...personal views and are not necessarily endorsed by the NWC or the Department of the Navy. 14. ABSTRACT The counter- piracy efforts off the coast of...counter- piracy mission. It explains how consolidation of forces under the direction of a single operational commander will increase the efficiency of

  11. Stereotype Threat.

    PubMed

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  12. Environmental Threats at School

    ERIC Educational Resources Information Center

    Green, Twhanna

    2005-01-01

    Children can be exposed to dangerous chemicals and toxins in the most unlikely of places: Their schools. This brief article describes the types of threats that school environments pose to students' health, including such pollution and chemical exposures as lead, mercury, arsenic, molds, and poor indoor air quality. The article provides tips for…

  13. Buried treasure: evolutionary perspectives on microbial iron piracy

    PubMed Central

    Barber, Matthew F.; Elde, Nels C.

    2015-01-01

    Host-pathogen interactions provide valuable systems for the study of evolutionary genetics and natural selection. The sequestration of essential iron has emerged as a critical innate defense system termed nutritional immunity, leading pathogens to evolve mechanisms of `iron piracy' to scavenge this metal from host proteins. This battle for iron carries numerous consequences not only for host-pathogen evolution, but also microbial community interactions. Here we highlight recent and potential future areas of investigation on the evolutionary implications of microbial iron piracy in relation to molecular arms races, host range, competition, and virulence. Applying evolutionary genetic approaches to the study of microbial iron acquisition could also provide new inroads for understanding and combating infectious disease. PMID:26431675

  14. Software Piracy Forensics: The Need for Further Developing AFC

    NASA Astrophysics Data System (ADS)

    Baboo, S. Santhosh; Bhattathiripad, P. Vinod

    Among all the available approaches for software piracy forensics, one existing and exceptional approach is the theoretical frame work called AFC (Abstraction-Filtering-Comparison), an accepted approach in US courts for evaluating copyright infringement claims involving computer software. Through this paper, the authors would like to approach AFC in a threefold manner: One, to discuss the nature and efficacy of AFC; two, to recount some existing observations on it, and three, to identify areas, if any, where there is scope and need for appropriate modifications to further increase the efficacy and validate the legitimacy of the AFC approach, and in particular from the view point of a researcher who believes that software intelligence offered by the automated tools for software piracy investigation needs to be supplemented with manual intelligence for making the expert report more judiciary-friendly.

  15. Buried Treasure: Evolutionary Perspectives on Microbial Iron Piracy.

    PubMed

    Barber, Matthew F; Elde, Nels C

    2015-11-01

    Host-pathogen interactions provide valuable systems for the study of evolutionary genetics and natural selection. The sequestration of essential iron has emerged as a crucial innate defense system termed nutritional immunity, leading pathogens to evolve mechanisms of 'iron piracy' to scavenge this metal from host proteins. This battle for iron carries numerous consequences not only for host-pathogen evolution but also microbial community interactions. Here we highlight recent and potential future areas of investigation on the evolutionary implications of microbial iron piracy in relation to molecular arms races, host range, competition, and virulence. Applying evolutionary genetic approaches to the study of microbial iron acquisition could also provide new inroads for understanding and combating infectious disease.

  16. A Maritime Approach to Countering Horn of Africa Piracy

    DTIC Science & Technology

    2012-04-26

    Scotland UK: Whiterby Publishing Group, 2011), http://www.cusnc.navy.mil/marlo/Guidance/BMP4_web.pdf (accessed 21 Jan 2011). Many maritime vessels...Practices for Protection Against Somali Based Piracy ( Scotland UK: Whiterby Publishing Group, 2011), http://www.cusnc.navy.mil/marlo/Guidance...Kraska, 114. 37 Paulo Prada and Alex Roth , “On the Lawless Seas, It’s Not Easy Putting Somali Pirates in the Dock,” Wall Street Journal, 12 December

  17. Sailing into Troubled Waters: Predicting Piracy Off Africa

    DTIC Science & Technology

    2011-03-22

    law enforcement actions . These conditions are typically only afforded within the borders of failing nations which are characterized by lawlessness...pirate actions in the region do not encumber U.S. commerce, (c) U.S. energy sources (e.g., oil & gas) are not threatened, and, (d) policy...military actions against land based pirate operations. Prior to determining an appropriate U.S. Navy policy towards African piracy though, it is

  18. Piracy at Sea: Somalia an Area of Great Concern

    NASA Astrophysics Data System (ADS)

    Baniela, Santiago Iglesias

    In this paper, the author analyses piracy at sea in Somalia, to provide a general up-to-date vision of the problem which threatens the security of ships sailing in the Gulf of Aden. The pirates' modus operandi, the existing factors behind these punishable acts and the prevailing international response are analysed. Finally the paper reviews how the international community could act in order to tackle the problem with a view to its possible eradication.

  19. Spatial, Temporal and Spatio-Temporal Patterns of Maritime Piracy

    PubMed Central

    Marchione, Elio

    2013-01-01

    Objectives: To examine patterns in the timing and location of incidents of maritime piracy to see whether, like many urban crimes, attacks cluster in space and time. Methods: Data for all incidents of maritime piracy worldwide recorded by the National Geospatial Intelligence Agency are analyzed using time-series models and methods originally developed to detect disease contagion. Results: At the macro level, analyses suggest that incidents of pirate attacks are concentrated in five subregions of the earth’s oceans and that the time series for these different subregions differ. At the micro level, analyses suggest that for the last 16 years (or more), pirate attacks appear to cluster in space and time suggesting that patterns are not static but are also not random. Conclusions: Much like other types of crime, pirate attacks cluster in space, and following an attack at one location the risk of others at the same location or nearby is temporarily elevated. The identification of such regularities has implications for the understanding of maritime piracy and for predicting the future locations of attacks. PMID:25076796

  20. Joint Suppression of Enemy Air Defenses (J-SEAD): A Command and Control Method to Counter the Mobile Air Defense Threat

    DTIC Science & Technology

    2007-11-02

    300V (SA-12a ‘ Gladiator ’/ SA-12b ‘Giant’) Family of Low- to High-Altitude Surface-to Air Missile Systems Jane’s Land-Based Air Defense 2002-2003...associated states> [07 January 2002]. Foss, Christopher F. and James C. O’Halloran, eds. “Antey S-300V (SA-12a ‘ Gladiator ’/ SA-12b ‘Giant’) Family

  1. 77 FR 41316 - Federal Bureau of Investigation Anti-Piracy Warning Seal Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-13

    ... association administered the process and record-keeping. Largely as a result of this program, the APW Seal and its anti-piracy message have reached a large segment of the public. Unfortunately, the pilot program... closely with industry groups to combat piracy, it was the volume of requests to use the APW Seal...

  2. Student Digital Piracy in the Florida State University System: An Exploratory Study on Its Infrastructural Effects

    ERIC Educational Resources Information Center

    Reiss, Jeffrey

    2010-01-01

    Digital piracy is a problem that may never disappear from society. Through readily available resources such as those found in a university, students will always have access to illegal goods. While piracy is a global phenomenon, an institution's resources combined with the typical college student's lack of funds makes it more lucrative. Students…

  3. Intention to Commit Online Music Piracy and Its Antecedents: An Empirical Investigation

    ERIC Educational Resources Information Center

    Morton, Neil A.; Koufteros, Xenophon

    2008-01-01

    Online piracy of copyrighted digital music has become rampant as Internet bandwidth and digital compression technologies have advanced. The music industry has suffered significant financial losses and has responded with lawsuits, although online music piracy remains prevalent. This article developed a research model to study the determinants of…

  4. Software Piracy among College Students: A Comprehensive Review of Contributing Factors, Underlying Processes, and Tackling Strategies

    ERIC Educational Resources Information Center

    Liang, Zhili; Yan, Zheng

    2005-01-01

    This article reviewed empirical studies published in the past 30 years that examined software piracy among college students. It focused on three areas of study: (a) major factors that affect college students' intentions, attitudes, and moral intensity regarding software piracy, (b) various decision-making processes that underlie software piracy…

  5. Mines and Underwater IEDs in U.S. Ports and Waterways: Context, Threats, Challenges, and Solutions

    DTIC Science & Technology

    2008-01-01

    are the roles and responsibilities of local police bomb squads or fire departments? In some jurisdictions, even natural - resources police could be...biological, radiological, nuclear, and high-explosive weapons of mass destruc- tion and disruption; piracy and organized crime; overexploitation of marine...assets are at risk, must respond to weapons that can easily be deployed in U.S. ports and waterways. THE NATURE OF THE M/UWIED THREAT In the American

  6. Countering Air and Missile Threats

    DTIC Science & Technology

    2007-02-05

    Operations. TELs serve as the transporter and launch platform for missiles. One very common TEL is the Soviet-era MAZ -543. TELs present a small, extremely...mobile target with very short dwell time. The MAZ -543 has tremendous off-road mobility and can easily hide. TELs generally travel only short

  7. Countering Air and Missile Threats

    DTIC Science & Technology

    2012-03-23

    should not be placed on an airborne warning and control/ airborne C2 aircraft that are not designated as a full time SADC directing ground - based AD in...increase the probability of kill (Pk). Attacks should also be considered against airborne , maritime, and ground - based C2 platforms, as well as...Defense. Area defense uses a combination of weapon systems (e.g., aircraft and SAMs) or various combinations of airborne and ground - based sensors and

  8. Can U.S.-Led Efforts Reduce Piracy in the Malacca and Singapore Straits?

    DTIC Science & Technology

    2004-02-10

    June 2004, in International Waters in the Strait of Malacca. “About ten pirates (suspected GAM rebels) in a speedboat opened fire on ship while at...U.S., whose businesses are the third largest owners of ships that transit the Straits (see Appendix A – Shipping and Economic Importance of the...keeping with the international legal definition of piracy, this report will use the terms piracy for incidents on the high seas and armed robbery for

  9. Multinational Counter-Piracy Operations: How Strategically Significant is the Gulf of Guinea to the Major Maritime Powers

    DTIC Science & Technology

    2015-12-01

    piracy arrangement put together in 2004 by the Malacca Littoral States. Before 29 Graham Gerard Ong ...ed. Graham Gerard Ong -Webb (Singapore: ISEAS Publishing, 2006), 164. 37 It is estimated that two-thirds of the world’s liquefied natural gas (LNG...conduct. Ong -Webb, Graham Gerard. “Piracy in Maritime Asia: Current Trends.” In Violence at Sea: Piracy in the Age of Global Terrorism, edited by

  10. Escape from bacterial iron piracy through rapid evolution of transferrin

    PubMed Central

    Barber, Matthew F.; Elde, Nels C.

    2015-01-01

    Iron sequestration provides an innate defense termed nutritional immunity, leading pathogens to scavenge iron from hosts. Although the molecular basis of this battle for iron is established, its potential as a force for evolution at host-pathogen interfaces is unknown. We show that the iron transport protein transferrin is engaged in ancient and ongoing evolutionary conflicts with TbpA, a transferrin surface receptor from bacteria. Single substitutions in transferrin at rapidly evolving sites reverse TbpA binding, providing a mechanism to counteract bacterial iron piracy among great apes. Furthermore, the C2 transferrin polymorphism in humans evades TbpA variants from Haemophilus influenzae, revealing a functional basis for standing genetic variation. These findings identify a central role for nutritional immunity in the persistent evolutionary conflicts between primates and bacterial pathogens. PMID:25504720

  11. Investigating the potential for "water piracy" in North East Greenland

    NASA Astrophysics Data System (ADS)

    Karlsson, Nanna B.; Dahl-Jensen, Dorthe

    2013-04-01

    The incorporation of subglacial processes in ice flow models remains a challenge while at the same time observational evidence increasingly underscores the important role liquid water plays in ice flow dynamics. One of the many problems ice flow models face (that also includes scarcity of data at the bed and the deformational properties of water-saturated sediments) is the different time-scales on which the processes operate. For example, observations indicate that subglacial water may be re-routed to a neighbouring ice stream in response to changes in surface elevation. This implies that ice flow models have to allow for changes in ice flow mode where, depending on the basal properties, the flow may be dominated by deformation or basal sliding. The re-routing of water between neighbouring ice streams is often termed "water piracy" and in this study we demonstrate that the potential for water piracy exists even in regions with very small surface elevation changes. We use a simple, vertically integrated, 2D-plane ice flow model based on the shallow ice flow approximation to model the large-scale changes in surface elevation of North East Greenland in response to gravity and mass balance. Considering time-scales of 100-500 years the model predicts changes in elevation of less than a metre per year which is in agreement with data from remote sensing. We then calculate the corresponding changes in hydrological pressure potential and use evidence from radio-echo sounding data to identify areas with basal melting and thus potential liquid water production. The corresponding change in hydrological pressure potential in response to the surface elevation changes is sufficient to divert the subglacial water to different pathways. This change in subglacial water pathways could be sufficient to change the ice flow mode from deformation to sliding and might initiate speed-up and/or slow-down of the ice streams at the margins of the basin.

  12. Air

    MedlinePlus

    ... do to protect yourself from dirty air . Indoor air pollution and outdoor air pollution Air can be polluted indoors and it can ... this chart to see what things cause indoor air pollution and what things cause outdoor air pollution! Indoor ...

  13. Viral piracy: HIV-1 targets dendritic cells for transmission.

    PubMed

    Lekkerkerker, Annemarie N; van Kooyk, Yvette; Geijtenbeek, Teunis B H

    2006-04-01

    Dendritic cells (DCs), the professional antigen presenting cells, are critical for host immunity by inducing specific immune responses against a broad variety of pathogens. Remarkably the human immunodeficiency virus-1 (HIV-1) subverts DC function leading to spread of the virus. At an early phase of HIV-1 transmission, DCs capture HIV-1 at mucosal surfaces and transmit the virus to T cells in secondary lymphoid tissues. Capture of the virus on DCs takes place via C-type lectins of which the dendritic cell-specific intercellular adhesion molecule-3 (ICAM-3) grabbing nonintegrin (DC-SIGN) is the best studied. DC-SIGN-captured HIV-1 particles accumulate in CD81(+) multivesicular bodies (MVBs) in DCs and are subsequently transmitted to CD4+ T cells resulting in infection of T cells. The viral cell-to-cell transmission takes place at the DC-T cell interface termed the infectious synapse. Recent studies demonstrate that direct infection of DCs contributes to the transmission to T cells at a later phase. Moreover, the infected DCs may function as cellular reservoirs for HIV-1. This review discusses the different processes that govern viral piracy of DCs by HIV-1, emphasizing the intracellular routing of the virus from capture on the cell surface to egress in the infectious synapse.

  14. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling all members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  15. Somali Piracy: An Age-Old Solution to a Modern Day Problem

    DTIC Science & Technology

    2010-05-19

    of the Barbary pirates. Instability from maritime piracy in the Gulf of Aden is sending ripples throughout the global supply chain , which is already...thousand ships pass yearly through the Gulf of Aden, transporting cargo that includes twelve percent of the world’s daily oil supply .2 Piracy off the...the sea-lanes that transport almost half of the world’s cargo, including one-third of Europe’s oil supplies . In addition, many of the proceeds from

  16. Cyber threat metrics.

    SciTech Connect

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  17. Air Policing

    DTIC Science & Technology

    2009-05-01

    Iraq. To provide a background for understanding why Britain commenced the policy of air policing, this paper begins with a review of contemporary...7 Omissi, Air Power, XV. 8 policing actions or the pushing home of advantages gained by the air.” Within the context of this paper , the...control operations, and therefore within the context of this paper , the term coercive airpower refers to the threat of harming a population or the threat

  18. Old Glory and the Jolly Roger: The Cultural Constraints and Strategic Imperatives of Modern Piracy

    DTIC Science & Technology

    2009-06-01

    34Privateering and the Private Production of Naval Power." Cato Journal 11, no. 1 (Spring/Summer 1991): 99–122. Andersson, Hilary . "China ’Is Fuelling War...the High Seas. New York: Penguin Putnam , Inc., 2002. Carse, Robert. The Age of Piracy: A History. New York: Rinehart and Company, Inc., 1957

  19. Breaks, Flows, and Other In-Between Spaces: Rethinking Piracy and Copyright Governance

    ERIC Educational Resources Information Center

    Wang, Shujen

    2006-01-01

    This article uses three case studies to examine the intersecting developments of technology, capitalism, and globalization through the contradictions and paradoxes of copyright governance and piracy. China is used as a case study to investigate the relations among the state, law, and global capitalism. (Contains 7 tables and 9 notes.)

  20. News Piracy: Unfair Competition and the Misappropriation Doctrine. Journalism Monographs No. 56.

    ERIC Educational Resources Information Center

    Sullivan, Paul W.

    Unfair competition is a complex problem affecting all areas of American business, including the communications media. Piracy of material, an alarmingly widespread example of unfair competition, involves legal as well as ethical questions. This monograph uses the historical approach to trace the development of common-law precedent and trends and…

  1. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  2. Threat of allergenic airborne grass pollen in Szczecin, NW Poland: the dynamics of pollen seasons, effect of meteorological variables and air pollution.

    PubMed

    Puc, Małgorzata

    2011-09-01

    The dynamics of Poaceae pollen season, in particularly that of the Secale genus, in Szczecin (western Poland) 2004-2008 was analysed to establish a relationship between the meteorological variables, air pollution and the pollen count of the taxa studied. Consecutive phases during the pollen season were defined for each taxon (1, 2.5, 5, 25, 50, 75, 95, 97.5, 99% of annual total), and duration of the season was determined using the 98% method. On the basis of this analysis, the temporary differences in the dynamics of the seasons were most evident for Secale in 2005 and 2006 with the longest main pollen season (90% total pollen). The pollen season of Poaceae started the earliest in 2007, when thermal conditions were the most favourable. Correlation analysis with meteorological factors demonstrated that the relative humidity, mean and maximum air temperature, and rainfall were the factors influencing the average daily pollen concentrations in the atmosphere; also, the presence of air pollutants such as ozone, PM(10) and SO(2) was statistically related to the pollen count in the air. However, multiple regression models explained little part of the total variance. Atmospheric pollution induces aggravation of symptoms of grass pollen allergy.

  3. Dynamic Asset Allocation Approaches for Counter-Piracy Operations

    DTIC Science & Technology

    2012-07-01

    of dimensionality associated with Dynamic Programming (DP), we propose a Gauss - Seidel algorithm coupled with a rollout strategy for the interdiction...Allocation problem, Rollout, Gauss - Seidel iteration I. INTRODUCTION A. Motivation The United States Navy faces a number of asymmetric threats...horizon. In order to overcome the curse of dimensionality associated with Dynamic Programming (DP), we propose a Gauss - Seidel algorithm coupled with a

  4. Passive automatic anti-piracy defense system of ships

    NASA Astrophysics Data System (ADS)

    Szustakowski, M.; Życzkowski, M.; Ciurapiński, W.; Karol, M.; Kastek, M.; Stachowiak, R.; Markowski, P.

    2013-10-01

    The article describes the technological solution for ship self-defense against pirate attacks. The paper presents the design solutions in the field of direct physical protection. All the solutions are connected with the latest optoelectronic and microwave systems and sensors to detect, recognize and the threat posed by pirates. In particular, tests of effectiveness and the detection-range of technology demonstrator developed by a team of authors were carried out.

  5. Piracy in the Horn of Africa: A Comparative Study with Southeast Asia

    DTIC Science & Technology

    2009-12-01

    inhabitants [of this area] are addicted to piracy. When [Chinese Junks] sail to the Western [Indian] Ocean the local barbarians allow them to pass...invention of steam-powered ships in the 1830s would finally provide the British the upper hand in speed and mobility when chasing pirate praus...pirates are viewed as heroes. In a phone interview with the BBC, Dahir Mohamed Hayeysi, a local pirate, stated that in his community 176 Kevin Whitlaw

  6. Modern Piracy and Regional Security Cooperation in the Maritime Domain: The Middle East and Southeast Asia

    DTIC Science & Technology

    2010-03-01

    company , Saudi Aramco , was carrying close to two million barrels of crude oil bound for the US. IMB, “Piracy and Armed Robbery Against Ships: Report for...later ransomed for a reported three million USD. The Sirius Star, owned by a UAE based company that is a subsidiary of the Saudi Arabian state oil ...result of Saudi aspirations to invade the Kuwaiti kingdom. Oil and gas fields shared with Saudi Arabia and Iran provide additional sources of potential

  7. Solving the Ancient Maritime Problem: Piracy Operations in the Gulf of Aden

    DTIC Science & Technology

    2010-04-22

    of Aden, one of the busiest shipping lanes in the world, was the main target of Somali pirates in 2008. Relentless pirate hijackings in the area...must implement a number of measures. Counter-piracy efforts have been focused in five main areas to include coalition naval presence, additional use...Aden, one of the busiest shipping lanes in the world, was the main target of Somali pirates in 2008. Relentless pirate attacks and dozens

  8. Piracy of adhesins: attachment of superinfecting pathogens to respiratory cilia by secreted adhesins of Bordetella pertussis.

    PubMed

    Tuomanen, E

    1986-12-01

    Two proteins secreted by Bordetella pertussis are known to mediate adherence of these bacteria to mammalian respiratory cilia. When either ciliated cells or other pathogenic bacteria were pretreated with these adhesins, Streptococcus pneumoniae, Haemophilus influenzae, and Staphylococcus aureus acquired the ability to adhere to cilia in vitro and in vivo. Such piracy of adhesins may contribute to superinfection in mucosal diseases such as whooping cough.

  9. The Long War Against Piracy: Historical Trends (Occasional Paper, Number 32)

    DTIC Science & Technology

    2010-05-01

    command of a powerful force, including the frigates Macedonian (36 guns) and Congress (32 guns); the corvettes Cyane (32 guns) and John Adams (24 guns...intimidate many Arab groups, not just the al-Qawasim, into signing the General Treaty of Peace. East Indies Piracy Spices such as nutmeg, pepper ...operated as they pleased most of the time.40 Similarly, the Sultan of Acheen ruled the northwestern coast of Sumatra, known as the “ pepper coast

  10. Capacity Building as an Answer to Piracy in the Horn of Africa

    DTIC Science & Technology

    2010-12-01

    against low fast moving aircraft.69 On the other hand, a maritime application of a tethered aerostat constellation system could be embedded with a...technological assets, i.e tethered aerostat radar sensors, UAVs and picosatellites. The economic and technical feasibility of the proposed conceptual model is...number of deployed naval assets. 15. NUMBER OF PAGES 89 14. SUBJECT TERMS Piracy, Capacity Building, Horn of Africa, Tethered Aerostats, Radar

  11. Long term monitoring of open-air monuments under threat: the case study of the "Tombs of the Kings" in Cyprus

    NASA Astrophysics Data System (ADS)

    Agapiou, A.; Lysandrou, V.; Hadjimitsis, D. G.; Alexakis, D. D.; Themistocleous, K.; Michaelides, S.

    2012-04-01

    Since antiquity, Cyprus has been a crossroad were various cultures, arts and ideas were deposited. This is evidenced by its huge archaeological residues spread all over the island. Open to air monuments are being exposed to environmental conditions and without any appropriate measures various deterioration factors may become disastrous. Monitoring Cultural Heritage (CH) Sites and Monuments in Cyprus is commonly based on site observations. However, this procedure which includes data collection, periodical observations and multivariate risk assessment analysis, is difficult to be accomplished with the traditional practices and methods, since it is time consuming and expensive. In contrast, new technologies like satellite sensing sensors and in situ measurements can successfully confront this problem by providing to the scientists an integrated and multi-layer monitoring system for vast areas simultaneously. The present paper describes the registration of deterioration processes in one of the most important archaeological areas in Cyprus, listed in the World's Cultural Heritage Sites, the so called "Tomb of the Kings" at Nea Pafos. This work is a part of the research programme "Managing Cultural Heritage Sites through Space and ground Technologies using Geographical Information Systems: A Pilot application at the archaeological sites of Paphos", funded by the Research Promotion Foundation of Cyprus. The project concerns the region of Paphos district in western Cyprus and it deals with cultural heritage sites managements using integrated space and ground technologies, aiming at risk assessment of the areas under examination. The paper presents the methodological framework of the project with some preliminary results for the long term monitoring of Cultural Heritage Sites based, not only in situ observations, but also on using new technologies such as satellite images for retrieving air pollution, laser scanner, thermo-cameras etc.

  12. Cyber Intelligence Threat Prioritization

    DTIC Science & Technology

    2014-10-01

    possible direction of their behavior. and determines their interest in targeting the organization. t Intrinsic (personally rewarding) Extrinsic (receive...actors resources. Money People Tools Training Motive Why do threat actors attack? Determining an actor’s motive provides insight into the...platform that allows anyone to make their organization more visible to threat actors. Online Presence Extracurricular Activities Motive Risk

  13. Country Threat File Codebook

    DTIC Science & Technology

    1975-01-01

    are atent threats, national nd or carry out threats ndencles that restrict cal1y and pol 111cal1y rganlzations that might t ion. There are...economic competition, trade deficits , disputed territories, control of waterways, coup d’etats, breaking of diplomatic relations, withdrawal from

  14. Modelling ultraviolet threats

    NASA Astrophysics Data System (ADS)

    James, I.

    2016-10-01

    Electro-optically (EO) guided surface to air missiles (SAM) have developed to use Ultraviolet (UV) wavebands supplementary to the more common Infrared (IR) wavebands. Missiles such as the US Stinger have been around for some time but are not considered a proliferation risk. The Chinese FN-16 and Russian SA-29 (Verba) are considered a much higher proliferation risk. As a result, models of the missile seekers must be developed to understand the characteristics of the seeker and the potential performance enhancement that are included. Therefore, the purpose of this paper is to introduce the steps that have been taken to characterise and model these missiles. It begins by outlining some of the characteristics of the threats, the key elements of a UV scene, the potential choice of waveband for a detector, the initial modelling work to represent the UV detector of the missile and presents initial results. The modelling shows that the UV detection range of a typical aircraft is dependent on both the size of the aircraft and its reflectivity. However, the strength of this correlation is less than expected. As a result, further work is required to model more seeker types and to investigate what is causing the weak correlations found in these initial investigations. In addition, there needs to be further study of the sensitivities of the model to other variables, such as the modelled detectivity of the detector and the signal to noise ratio assumed. Overall, the outcome of this work will be to provide specifications for aircraft size and reflectivity that limit the effectiveness of the UV channels.

  15. Digital piracy: an examination of low self-control and motivation using short-term longitudinal data.

    PubMed

    Higgins, George E

    2007-08-01

    The purpose of the present study was to examine the link between low self-control, motivation, and digital piracy. This study used short-term longitudinal data (i.e., once a week for 4 weeks) from undergraduate students (n = 292) and latent trajectory analysis. The results of this study revealed that the students had significant variability in initial levels and rates of change in digital piracy. The results indicated that whether motivation was treated as a time-invariant or time-varying measure, it along with sex (i.e., being male) had a significant link with the initial levels of digital piracy and that sex and low self-control had links with the rate of change. These results are discussed, and policy implications are made.

  16. Facing ambiguous threats.

    PubMed

    Roberto, Michael A; Bohmer, Richard M J; Edmondson, Amy C

    2006-11-01

    On February 1, 2003, the world watched in horror as the Columbia space shuttle broke apart while reentering the earth's atmosphere, killing all seven astronauts. Some have argued that NASA's failure to respond with appropriate intensity to the so-called foam strike that led to the accident was evidence of irresponsible or incompetent management. The authors' research, however, suggests that NASA was exhibiting a natural, albeit unfortunate, pattern of behavior common in many organizations. The foam strike is a prime example of what the authors call an ambiguous threat-a signal that may or may not portend future harm. Ambiguous threats differ from threats with obvious causes-say, a fire in the building-for which the response is clear. They also differ from unmistakable threats that may lack straightforward response paths (such as the frightening oxygen-tank explosion aboard Apollo 13). However, when the warning sign is ambiguous and the threat's potential effect is unclear, managers may choose to ignore or discount the risk. Such an approach can be catastrophic. Firms that do a good job of dealing with ambiguous threats do not improvise during a crisis; rather, they apply a rigorous set of detection and response capabilities that they have developed and practiced beforehand. In this article, the authors outline how to put such capabilities in place long before a crisis strikes. First, companies need to hone their teamwork and rapid problem-solving skills through practice. Second, they must learn to recognize weak signals, amplify the threat, and encourage employees to ask disconcerting "what if" questions in a safe environment. Finally, they should explore possible responses to threats through quick, low-cost experimentation.

  17. Is Your School Sick? Five Threats to Healthy Schools.

    ERIC Educational Resources Information Center

    Grubb, Deborah; Diamantes, Thomas

    1998-01-01

    Examines the five major threats to healthy school buildings: sick building syndrome; health-threatening building materials; environmental hazards such as radon gas and asbestos; lead poisoning; and general indoor air quality. Discusses ways to assess and address them. (SR)

  18. Poland and Global Threats

    NASA Astrophysics Data System (ADS)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  19. Insider Threat Specification as a Threat Mitigation Technique

    NASA Astrophysics Data System (ADS)

    Magklaras, George; Furnell, Steven

    Insider threats come in many facets and nuances. This results in two major problems: mining big amounts of data for evidence of an insider attack, and keeping track of different aspects of threats is very cumbersome. To enable techniques that support detection of insider threats as early as possible, one needs mechanisms to automate significant parts of the detection process, and that allow to specify what is meant by insider threat. This chapter describes the Insider Threat Prediction Specification Language (ITPSL), a research effort to address the description of threat factors as a mechanism to mitigate insider threats.

  20. Combatting Insider Threats

    NASA Astrophysics Data System (ADS)

    Neumann, Peter G.

    Risks from insider threats are strongly context dependent, and arise in many ways at different layers of system abstraction for different types of systems. We discuss various basic characteristics of insider threats, and consider approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse. We also consider future research that could improve both detectability, prevention, and response. This chapter seeks to cope with insider misuse in a broad range of application domains - for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infrastructures. To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. This discussion includes an examination of the relevance of the Saltzer-Schroeder-Kaashoek security principles and the Clark-Wilson integrity properties for end-to-end election integrity. Trustworthy system developments must consider insider misuse as merely one set of threats that must be addressed consistently together with many other threats such as penetrations, denials of service, system faults and failures, and other threats to survivability. In addition, insider misuse cannot be realistically addressed unless significant improvements are made in the trustworthiness of component systems and their networking as well as their predictably trustworthy compositions into enterprise solutions - architecturally, developmentally, and operationally.

  1. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    PubMed

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  2. An Overview of Non-Traditional Nuclear Threats

    SciTech Connect

    Geelhood, Bruce D.; Wogman, Ned A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear war-heads to include radiation dispersal devices (RDD) or “dirty” bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials enter-ing our borders is considered. The radiation and other signatures of potential nuclear and radio-logical threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

  3. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  4. Credible threats and promises.

    PubMed

    McNamara, John M; Houston, Alasdair I

    2002-11-29

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest.

  5. Cross-National Attitudes and Perceptions Concerning Software Piracy: A Comparative Study of Students from the United States and China

    ERIC Educational Resources Information Center

    Rawlinson, David R.; Lupton, Robert A.

    2007-01-01

    Students' attitudes and perceptions regarding the use of unlicensed software are important to educators and businesses. Students have a proven propensity to pirate software and other intellectual property. By understanding how attitudes and perceptions toward software piracy differ among university students in a cross-national context, educators…

  6. A Cooperative Strategy of 21st Century Seapower: 200 Years of Repressing Piracy and Still Missing the Boat

    DTIC Science & Technology

    2008-04-23

    Pirate incident data:” International Maritime Bureau (IMB) Piracy Reporting Center and NGA Anti- Shipping Activity Message ( ASAM ) service. Satellite...Message ( ASAM ) service. Satellite N/E. Image backdrop: MODIS copyright NASA. Vector data: Europa Technologies Inc., US Government. Map

  7. Subglacial lake matters: piracy on a divide between thawed and frozen bed

    NASA Astrophysics Data System (ADS)

    Carter, S. P.; Bougamont, M. H.; Christoffersen, P.; Fricker, H. A.; Lipscomb, W. H.; Price, S. F.

    2011-12-01

    The two most populated active subglacial lake districts in Antarctica, upper Kamb Ice Stream and lower Whillans Ice Stream, occur along boundaries between where temperature models predict net basal freezing and net basal accretion. This occurs in part due to a basal traction contrast, which creates a ridge in the ice surface and creates a pressure seal; this impedes the downstream movement of water until a subglacial lake flood occurs. Here we use a model for basal water routing, which incorporates subglacial floods and a realistic term for effective pressure, to explore the ability of these floods to provide water to areas of net basal accretion and thus maintain basal lubrication. We hypothesize that these floods can distribute sufficient water to most of the regions experiencing net basal freezing; the exception being those nearest to the lakes themselves, Discharge in these regions likely occurs via narrow subglacial conduits. Over time this will cause ice downstream of the dam to thicken and pre-flood lake levels to increase until water ultimately exits the lake via an alternate route i.e. water piracy. Once piracy occurs, water is no longer supplied along the former flowpath and ice stream shutdown accelerates. We conclude that the formation and quasi-periodic flooding of lakes at the basal melt/ basal freezing boundary is a critical process in accelerating ice stream shutdown.

  8. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    ;Table of Contents: Section I: The Regional Proliferation Challenge; Northeast Asia; The Middle East and North Africa; The Former Soviet Union: Russia, Ukrane, Kazakstan, And Belarus; South Asia; The International Threat: Dangers from Terrorism, Insurgencies, Civil Wars, And Organized Crime; Section II: Department of Defense Response; Technical Annex: Accessible Technologies; Glossary.

  9. Threat in dreams: an adaptation?

    PubMed

    Malcolm-Smith, Susan; Solms, Mark; Turnbull, Oliver; Tredoux, Colin

    2008-12-01

    Revonsuo's influential Threat Simulation Theory (TST) predicts that people exposed to survival threats will have more threat dreams, and evince enhanced responses to dream threats, compared to those living in relatively safe conditions. Participants in a high crime area (South Africa: n=208) differed significantly from participants in a low crime area (Wales, UK: n=116) in having greater recent exposure to a life-threatening event (chi([1,N=186])(2)=14.84, p<.00012). Contrary to TST's predictions, the SA participants reported significantly fewer threat dreams (chi([1,N=287])(2)=6.11, p<.0134), and did not differ from the Welsh participants in responses to dream threats (Fisher's Exact test, p=.2478). Overall, the incidence of threat in dreams was extremely low-less than 20% of dreams featured realistic survival threats. Escape from dream threats occurred in less than 2% of dreams. We conclude that this evidence contradicts key aspects of TST.

  10. Overview of the Distributed Mission Training Integrated Threat Environment project

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.; Santos, Eugene, Jr.

    1998-08-01

    The Joint Synthetic Battlespace (JSB) envisioned within the Department of Defense modeling and simulation master plan requires a distributed virtual environment (DVE) wide consistent threat environment to achieve a useful mission rehearsal, training, test and evaluation capability. To achieve this objective, all threats in the DVE must appear at compatible levels of fidelity to all the entities operating in the DVE and they must interact with human- operated and computer-controlled entities in a realistic fashion. Achieving this goal is not currently possible for two reasons. First, each primary aircraft simulator training system developer has created their own threat system and made their own modeling decisions to support a specific user for a select few predetermined conditions. This traditional threat simulation approach is expensive and leads to ongoing difficulties in maintaining threat currency as intelligence updates are made, new weapons are introduced and new theaters of operation are identified. Second, the threat system interaction on a distributed network must be coordinated. The individualized nature of current threat systems precludes the possibility of introducing coordinated threats. The Distributed Mission Training Integrated Threat Environment (DMTITE) project is developing an effective solution to these issues. The DMTITE project is identifying the requirements for a distributed threat environment and building a demonstrator DOD High Level Architecture compatible system that can provide realistic threats for pilots to train against. The DMTITE prototype will instantiate a variety of threats for use in distributed training scenarios, including surface threats, air threats, radars, and jamming systems. A key element of the system will be the provision of realistic behaviors for the threat systems. We based DMTITE on a general software design methodology and software architecture for computer-generated forces (CGFs) that naturally supports `variety

  11. Airborne Particulate Threat Assessment

    SciTech Connect

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  12. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

  13. Proliferation: Threat and Response

    DTIC Science & Technology

    1997-11-01

    the Gulf and helping to ensure access to a key source of oil - essential to China may choose not to sell certain technologies China’s expanding economy...Korean peninsula, and stability in this region are essential if economic NBC weapons present a significant threat to U.S. relations are to continue to...Organization United States. (KEDO) Arrange for delivery of heavy fuel oil to offset North’s energy loss. Finance and construct two light water reactors by

  14. New functions of the Drosophila rhomboid gene during embryonic and adult development are revealed by a novel genetic method, enhancer piracy.

    PubMed

    Noll, R; Sturtevant, M A; Gollapudi, R R; Bier, E

    1994-08-01

    Localized expression of the Drosophila rhomboid (rho) gene has been proposed to hyperactivate EGF-Receptor signaling in specific cells during development of the embryo and adult. In this report we use a novel transposon based genetic method, enhancer piracy, to drive ectopic expression of a rho cDNA transgene by endogenous genomic enhancers. Many enhancer piracy transposon-rho insertions cause dominant phenotypes, over half of which cannot be duplicated by ubiquitous expression of rho. Genetic interactions between various dominant enhancer piracy alleles and mutations in the EGF-R/RAS signaling pathway indicate that many of these novel phenotypes result from ectopic activation of EGF-R signaling. Patterned mis-expression of the rho cDNA transgene correlates in several cases with localized dominant enhancer piracy phenotypes. Enhancer piracy lines reveal an unanticipated role for rho in imaginal disc formation and provide the first evidence that mis-expression of rho is sufficient for converting entire intervein sectors into veins. Enhancer piracy may prove to be a general strategy for obtaining dominant alleles of a gene of interest in diverse insects, worms, plants, and potentially in vertebrates such as mice and fish.

  15. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  16. Nutritional immunity. Escape from bacterial iron piracy through rapid evolution of transferrin.

    PubMed

    Barber, Matthew F; Elde, Nels C

    2014-12-12

    Iron sequestration provides an innate defense, termed nutritional immunity, leading pathogens to scavenge iron from hosts. Although the molecular basis of this battle for iron is established, its potential as a force for evolution at host-pathogen interfaces is unknown. We show that the iron transport protein transferrin is engaged in ancient and ongoing evolutionary conflicts with TbpA, a transferrin surface receptor from bacteria. Single substitutions in transferrin at rapidly evolving sites reverse TbpA binding, providing a mechanism to counteract bacterial iron piracy among great apes. Furthermore, the C2 transferrin polymorphism in humans evades TbpA variants from Haemophilus influenzae, revealing a functional basis for standing genetic variation. These findings identify a central role for nutritional immunity in the persistent evolutionary conflicts between primates and bacterial pathogens.

  17. Molecular piracy: manipulation of the ubiquitin system by Kaposi's sarcoma-associated herpesvirus.

    PubMed

    Fujimuro, Masahiro; Hayward, S Diane; Yokosawa, Hideyoshi

    2007-01-01

    Ubiquitination, one of several post-translational protein modifications, plays a key role in the regulation of cellular events, including protein degradation, signal transduction, endocytosis, protein trafficking, apoptosis and immune responses. Ubiquitin attachment at the lysine residue of cellular factors acts as a signal for endocytosis and rapid degradation by the 26S proteasome. It has recently been observed that viruses, especially oncogenic herpesviruses, utilise molecular piracy by encoding their own proteins to interfere with regulation of cell signalling. Kaposi's sarcoma- associated herpesvirus (KSHV) manipulates the ubiquitin system to facilitate cell proliferation, anti-apoptosis and evasion from immunity. In this review, we will describe the strategies used by KSHV at distinct stages of the viral life-cycle to control the ubiquitin system and promote oncogenesis and viral persistence.

  18. Threats to international science

    NASA Astrophysics Data System (ADS)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  19. New global viral threats

    PubMed Central

    Erdem, Hakan; Ünal, Serhat

    2015-01-01

    Infectious diseases have caused great catastrophes in human history, as in the example of the plague, which wiped out half of the population in Europe in the 14th century. Ebola virus and H7N9 avian influenza virus are 2 lethal pathogens that we have encountered in the second decade of the 21st century. Ebola infection is currently being seen in West Africa, and H7N9 avian flu appears to have settled in Southeast Asia. This article focuses on the current situation and the future prospects of these potential infectious threats to mankind. PMID:25828274

  20. Ocean-sized threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    Jane Lubchenco, professor of marine biology and zoology at Oregon State University, and president-elect of the International Council for Science, said that scientists can do more than they currently are doing to clearly communicate to the public and to policy-makers those issues associated with the many ecological threats faced by the world's oceans. In doing so, scientists can overcome popularly-held misperceptions about the health of the world's oceans and thus, help protect the seas."Science," Lubchenco said, "has a huge role to play in informing [the public] what is happening and to guide the choice of solutions.

  1. Ocean-sized threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    Jane Lubchenco, professor of marine biology and zoology at Oregon State University, and president-elect of the International Council for Science, said that scientists can do more than they currently are doing to clearly communicate to the public and to policy-makers those issues associated with the many ecological threats faced by the world's oceans. In doing so, scientists can overcome popularly-held misperceptions about the health of the world's oceans and thus, help protect the seas.“Science,” Lubchenco said, “has a huge role to play in informing [the public] what is happening and to guide the choice of solutions.

  2. Addressing the insider threat

    SciTech Connect

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  3. Addressing the insider threat

    SciTech Connect

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  4. Categorizing threat : building and using a generic threat matrix.

    SciTech Connect

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  5. Intentional cargo disruption by nefarious means: Examining threats, systemic vulnerabilities and securitisation measures in complex global supply chains.

    PubMed

    McGreevy, Conor; Harrop, Wayne

    2015-01-01

    Global trade and commerce requires products to be securely contained and transferred in a timely way across great distances and between national boundaries. Throughout the process, cargo and containers are stored, handled and checked by a range of authorities and authorised agents. Intermodal transportation involves the use of container ships, planes, railway systems, land bridges, road networks and barges. This paper examines the the nefarious nature of intentional disruption and nefarious risks associated with the movement of cargo and container freight. The paper explores main threats, vulnerabilities and security measures relevant to significant intermodal transit risk issues such as theft, piracy, terrorism, contamination, counterfeiting and product tampering. Three risk and vulnerability models are examined and basic standards and regulations that are relevant to safe and secure transit of container goods across international supply networks are outlined.

  6. Threat processing: models and mechanisms.

    PubMed

    Bentz, Dorothée; Schiller, Daniela

    2015-01-01

    The experience of fear is closely linked to the survival of species. Fear can be conceptualized as a brain state that orchestrates defense reactions to threats. To avoid harm, an organism must be equipped with neural circuits that allow learning, detecting, and rapidly responding to threats. Past experience with threat can transform neutral stimuli present at the time of experience into learned threat-related stimuli via associative learning. Pavlovian threat conditioning is the central experimental paradigm to study associative learning. Once learned, these stimulus-response associations are not always expressed depending on context or new experiences with the conditioned stimuli. Neural circuits mediating threat learning have the inherent plasticity to adapt to changing environmental threats. Encounters devoid of danger pave the way for extinction or reconsolidation to occur. Extinction and reconsolidation can both lead to changes in the expression of threat-induced defense responses, but differ in stability and have a different neural basis. This review presents the behavioral models and the system-level neural mechanisms in animals and humans of threat learning and modulation.

  7. Lizard threat display handicaps endurance.

    PubMed Central

    Brandt, Y

    2003-01-01

    Honest-signalling theory asserts that threat displays reliably advertise attributes that influence fighting success. Endurance, as measured by treadmill performance, predicts the outcome of agonistic interactions among lizards. If threat displays in lizards function to advertise endurance capacity then variation in threat displays should correlate with endurance. I tested this prediction for the duration of threat posturing in male side-blotched lizards (Uta stansburiana) and examined whether threat displays act as quality handicaps, reliable signals that expend the attribute that is advertised. Individual variation in the duration of threat posturing correlated with endurance, while an experimental reduction of endurance diminished the duration of threat posturing. As expected of a quality handicap, endurance fell below baseline after display production. A restriction of aerobic metabolism can account for this effect. In threat posturing, lateral compression of the thorax may interfere with respiration or with circulation, limiting aerobic metabolism and causing a compensatory increase in anaerobic metabolism, thereby generating lactate and diminishing locomotor capacity. Concentrations of lactate measured after display production were higher than baseline, consistent with the proposed mechanism. By restricting aerobic metabolism, the threat posture can act as a quality handicap, simultaneously advertising and expending the endurance capacity of displaying lizards. PMID:12803896

  8. Thinking about threats: Memory and prospection in human threat management.

    PubMed

    Bulley, Adam; Henry, Julie D; Suddendorf, Thomas

    2017-03-01

    Humans have evolved mechanisms for the detection and management of possible threats in order to abate their negative consequences for fitness. Internally generated ('detached') cognition may have evolved in part because of its contributions to this broad function, but important questions remain about its role in threat management. In this article, we therefore present a taxonomy of threat-related internally generated cognition comprising episodic and semantic formats of memory and prospection. We address the proximate mechanisms of each of the capacities in this taxonomy, and discuss their respective contributions to adaptive threat management in humans. For instance, mental time travel empowers people to contemplate and learn from threats experienced long ago, as well as to plan for dangers that might arise in the distant future. However, despite their functional benefits, these thought processes are also central to contemporary anxiety disorders and may be a potent source of distress.

  9. Information fusion: telling the story (or threat narrative)

    NASA Astrophysics Data System (ADS)

    Fenstermacher, Laurie

    2014-06-01

    Today's operators face a "double whammy" - the need to process increasing amounts of information, including "Twitter-INT"1 (social information such as Facebook, You-Tube videos, blogs, Twitter) as well as the need to discern threat signatures in new security environments, including those in which the airspace is contested. To do this will require the Air Force to "fuse and leverage its vast capabilities in new ways."2 For starters, the integration of quantitative and qualitative information must be done in a way that preserves important contextual information since the goal increasingly is to identify and mitigate violence before it occurs. To do so requires a more nuanced understanding of the environment being sensed, including the human environment, ideally from the "emic" perspective; that is, from the perspective of that individual or group. This requires not only data and information that informs the understanding of how the individuals and/or groups see themselves and others (social identity) but also information on how that identity filters information in their environment which, in turn, shapes their behaviors.3 The goal is to piece together the individual and/or collective narratives regarding threat, the threat narrative, from various sources of information. Is there a threat? If so, what is it? What is motivating the threat? What is the intent of those who pose the threat and what are their capabilities and their vulnerabilities?4 This paper will describe preliminary investigations regarding the application of prototype hybrid information fusion method based on the threat narrative framework.

  10. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  11. Linking Stereotype Threat and Anxiety

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  12. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  13. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  14. Bomb Threat Assessments. Fact Sheet

    ERIC Educational Resources Information Center

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  15. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  16. Psychoanalysis and the nuclear threat

    SciTech Connect

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  17. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    PubMed

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought.

  18. Interspecies modulation of bacterial development through iron competition and siderophore piracy.

    PubMed

    Traxler, Matthew F; Seyedsayamdost, Mohammad R; Clardy, Jon; Kolter, Roberto

    2012-11-01

    While soil-dwelling actinomycetes are renowned for secreting natural products, little is known about the roles of these molecules in mediating actinomycete interactions. In a previous co-culture screen, we found that one actinomycete, Amycolatopsis sp. AA4, inhibited aerial hyphae formation in adjacent colonies of Streptomyces coelicolor. A siderophore, amychelin, mediated this developmental arrest. Here we present genetic evidence that confirms the role of the amc locus in the production of amychelin and in the inhibition of S. coelicolor development. We further characterize the Amycolatopsis sp. AA4 - S. coelicolor interaction by examining expression of developmental and iron acquisition genes over time in co-culture. Manipulation of iron availability and/or growth near Amycolatopsis sp. AA4 led to alterations in expression of the critical developmental gene bldN, and other key downstream genes in the S. coelicolor transcriptional cascade. In Amycolatopsis sp. AA4, siderophore genes were downregulated when grown near S. coelicolor, leading us to find that deferrioxamine E, produced by S. coelicolor, could be readily utilized by Amycolatopsis sp. AA4. Collectively these results suggest that competition for iron via siderophore piracy and species-specific siderophores can alter patterns of gene expression and morphological differentiation during actinomycete interactions.

  19. Managing biosecurity threats in China.

    PubMed

    Huang, Yanzhong

    2011-03-01

    Compared to the extensive literature on bioterrorism and biosecurity in the United States, less analysis has been conducted on similar challenges in China. This article seeks to fill this void by providing an integrated and updated assessment of 3 major biosecurity threats China faces: biowarfare, bioterrorism, and biocrimes. An analysis of China's biosecurity threats and biodefense building suggest varying levels of risk associated with each threat type. First, a direct bioweapons attack on China is highly unlikely, although the threat of biowarfare cannot be simply written off. Second, potential perpetrators of bioterrorism have capabilities at their disposal for carrying out such attacks. While terrorist organizations in China do not have a strong interest in bioterrorism, the limited state capability to counter such a threat may increase the risk in the future. Third, unlike the threats of biowarfare and bioterrorism, potential perpetrators of biocrimes have both incentives and capabilities, and biocrimes can produce reactions far out of proportion to the actual number of casualties. Despite the distinct biosecurity challenges it faces, China has yet to articulate a differentiated and coherent strategy to effectively tackle the challenges. Assessing different types of biosecurity threats in terms of degrees of risk not only provides greater analytical clarity but also has important implications for the strategies required to manage the risks.

  20. Defense Against Threat. Threat Recognition and Analysis Project

    DTIC Science & Technology

    1975-09-01

    effort has been mounted in dttta gathering and in threat evaluation. !t is an understandable reaction that individuals who have devoted whole...Here, the theoretical consideration appears that the urge to mount collective action In defense against threats must be expected to be directed through...ACTIVITIES INCOMPATIBLE WITH HIS DIPLOMATIC STATUS^HN MOUNTS DIPLOMATIC ATTACKS ON USA IN INDOCI!! NA+03SERVERS BELIEVE CHN WILL NOW

  1. Late Quaternary stream piracy and strath terrace formation along the Belle Fourche and lower Cheyenne Rivers, South Dakota and Wyoming

    USGS Publications Warehouse

    Stamm, John F.; Hendricks, Robert R.; Sawyer, J. Foster; Mahan, Shannon; Zaprowski, Brent J.; Geibel, Nicholas M.; Azzolini, David C.

    2013-01-01

    Stream piracy substantially affected the geomorphic evolution of the Missouri River watershed and drainages within, including the Little Missouri, Cheyenne, Belle Fourche, Bad, and White Rivers. The ancestral Cheyenne River eroded headward in an annular pattern around the eastern and southern Black Hills and pirated the headwaters of the ancestral Bad and White Rivers after ~ 660 ka. The headwaters of the ancestral Little Missouri River were pirated by the ancestral Belle Fourche River, a tributary to the Cheyenne River that currently drains much of the northern Black Hills. Optically stimulated luminescence (OSL) dating techniques were used to estimate the timing of this piracy event at ~ 22–21 ka. The geomorphic evolution of the Cheyenne and Belle Fourche Rivers is also expressed by regionally recognized strath terraces that include (from oldest to youngest) the Sturgis, Bear Butte, and Farmingdale terraces. Radiocarbon and OSL dates from fluvial deposits on these terraces indicate incision to the level of the Bear Butte terrace by ~ 63 ka, incision to the level of the Farmingdale terrace at ~ 40 ka, and incision to the level of the modern channel after ~ 12–9 ka. Similar dates of terrace incision have been reported for the Laramie and Wind River Ranges. Hypothesized causes of incision are the onset of colder climate during the middle Wisconsinan and the transition to the full-glacial climate of the late-Wisconsinan/Pinedale glaciation. Incision during the Holocene of the lower Cheyenne River is as much as ~ 80 m and is 3 to 4 times the magnitude of incision at ~ 63 ka and ~ 40 ka. The magnitude of incision during the Holocene might be due to a combined effect of three geomorphic processes acting in concert: glacial isostatic rebound in lower reaches (~ 40 m), a change from glacial to interglacial climate, and adjustments to increased watershed area resulting from piracy of the ancestral headwaters of the Little Missouri River.

  2. Late Quaternary stream piracy and strath terrace formation along the Belle Fourche and lower Cheyenne Rivers, South Dakota and Wyoming

    NASA Astrophysics Data System (ADS)

    Stamm, John F.; Hendricks, Robert R.; Sawyer, J. Foster; Mahan, Shannon A.; Zaprowski, Brent J.; Geibel, Nicholas M.; Azzolini, David C.

    2013-09-01

    Stream piracy substantially affected the geomorphic evolution of the Missouri River watershed and drainages within, including the Little Missouri, Cheyenne, Belle Fourche, Bad, and White Rivers. The ancestral Cheyenne River eroded headward in an annular pattern around the eastern and southern Black Hills and pirated the headwaters of the ancestral Bad and White Rivers after ~ 660 ka. The headwaters of the ancestral Little Missouri River were pirated by the ancestral Belle Fourche River, a tributary to the Cheyenne River that currently drains much of the northern Black Hills. Optically stimulated luminescence (OSL) dating techniques were used to estimate the timing of this piracy event at ~ 22-21 ka. The geomorphic evolution of the Cheyenne and Belle Fourche Rivers is also expressed by regionally recognized strath terraces that include (from oldest to youngest) the Sturgis, Bear Butte, and Farmingdale terraces. Radiocarbon and OSL dates from fluvial deposits on these terraces indicate incision to the level of the Bear Butte terrace by ~ 63 ka, incision to the level of the Farmingdale terrace at ~ 40 ka, and incision to the level of the modern channel after ~ 12-9 ka. Similar dates of terrace incision have been reported for the Laramie and Wind River Ranges. Hypothesized causes of incision are the onset of colder climate during the middle Wisconsinan and the transition to the full-glacial climate of the late-Wisconsinan/Pinedale glaciation. Incision during the Holocene of the lower Cheyenne River is as much as ~ 80 m and is 3 to 4 times the magnitude of incision at ~ 63 ka and ~ 40 ka. The magnitude of incision during the Holocene might be due to a combined effect of three geomorphic processes acting in concert: glacial isostatic rebound in lower reaches (~ 40 m), a change from glacial to interglacial climate, and adjustments to increased watershed area resulting from piracy of the ancestral headwaters of the Little Missouri River.

  3. Maritime Security: Fighting Piracy in the Gulf of Aden and Beyond (Heritage Special Report, Number 59, June 24, 2009)

    DTIC Science & Technology

    2009-06-24

    Legal agreements, including the January 2009 U.S.–Kenyan Memorandum of Understanding, offer the international community a viable method to deter and...effective measures. • Agreements such as the U.S.–Kenyan MOU offer the international community a viable method to deter and punish acts of piracy. 13...Support ship 0 0 0 0 1 Survey ship 2 0 0 0 0 Tanker- bitumen 0 0 0 0 1 Tanker-chemical product 49 56 43 35 52 Tanker-crude oil 42 17 22 9 25 Tanker-LNG

  4. Bomb Threat Becomes Real News.

    ERIC Educational Resources Information Center

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  5. Combating the Insider Cyber Threat

    SciTech Connect

    Greitzer, Frank L.; Moore, Andrew P.; Cappelli, Dawn M.; Andrews, Dee H.; Carroll, Lynn; Hull, Thomas D.

    2008-01-02

    This article represents a collaboration between PNNL, CERT/CMU, and AFRL that describes needs and related efforts by these institutions to develop technologies and approaches to counter cyber threats by insiders to informatin systems. The main focus of this article is on the need for effective training on insider threat to raise staff awareness and encourage organizations to adopt a more effective approach to identifying potential risks and take proactive steps to mitigate them.

  6. On NEO Threat Mitigation (Preprint)

    DTIC Science & Technology

    2007-10-15

    high level of authority. II. Threat Definition The threat posed by the impact of asteroids and comets with the Earth has been well publicized... asteroids , which spend most of their time within the Earth orbit but are crossing it. The rate of active comets dropping within the inner solar...extinction-class events, due to their significant mass but also their much higher kinetic energy compared to asteroids . Furthermore, comets are more likely

  7. Phycodnavirus Potassium Ion Channel Proteins Question the Virus Molecular Piracy Hypothesis

    PubMed Central

    Hamacher, Kay; Greiner, Timo; Ogata, Hiroyuki; Van Etten, James L.; Gebhardt, Manuela; Villarreal, Luis P.; Cosentino, Cristian; Moroni, Anna; Thiel, Gerhard

    2012-01-01

    Phycodnaviruses are large dsDNA, algal-infecting viruses that encode many genes with homologs in prokaryotes and eukaryotes. Among the viral gene products are the smallest proteins known to form functional K+ channels. To determine if these viral K+ channels are the product of molecular piracy from their hosts, we compared the sequences of the K+ channel pore modules from seven phycodnaviruses to the K+ channels from Chlorella variabilis and Ectocarpus siliculosus, whose genomes have recently been sequenced. C. variabilis is the host for two of the viruses PBCV-1 and NY-2A and E. siliculosus is the host for the virus EsV-1. Systematic phylogenetic analyses consistently indicate that the viral K+ channels are not related to any lineage of the host channel homologs and that they are more closely related to each other than to their host homologs. A consensus sequence of the viral channels resembles a protein of unknown function from a proteobacterium. However, the bacterial protein lacks the consensus motif of all K+ channels and it does not form a functional channel in yeast, suggesting that the viral channels did not come from a proteobacterium. Collectively, our results indicate that the viruses did not acquire their K+ channel-encoding genes from their current algal hosts by gene transfer; thus alternative explanations are required. One possibility is that the viral genes arose from ancient organisms, which served as their hosts before the viruses developed their current host specificity. Alternatively the viral proteins could be the origin of K+ channels in algae and perhaps even all cellular organisms. PMID:22685610

  8. Forensic age estimation in anti-piracy trials in Seychelles: Experiences and challenges faced.

    PubMed

    Gunawardena, S A; Liyanage, U A; Weeratna, J B; Mendis, N D N A; Perera, H J M; Jayasekara, R W; Fernando, R

    2017-01-01

    Forensic age estimation (FAE) was conducted using a multifactorial method on thirteen Somali detainees claiming juvenile status during the anti-piracy trials of the Seychelles Supreme Court in 2014/2015. A multidisciplinary team, comprising of four of the authors covering specialties in forensic medicine, forensic odontology and radiology, conducted the FAE using a five-stage protocol. Each detainee was interviewed with an interpreter and examined for disorders affecting dental/skeletal development and for assessment of genital development through Tanner staging. Dental maturity was assessed clinically and radiologically. Eruption stage was assessed using Olze et al. and mandibular third-molar maturity was assessed using Demirjian's classification. Skeletal maturity was assessed from hand-wrist X-rays according to Greulich & Pyle and from CT-clavicle according to Kellinghaus et al. and Schultz et al. Interpretation of findings was done using reference population data from similar ethnic and social backgrounds wherever possible. Final age-ranges were calculated by combining dental and clavicle maturity stages using the regression formula developed by Bassed et al. followed by a 10% correction factor. The team later testified on their findings under cross-examination. The protocol adopted by the authors increased the scientific validity of the findings and was useful in addressing cross-examination queries on exclusion of developmental disorders, ethnic/socioeconomic variability and maintaining chain of custody. Unforeseen jurisdictional and practical limitations were experienced but did not affect the outcome. Combining dental and clavicle developmental data provided the court with a much clearer picture on the likelihood of the detainees' juvenile status which emphasizes the importance of conducting more population studies using combinations of different developmental sites. The authors note that available reference data is mostly from affluent populations whereas

  9. Phycodnavirus potassium ion channel proteins question the virus molecular piracy hypothesis.

    PubMed

    Hamacher, Kay; Greiner, Timo; Ogata, Hiroyuki; Van Etten, James L; Gebhardt, Manuela; Villarreal, Luis P; Cosentino, Cristian; Moroni, Anna; Thiel, Gerhard

    2012-01-01

    Phycodnaviruses are large dsDNA, algal-infecting viruses that encode many genes with homologs in prokaryotes and eukaryotes. Among the viral gene products are the smallest proteins known to form functional K(+) channels. To determine if these viral K(+) channels are the product of molecular piracy from their hosts, we compared the sequences of the K(+) channel pore modules from seven phycodnaviruses to the K(+) channels from Chlorella variabilis and Ectocarpus siliculosus, whose genomes have recently been sequenced. C. variabilis is the host for two of the viruses PBCV-1 and NY-2A and E. siliculosus is the host for the virus EsV-1. Systematic phylogenetic analyses consistently indicate that the viral K(+) channels are not related to any lineage of the host channel homologs and that they are more closely related to each other than to their host homologs. A consensus sequence of the viral channels resembles a protein of unknown function from a proteobacterium. However, the bacterial protein lacks the consensus motif of all K(+) channels and it does not form a functional channel in yeast, suggesting that the viral channels did not come from a proteobacterium. Collectively, our results indicate that the viruses did not acquire their K(+) channel-encoding genes from their current algal hosts by gene transfer; thus alternative explanations are required. One possibility is that the viral genes arose from ancient organisms, which served as their hosts before the viruses developed their current host specificity. Alternatively the viral proteins could be the origin of K(+) channels in algae and perhaps even all cellular organisms.

  10. Bad Air For Children

    ERIC Educational Resources Information Center

    Kane, Dorothy Noyes

    1976-01-01

    Children are especially sensitive to air pollution and consequences to them maybe of longer duration than to adults. The effects of low-level pollution on children are the concern of this article. The need for research on the threat of air pollution to childrens' health is emphasized. (BT)

  11. Effect of slope failures on river-network pattern: A river piracy case study from the flysch belt of the Outer Western Carpathians

    NASA Astrophysics Data System (ADS)

    Baroň, Ivo; Bíl, Michal; Bábek, Ondřej; Smolková, Veronika; Pánek, Tomáš; Macur, Lukáš

    2014-06-01

    Landslides are important geomorphic agents in various mountainous settings. We document here a case of river piracy from the upper part of the Malá Brodská Valley in the Vsetínské Mts., Czech Republic (Rača Unit of the flysch Magura Group of Nappes, flysch belt of the Outer Western Carpathians) controlled by mass movement processes. Based on the field geological, geomorphological and geophysical data, we found out that the landslide accumulations pushed the more active river of out of two subparallel river channels with different erosion activity westwards and forced intensive lateral erosion towards the recently abandoned valley. Apart from the landslide processes, the presence of the N-striking fault, accentuated by higher flow rates of the eastern channel as a result of its larger catchment area, were the most critical factors of the river piracy. As a consequence of the river piracy, intensive retrograde erosion in the elbow of capture and also within the upper portion of the western catchment occurred. Deposits of two landslide dams document recent minimum erosion rates to be 18.8 mm.ky- 1 in the western (captured) catchment, and 3.6 mm.ky- 1 in the eastern catchment respectively. The maximum age of the river piracy is estimated to be of the late Glacial and/or the early Holocene.

  12. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  13. Comparative Environmental Threat Analysis: Three Case Studies.

    ERIC Educational Resources Information Center

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  14. Inhalation of 7.5% carbon dioxide increases threat processing in humans.

    PubMed

    Garner, Matthew; Attwood, Angela; Baldwin, David S; James, Alexandra; Munafò, Marcus R

    2011-07-01

    Inhalation of 7.5% CO(2) increases anxiety and autonomic arousal in humans, and elicits fear behavior in animals. However, it is not known whether CO(2) challenge in humans induces dysfunction in neurocognitive processes that characterize generalized anxiety, notably selective attention to environmental threat. Healthy volunteers completed an emotional antisaccade task in which they looked toward or away from (inhibited) negative and neutral stimuli during inhalation of 7.5% CO(2) and air. CO(2) inhalation increased anxiety, autonomic arousal, and erroneous eye movements toward threat on antisaccade trials. Autonomic response to CO(2) correlated with hypervigilance to threat (speed to initiate prosaccades) and reduced threat inhibition (increased orienting toward and slower orienting away from threat on antisaccade trials) independent of change in mood. Findings extend evidence that CO(2) triggers fear behavior in animals via direct innervation of a distributed fear network that mobilizes the detection of and allocation of processing resources toward environmental threat in humans.

  15. Computer-assisted threat evaluation

    NASA Astrophysics Data System (ADS)

    Bains, Jatin S.; Davies, Livingston

    2006-05-01

    The use of a CATE (Computer Assisted Threat Evaluation) System in the Maritime Domain lends itself technically and operationally to data exploitation thru the use of domain forensics and link analysis of fragmented information utilizing data prioritization and suspicion indicators for an aggressor's method of operation. The timely availability of threat mitigating actionable information is one of the key tools for success in the Global War On Terror (GWOT). The global supply chain is vulnerable to exploitation by nefarious individuals, governments, and terrorist organizations. For example, Figure 1 illustrates one of many potential methods that could be used to circumvent regulations limiting proliferation of WMDs.

  16. China’s Military Space Program: A Threat to the United States or a Peaceful Endeavor

    DTIC Science & Technology

    2012-02-15

    AIR WAR COLLEGE AIR UNIVERSITY CHINA’S MILITARY SPACE PROGRAM: A THREAT TO THE UNITED STATES OR A PEACEFUL ENDEAVOR...Biography Colonel Timothy Wulff is an Army intelligence officer assigned to the Air War College , Air University, Maxwell AFB, AL...use of space. The U.S will employ a variety of measures to help assure the use of space for all responsible parties , and, consistent with the

  17. Stream capture and piracy recorded by provenance in fluvial fan strata

    NASA Astrophysics Data System (ADS)

    Mikesell, Leslie R.; Weissmann, Gary S.; Karachewski, John A.

    2010-03-01

    Stream capture and piracy in tectonically active regions have been described in geomorphic systems worldwide; however, few studies show the influence stream capture has on the rock record. We present an analysis of fluvial fan stratigraphy that developed as a result of multiple stream capture events, building a complex stratigraphic succession beneath the Lawrence Livermore National Laboratory (LLNL), California. The LLNL site is located in the southeast portion of the tectonically active Livermore Basin, a transpressional basin in the California Coast Ranges. Geomorphic evidence for this stream capture include: (1) the Arroyo Seco enters the basin from the south through an uplifted fault block, (2) south of this fault block lies an abandoned Arroyo Seco fluvial fan, (3) north of the fault block, in the Livermore Basin, Arroyo Seco built a 7-km 2 fluvial fan, apparently forcing the Arroyo Las Positas, a smaller stream that enters the basin from the east, northward around the Arroyo Seco fan, and (4) a knickpoint exists near the point of capture on Arroyo Seco. Stratigraphic evidence reflecting this shift in the Arroyo Seco position into the Livermore Basin was evaluated through a provenance study of 215 gravel units from 34 boreholes spaced evenly over the 2.6 km 2 LLNL site. The Arroyo Seco derives its sediment from both the Jurassic-Cretaceous Franciscan Assemblage and the Altamont Hills (which are comprised of Mesozoic Great Valley Group and Tertiary continental sediments). The Arroyo Las Positas drains only the Altamont Hills and thus lacks the Franciscan Assemblage-derived clasts. The origin of the individual gravel units was determined by the percentage of Franciscan Assemblage indicator pebbles (red chert, green chert and blueschist) in the samples. Through this analysis, we determined that high-percentage Franciscan Assemblage-derived clasts were present below a depth of approximately 35 m below the surface, low-percentage Franciscan Assemblage

  18. Cyber Threats to Nuclear Infrastructures

    SciTech Connect

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  19. Parking garage threats and countermeasures.

    PubMed

    Clark, Sam

    2004-01-01

    Preventing and dealing with crime in hospital parking facilities poses a serious challenge to administration and security. Multiple methods to effectively combat the threats are described by the author, but their implementation depends on how seriously a healthcare organization views its responsibility to provide a safe and secure environment for its staff, patients and visitors.

  20. Bomb Threats Taking Financial Toll

    ERIC Educational Resources Information Center

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  1. Learning to Get Ahead: Why Organizational Learning is Critical in Combating the Improvised Explosive Device Threat

    DTIC Science & Technology

    2009-04-01

    AU/ACSC/9797/AY09 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY LEARNING TO GET AHEAD: WHY ORGANIZATIONAL LEARNING IS CRITICAL IN COMBATING THE...4. TITLE AND SUBTITLE Learning to Get Ahead: Why Organizational Learning is Critical in Combating the Improvised Explosive Device Threat 5a...9 ORGANIZATIONAL LEARNING ..............................................................................................11

  2. Environmental degradation and environmental threats in China.

    PubMed

    Wang, Ying

    2004-01-01

    The article presents a review of environmental degradation and its threats in China. Air pollution, water pollution, deforestation, soil degradation, sand depositing in dams, decaying urban infrastructure, and more and more hazards such as floods, landslides and soil erosion are major consequences of environmental degradation and are making tremendous loss both in life and property. Through investigation, the author found that poor air quality in the large cities; water pollution in the downstream of many rivers; the multiple problems of many mining areas; lack of access to fresh water; decaying sewage systems; and the disastrous impact of these environmental degradations on public health and agricultural products in many provinces is rather serious. Relationship of environmental degradation and natural hazards is close; more attention should be put in environmental degradation that may surpass economy progress if the trend continues. It is therefore imperative that Chinese government undertake a series of prudent actions now that will enable to be in the best possible position when the current environmental crisis ultimately passes.

  3. Zika Still a Threat During Winter Months

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_162518.html Zika Still a Threat During Winter Months Public health ... doesn't necessarily mean the end of the Zika threat in the United States, a public health ...

  4. Defeating the Modern Asymmetric Threat

    DTIC Science & Technology

    2002-06-01

    prolific use of suicide bombers by the LTTE: one strategic, one operational, one psychological and one religious. Chapter V conducts an analysis of...and responsive government) are the applicable variables in defeating the modern asymmetric threat, even those that employ suicide bombers. I...future. 15. NUMBER OF PAGES 171 14. SUBJECT TERMS Sri Lanka, LTTE, Ethnic Conflict, Asymmetry, Suicide Terrorism, Foreign Internal Defense

  5. Unintentional Insider Threats: Social Engineering

    DTIC Science & Technology

    2014-01-01

    sensitive information posted publicly on a website, mishandled, or sent to the wrong party via email, fax, or mail • UIT- HACK , or malicious code (UIT... HACKing , malware/spyware)—an outsider’s electronic entry acquired through social engineering (e.g., phishing email attack, planted or unauthorized USB...with PHYS, 28% with PORT, and 17% with UIT- HACK . With nearly half of the incidents falling in the DISC 4 We use the term threat vector, instead

  6. National Strategy, Future Threats and Defense Spending

    DTIC Science & Technology

    1992-06-05

    AD-A256 884 NATIONAL STRATEGY, FUTURE THREATS AND DEFENSE SPENDING A thesis presented to the Faculty of the U.S. Army Command and General Staff...Jun 92 4. TITLE AND SUBTITLE S. FUNDING NUMBERS National Strategy, Future Threats and Defense Spending 6. AUTHOR(S) MAJ Daniel M. Gerstein, USA 7...Future Threats, Defense Spending , 192 Regional Threats 16. PRICE COOE 17. SECURITY CLASSIFICATION 118. SECURITY CLASSIFICATION 19. SECURITY

  7. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  8. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  9. Evaluation of a landscape evolution model to simulate stream piracies: Insights from multivariable numerical tests using the example of the Meuse basin, France

    NASA Astrophysics Data System (ADS)

    Benaïchouche, Abed; Stab, Olivier; Tessier, Bruno; Cojan, Isabelle

    2016-01-01

    In landscapes dominated by fluvial erosion, the landscape morphology is closely related to the hydrographic network system. In this paper, we investigate the hydrographic network reorganization caused by a headward piracy mechanism between two drainage basins in France, the Meuse and the Moselle. Several piracies occurred in the Meuse basin during the past one million years, and the basin's current characteristics are favorable to new piracies by the Moselle river network. This study evaluates the consequences over the next several million years of a relative lowering of the Moselle River (and thus of its basin) with respect to the Meuse River. The problem is addressed with a numerical modeling approach (landscape evolution model, hereafter LEM) that requires empirical determinations of parameters and threshold values. Classically, fitting of the parameters is based on analysis of the relationship between the slope and the drainage area and is conducted under the hypothesis of equilibrium. Application of this conventional approach to the capture issue yields incomplete results that have been consolidated by a parametric sensitivity analysis. The LEM equations give a six-dimensional parameter space that was explored with over 15,000 simulations using the landscape evolution model GOLEM. The results demonstrate that stream piracies occur in only four locations in the studied reach near the city of Toul. The locations are mainly controlled by the local topography and are model-independent. Nevertheless, the chronology of the captures depends on two parameters: the river concavity (given by the fluvial advection equation) and the hillslope erosion factor. Thus, the simulations lead to three different scenarios that are explained by a phenomenon of exclusion or a string of events.

  10. Stereotype threat and female communication styles.

    PubMed

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  11. Threats to Networked RFID Systems

    NASA Astrophysics Data System (ADS)

    Mitrokotsa, Aikaterini; Beye, Michael; Peris-Lopez, Pedro

    RFID technology is an area currently undergoing active development. An issue, which has received a lot of attention, is the security risks that arise due to the inherent vulnerabilities of RFID technology. Most of this attention, however, has focused on related privacy issues. The goal of this chapter is to present a more global overview of RFID threats. This can not only help experts perform risk analyses of RFID systems but also increase awareness and understanding of RFID security issues for non-experts. We use clearly defined and widely accepted concepts from both the RFID area and classical risk analysis to structure this overview.

  12. [Modern threat of Ebola virus].

    PubMed

    Płusa, Tadeusz

    2014-11-01

    Since the detection of Ebola virus in 1976. recorded 13 major epidemics in Africa. The current threat in Guinea, Liberia and Sierra Leone absorbs another victims and threatened pandemic. Picture of the disease is initially very non-characteristic (influenza-like symptoms) and quickly leads to dehydration, shock and disseminated intravascular coagulation syndrome, which is responsible for high mortality. Lack of effective antibiotic therapy and vaccine hampers the existing situation. For this reason, there is an absolute necessity to introduce regimes sanitation, quarantine at the suspects and maintain the highest safety measures for emergency responders. Developed procedures require absolute compliance.

  13. Rating threat mitigators: faith in experts, governments, and individuals themselves to create a safer world.

    PubMed

    O'Connor, R E; Bord, R J; Fisher, A

    1998-10-01

    This research explores public judgments about the threat-reducing potential of experts, individual behavior, and government spending. The data are responses of a national sample of 1225 to mail surveys that include measures of several dimensions of public judgments about violent crime, automobile accidents, hazardous chemical waste, air pollution, water pollution, global warming, AIDS, heart disease, and cancer. Beliefs about who can best mitigate threats are specific to classes of threats. In general, there is little faith that experts can do much about violent crime and automobile accidents, moderate faith in their ability to address problems of global warming, and greater expectations for expert solutions to the remaining threats. People judge individual behavior as effective in reducing the threats of violent crime, AIDS, heart disease, and automobile accidents but less so for the remaining threats. Faith in more government spending is highest for AIDS and the other two health items, lowest for the trio of violent crime, automobile accidents, and global warming, and moderate for the remaining threats. For most threats, people are not distributed at the extremes in judging mitigators. Strong attitudinal and demographic cleavages are also lacking, although some interesting relationships occur. This relative lack of sharp cleavages and the generally moderate opinion indicate ample opportunity for public education and risk communication.

  14. Threat of resource loss: The role of self-regulation in adaptive task performance.

    PubMed

    Niessen, Cornelia; Jimmieson, Nerina L

    2016-03-01

    Changes at work are often accompanied with the threat of, or actual, resource loss. Through an experiment, we investigated the detrimental effect of the threat of resource loss on adaptive task performance. Self-regulation (i.e., task focus and emotion control) was hypothesized to buffer the negative relationship between the threat of resource loss and adaptive task performance. Adaptation was conceptualized as relearning after a change in task execution rules. Threat of resource loss was manipulated for 100 participants undertaking an air traffic control task. Using discontinuous growth curve modeling, 2 kinds of adaptation--transition adaptation and reacquisition adaptation--were differentiated. The results showed that individuals who experienced the threat of resource loss had a stronger drop in performance (less transition adaptation) and a subsequent slower recovery (less reacquisition adaptation) compared with the control group who experienced no threat. Emotion control (but not task focus) moderated the relationship between the threat of resource loss and transition adaptation. In this respect, individuals who felt threatened but regulated their emotions performed better immediately after the task change (but not later on) compared with those individuals who felt threatened and did not regulate their emotions as well. However, later on, relearning (reacquisition adaptation) under the threat of resource loss was facilitated when individuals concentrated on the task at hand.

  15. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    PubMed

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  16. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    PubMed Central

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  17. 1990 Clean Air Act Amendment Summary: Title V

    EPA Pesticide Factsheets

    In 1989, President George W. Bush proposed legislation designed to curb three major threats to the environment and public health: acid rain, urban air pollution, and toxic air emissions. The proposal also called for establishing a national permits program.

  18. Countering the Nuclear Terrorist Threat

    SciTech Connect

    Vantine, H C

    2002-10-04

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  19. Effect of evaluation threat on procrastination behavior.

    PubMed

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  20. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald

    2016-02-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  1. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, L.; Pennock, D. J.; McKenzie, N. J.; Badraoui, M.; Chude, V.; Baptista, I.; Mamo, T.; Yemefack, M.; Singh Aulakh, M.; Yagi, K.; Hong, S. Young; Vijarnsorn, P.; Zhang, G.-L.; Arrouays, D.; Black, H.; Krasilnikov, P.; Sobocká, J.; Alegre, J.; Henriquez, C. R.; Mendonça-Santos, M. L.; Taboada, M.; Espinosa-Victoria, D.; AlShankiti, A.; AlaviPanah, S. K.; Elsheikh, E. A. E.; Hempel, J.; Camps Arbestain, M.; Nachtergaele, F.; Vargas, R.

    2015-12-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecure among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the SWSR report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  2. Parasite threat to panda conservation.

    PubMed

    Zhang, Jin-Shuo; Daszak, Peter; Huang, Hua-Li; Yang, Guang-You; Kilpatrick, A Marm; Zhang, Shuyi

    2008-03-01

    The giant panda is a global symbol of wildlife conservation that is threatened by historic and current habitat loss. Despite a great deal of research on the physiology, reproductive biology, and diet of pandas in the wild and in captivity, there is little information on wild panda mortality. Here we integrate previously unavailable data on the mortality of wild pandas. We report on three recent phases of panda mortality: deaths due to bamboo flowering in the 1970s and 1980s, surprisingly extensive poaching in the 1980s and 1990s, and a parasitic infection over the past few years. Our analyses suggest that the current most significant threat to wild panda survival is disease due to extraintestinal migration (visceral larval migrans) by an ascarid nematode. We demonstrate that the probability of death of wild pandas being caused by this disease increased significantly between 1971 and 2005 and discuss the possible factors leading to the emergence of this disease.

  3. Insider Threat Mitigation Workshop Instructional Materials

    SciTech Connect

    Gibbs, Philip; Larsen, Robert; O'Brien, Mike; Rodriquez, Jose

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  4. Guided Standoff Weapons: A Threat to Expeditionary Air Power

    DTIC Science & Technology

    2006-09-01

    it (or the components that make it up) weighs from 11 to 44 pounds (five to 20 kilograms), portable if it weighs from 46.2 to 88 pounds ( 21 to 40...MONITORING AGENCY REPORT NUMBER 11 . SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the official... 11 A. MODELING THE PROBLEM

  5. Heuristic Classification in a Simulated Air Threat Task

    DTIC Science & Technology

    2005-06-01

    his deep gratitude to Andrea Hawton, Tonya Hendriks, Elaine Maceda, and Wendy Sullivan- Kwantes for their invaluable assistance in conducting the...McCreary 1 - Keith Hendy 1 - Justin Hollands 1 - Lochlan Magee 1 - Stuart Grant 1 - Peter Kwantes 1 - Walter Dyck 1 - Jocelyn Keillor 1 - Sharon

  6. DOE site-specific threat assessment

    SciTech Connect

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-07-12

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs.

  7. Autonomous Realtime Threat-Hunting Robot (ARTHR

    ScienceCinema

    INL

    2016-07-12

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  8. Autonomous Realtime Threat-Hunting Robot (ARTHR

    SciTech Connect

    INL

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  9. Clean Air Act Requirements and History

    EPA Pesticide Factsheets

    In 1970 congress designed the Clean Air Act to combat a variety of air pollution problems, and to tackle emerging pollution threats such as public health, national welfare, toxic air pollutants, acid rain, protection of the ozone layer, and regional haze.

  10. Capacity Building as an Answer to Piracy in the Horn of Africa

    DTIC Science & Technology

    2011-06-01

    employment of cutting edge technological assets, i.e tethered aerostat radar sensors, UAVs and picosatellites. The economic and technical feasibility of...cutting edge technological assets, i.e tethered aerostat radar sensors, UAVs and picosatellites. The economic and technical feasibility of the...This air monitoring system would primarily consist of tethered aerostats with embedded radar sensors, suitable for maritime domain surveillance

  11. Attacking the Cruise Missile Threat

    DTIC Science & Technology

    2010-07-26

    Joint Tactical Information Distribution System, or JTIDS , net- work. JLENS transmitted the full air picture, including a number of tar- gets that had not...been reported before because the surface-based sensors did not have the capability to send track messages over the JTIDS network to Patriot, THAAD

  12. Inferring Threat Assessment Strategies in Simulated Antiair Warfare (AAW) Operations

    DTIC Science & Technology

    1984-07-01

    15, AD-A102 725, NPRDC-TR-82--21, AD-A109 993 , NPRDC-TR-84-39, AD~8082 702L and NPRDC-TN--S2-26. DE (23) *Threat evaluation, ^Decision making, *Air...Tech. Rep. 82-21). San Diego: Ni^ Personnel Research and Development Center, January 1982. (AD-A109 993 ) Kelly, R. T., Greitzer, F. L...evaluation. Journal of Applied Psychologv. 1967. 51. 305-310. RCA Government Systems Division. DDG 51 human engineering desien approach document

  13. Threat Theory: A Model for Forecasting the Threat Environment of the Future

    DTIC Science & Technology

    1993-05-14

    AD-A2 7 4 021 / Threat Theory: A Model for Forecasting the Threat Environment of the Future A Monograph by Lieutenant Colonel Larry D. Bruns Military...5. FUNDING NUMBERS THREAT THEORY. A MODEL FOR FORECASTING THREAT ENVIRONMENT OF THE FUTURE 6. AUTHOR(S) LTC LARRY D. BRUNS, USA 7. PERFORMING...PRICE CODE FORCE DEVELOPMENT 17. SECURITY CLASSIFICATION II8. SECURITY CLASSIFICATION 19. SECURITY CL.ASSIFICATION 20. LIMITATION Of ABSTRACT OF REPORT

  14. Repeated threat (without harm) in a living environment potentiates defensive behavior.

    PubMed

    Kim, D J; Anderson, B J

    2015-02-15

    Children exposed to neighborhood violence have higher rates of aggression, but it is unclear whether aggression is associated with threat, harm or the combination of factors. All animals, including humans, experience threat as they leave the safety of home and risk harm to gather resources (foraging). To better understand how selective environmental variables drive behavioral tendencies, we developed a semi-naturalistic living environment that includes the need to navigate across space to obtain resources. Rats were housed for three weeks in two tub cages, one with food and the other with water, both consistently available, but separated by a 91 cm long tunnel. After habituating for three days, half the rats (threat stress condition) received unpredictable threats (simultaneous puff of air with ferret dander, abrupt flash of light, and an abrupt sound) when crossing the central position of the tunnel (random order with p=0.25) for 21 days. During the manipulation, the threat stress rats crossed the tunnel less and exhibited risk assessment behaviors. After cessation of the treatment conditions, the threat stress group spent more time burying a rag with ferret dander odor and was more likely to bury, and spent more time burying a highly novel stimulus. There were no group differences in symptoms of depression, avoidance, or exploration. The results suggest that repeated threats without harm increase pre-emptive defense behaviors, a form of active coping, without affecting passive forms of coping.

  15. Shades of Threat: Racial Identity as a Moderator of Stereotype Threat

    ERIC Educational Resources Information Center

    Davis, Claytie, III; Aronson, Joshua; Salinas, Moises

    2006-01-01

    This study investigated Black racial identity attitudes as a moderator of intellectual performance in potentially stereotype threatening situations. Ninety-eight African American students were randomly assigned to one of three stereotype threatening conditions: low threat, medium threat, or high threat. Analyses confirmed a stereotype threat…

  16. The artificial heart's threat to others.

    PubMed

    Jonsen, A R

    1986-02-01

    A member of the two federal advisory panels on artificial hearts reflects that the nuclear-powered artificial heart, had it been developed, would have posed a physical threat to others. Today's artificial heart poses a different threat. Because of the high costs, many people may be deprived of access to other forms of medical care and other social goods.

  17. Keeping Schools Safe through Threat Assessment

    ERIC Educational Resources Information Center

    Barton, Rhonda

    2008-01-01

    This article illustrates how effective a threat assessment program like the Mid-Valley Student Threat Assessment (STAT) program can be in dealing with violent and threatening students. STAT is a a regional system that draws together resources from schools, mental health agencies, law enforcement bureaus, and other youth-serving organizations in…

  18. Perception of the Threat of Terrorism.

    PubMed

    Cohen-Louck, Keren

    2016-04-28

    In light of the tense and ongoing security situation in Israel, one important issue that needs to be analyzed and understood is the perception of terrorism threats. Most studies focused mainly on the psychological implications of terrorist acts; this study examines the complexity of the manner in which the individual perceives the threat of terrorism. In all, 40 Israeli adults (22 women and 18 men) were interviewed using semistructured in-depth interviews. Qualitative analysis indicates that the components of the perception of terrorism that construct the evaluation and subjective perception of the participants are as follows: (a) perception of control, which is a feeling of loss of control and helplessness due to uncertainty, inability to predict threats, and the vagueness of the threat; (b) perception of vulnerability to the threat, such as a feeling of vulnerability to and potential victimization by terrorism; and (c) perception of fear of terrorism that includes responses of fear, anxiety, feeling of danger, and emotional distress. In addition, gender differences were found in the analysis. The findings of this study help gain a better understanding as to how people perceive the threat of terrorism. The findings also enable an understanding of the complexity of living under ongoing terrorism threats and may assist in understanding how citizens cope with and adjust to this threat.

  19. Bombs and Bomb Threats in the School

    ERIC Educational Resources Information Center

    Starkey, David J.; Starkey, John D.

    1977-01-01

    Bombs and the threat of bombing can leave school personnel faced by an explosive hazard without knowledge of what to do. Therefore, a preplanned response is necessary. Discusses four major stages of dealing with bombs and bomb threats. (Author/RK)

  20. Bomb Threats and Bomb Search Techniques.

    ERIC Educational Resources Information Center

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  1. The Smallpox Threat: The School Nurse's Role

    ERIC Educational Resources Information Center

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  2. The Nature of the Bioterrorism Threat

    SciTech Connect

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  3. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Direct threat. 35.139 Section 35.139 Judicial Administration DEPARTMENT OF JUSTICE NONDISCRIMINATION ON THE BASIS OF DISABILITY IN STATE AND LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require...

  4. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Direct threat. 35.139 Section 35.139 Judicial Administration DEPARTMENT OF JUSTICE NONDISCRIMINATION ON THE BASIS OF DISABILITY IN STATE AND LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require...

  5. High Power Electromagnetic (HPEM) Threat Analysis

    DTIC Science & Technology

    2008-04-01

    EMERGING THREATS ...... 13 HEMP coupling characteristics ............................................................................... 13 High power...microwave (HPEM) coupling characteristics ..................................... 16 High power microwave: local protective measures...ncy (W1 Figure 22. Various bands summarizing EM threats. HEMP coupling characteristics In the early 1960’s, researchers proposed a theory that a high

  6. How you perceive threat determines your behavior

    PubMed Central

    Fernandes, Orlando; Portugal, Liana C. L.; Alves, Rita C. S.; Campagnoli, Rafaela R.; Mocaiber, Izabela; David, Isabel P. A.; Erthal, Fátima C. S.; Volchan, Eliane; de Oliveira, Leticia; Pereira, Mirtes G.

    2013-01-01

    The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT) paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed toward the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during directed toward threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, directed away threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by threat stimuli directed toward the observer. In sum, our data support the concept that emotions are indeed action tendencies. PMID:24115925

  7. Security threats categories in healthcare information systems.

    PubMed

    Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini

    2010-09-01

    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.

  8. In Brief: Forecasting meningitis threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  9. Nuclear threats from small states

    SciTech Connect

    Kahan, J.H.

    1994-06-13

    What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one or more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.

  10. Bioterriorism: from threat to reality.

    PubMed

    Atlas, Ronald M

    2002-01-01

    The fears and predictions of attacks with biological weapons, which were increasing at the close of the twentieth century, were transformed into reality not long after September 11, 2001, when several anthrax-laden letters were sent through the U.S. postal system. The attack challenged our medical preparedness and scientific understanding of the epidemiology of biothreat agents. It is fortunate that this was not a massive aerosol release that could have exposed hundreds of thousands. Rapid diagnoses and medical treatments limited casualties and increased survival rates, but tragically some individuals died of inhalational anthrax. Even as physicians tested new treatment regimes and scientists employed new ways of detecting anthrax and decontaminating the mail, new predictions were made for potentially even more devastating attacks with anthrax, smallpox, plague, tularemia, botulism, or hemorrhagic fever viruses. Fear gripped the nation. Law enforcement sought to find the villain(s) who sent the anthrax letters and to deter future bioterrorist attacks. The biomedical community began to seek new ways of protecting against such future threats of bioterrorism.

  11. Stereotype threat prevents perceptual learning.

    PubMed

    Rydell, Robert J; Shiffrin, Richard M; Boucher, Kathryn L; Van Loo, Katie; Rydell, Michael T

    2010-08-10

    Stereotype threat (ST) refers to a situation in which a member of a group fears that her or his performance will validate an existing negative performance stereotype, causing a decrease in performance. For example, reminding women of the stereotype "women are bad at math" causes them to perform more poorly on math questions from the SAT and GRE. Performance deficits can be of several types and be produced by several mechanisms. We show that ST prevents perceptual learning, defined in our task as an increasing rate of search for a target Chinese character in a display of such characters. Displays contained two or four characters and half of these contained a target. Search rate increased across a session of training for a control group of women, but not women under ST. Speeding of search is typically explained in terms of learned "popout" (automatic attraction of attention to a target). Did women under ST learn popout but fail to express it? Following training, the women were shown two colored squares and asked to choose the one with the greater color saturation. Superimposed on the squares were task-irrelevant Chinese characters. For women not trained under ST, the presence of a trained target on one square slowed responding, indicating that training had caused the learning of an attention response to targets. Women trained under ST showed no slowing, indicating that they had not learned such an attention response.

  12. Pattern-Based Design of Insider Threat Programs

    DTIC Science & Technology

    2014-12-01

    Insider Threat Mitigation Pattern Language 2 3 Using the Insider Threat Mitigation Pattern...Language 5 4 Conclusion 10 Appendix A: Simple Insider Threat Mitigation Pattern Domain Ontology 11 Appendix B: Insider Threat Mitigation Pattern...Thumbnail Sketches 13 References/Bibliography 18 CMU/SEI-2014-TN-024 | ii List of Figures Figure 1: Preliminary Insider Threat Mitigation

  13. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    PubMed

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat.

  14. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  15. Emerging oomycete threats to plants and animals.

    PubMed

    Derevnina, Lida; Petre, Benjamin; Kellner, Ronny; Dagdas, Yasin F; Sarowar, Mohammad Nasif; Giannakopoulou, Artemis; De la Concepcion, Juan Carlos; Chaparro-Garcia, Angela; Pennington, Helen G; van West, Pieter; Kamoun, Sophien

    2016-12-05

    Oomycetes, or water moulds, are fungal-like organisms phylogenetically related to algae. They cause devastating diseases in both plants and animals. Here, we describe seven oomycete species that are emerging or re-emerging threats to agriculture, horticulture, aquaculture and natural ecosystems. They include the plant pathogens Phytophthora infestans, Phytophthora palmivora, Phytophthora ramorum, Plasmopara obducens, and the animal pathogens Aphanomyces invadans, Saprolegnia parasitica and Halioticida noduliformans For each species, we describe its pathology, importance and impact, discuss why it is an emerging threat and briefly review current research activities.This article is part of the themed issue 'Tackling emerging fungal threats to animal health, food security and ecosystem resilience'.

  16. Vibrational spectroscopy standoff detection of threat chemicals

    NASA Astrophysics Data System (ADS)

    Ortiz-Rivera, William; Pacheco-Londoño, Leonardo C.; Castro-Suarez, John R.; Felix-Rivera, Hilsamar; Hernandez-Rivera, Samuel P.

    2011-06-01

    Spectroscopy based standoff detection systems: Raman and FTIR have been tested for detection of threat chemicals, including highly energetic materials, homemade explosives, explosives formulations and high explosives mixtures. Other threat chemicals studied included toxic industrial compounds (TIC) and chemical agent simulants. Microorganisms and biological threat agent simulants have also been detected at standoff distances. Open Path FTIR has been used to detect vapors and chemicals deposited on metal surfaces at μg/cm2 levels at distances as far as 30 m in active mode and 60 m in passive mode. In the case of Raman telescope, standoff distances for acetonitrile and ammonium nitrate were 140 m.

  17. Insider threat to secure facilities: data analysis

    SciTech Connect

    Not Available

    1980-05-09

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

  18. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    SciTech Connect

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  19. Identity threat and stigma in cancer patients

    PubMed Central

    Marziliano, Allison; Moyer, Anne

    2014-01-01

    Cancer stigma has undergone an important transformation in recent decades. In general, this disease no longer fits squarely into Goffman’s classic taxonomy of stigmatized conditions. This review will demonstrate that, with important adaptations, an identity-threat model of stigma can be used to organize cancer stigma research post-Goffman. This adapted model postulates that one’s personal attributions, responses to situational threat, and disease/treatment characteristics can be used to predict identity threat and well-being of individuals with cancer. Implications for further research and clinical practice are discussed. PMID:28070343

  20. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    PubMed Central

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Oehlhof, Marissa Wagner; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants’ mean age was 23.6 (SD 10.1; range 18–64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals’ susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes’ impact on cognitive and behavioral outcomes. PMID:23736227

  1. Acid Rain: The Silent Environmental Threat.

    ERIC Educational Resources Information Center

    Zmud, Mia

    1992-01-01

    Describes the silent environmental threat posed by acid rain. Caused mainly by manmade pollutants, acid rain damages water and trees, decreases visibility, corrodes monuments, and threatens public health. The article includes guidelines for action. (SM)

  2. Need threat can motivate performance after ostracism.

    PubMed

    Jamieson, Jeremy P; Harkins, Stephen G; Williams, Kipling D

    2010-05-01

    Ostracism threatens fundamental needs of belonging, self-esteem, control, and meaningful existence, which should motivate participants to respond to this threat. However, research has yet to examine the role of need threat in producing motivation after ostracism. In the current work, participants completed a "cognitive ability" (antisaccade) task following Cyberball-induced ostracism or inclusion. In two experiments, it was found that when ostracized, participants do not see antisaccade performance as a means of responding to the concerns produced by need threat; they respond only to the social threat, leading to worse performance than included participants (Experiments 1 and 2). However, when participants see an avenue of response (the Cyberball players can compare antisaccade performances), ostracized participants outperform included participants (Experiment 2). Moreover, this effect was mediated by the need for belonging, suggesting that ostracized participants were motivated to elevate their inclusionary status by demonstrating their worth on the cognitive ability task.

  3. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    ScienceCinema

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2016-07-12

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  4. Childhood maltreatment and threats with weapons.

    PubMed

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender

    2009-11-01

    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life.

  5. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    SciTech Connect

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  6. Advanced Insider Threat Mitigation Workshop Instructional Materials

    SciTech Connect

    Gibbs, Philip; Larsen, Robert; O'Brien, Mike; Edmunds, Tom

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  7. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  8. DoD Insider Threat Mitigation

    DTIC Science & Technology

    1999-01-01

    password file at home , subsequently gaining unlimited access to the classified network, disruption on normal operations and the theft of DoD information...during military operations or crisis situations . 2 Vulnerability 3 Threat 1 Criticality 4 5 6 7 RISK Risk Model DoD Insider Threat IPT 8...personnel security and management chain. This will also support PDD 63 by fostering the partnership between the public and private sectors. DoD should

  9. Bio-Terrorism Threat and Casualty Prevention

    SciTech Connect

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  10. Thucydides was Right: Defining the Future Threat

    DTIC Science & Technology

    2015-04-01

    future threat, and the author believes that there are historical parallels between the time of Thucydides and our own that can help us avoid much peril...University Press of Kentucky, 2004); Another Bloody Century: Future Warfare (Weidenfeld and Nicol- son, 2005); Strategy and History: Essays on Theory and...source of evidence on future threat; instead, the concept of the historical parallel, the difference between the two ideas, is very large. Fourth

  11. Advanced insider threat mitigation workshop instructional materials

    SciTech Connect

    Gibbs, Philip; Larsen, Robert; O Brien, Mike; Edmunds, Tom

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  12. Dogs That Haven't Barked: Towards an Understanding of the Absence of Expected Technological Threats Workshop Bibliography

    SciTech Connect

    Roseman, Mallory; Zikry, Fareeda

    2016-12-13

    Lawrence Livermore National Laboratory’s Center for Global Security Research hosted a workshop to investigate why some consistently predicted threats from science and technology (S&T) have not manifested with the impacts to international security as forecasted. During the workshop, “Dogs That Haven’t Barked: Towards an Understanding of the Absence of Expected Technological Threats,” participants used two specific cases to focus the discussion: biotechnology and man-portable air defense systems (MANPADS).

  13. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    PubMed

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  14. An Information Fusion Framework for Threat Assessment

    SciTech Connect

    Beaver, Justin M; Kerekes, Ryan A; Treadwell, Jim N

    2009-01-01

    Modern enterprises are becoming increasingly sensitive to the potential destructive power of small groups or individuals with malicious intent. In response, significant investments are being made in developing a means to assess the likelihood of certain threats to their enterprises. Threat assessment needs are typically focused in very specific application areas where current processes rely heavily on human analysis to both combine any available data and draw conclusions about the probability of a threat. A generic approach to threat assessment is proposed, including a threat taxonomy and decision-level information fusion framework, that provides a computational means for merging multi-modal data for the purpose of assessing the presence of a threat. The framework is designed for flexibility, and intentionally accounts for the accuracy of each data source, given the environmental conditions, in order to manage the uncertainty associated with any acquired data. The taxonomy and information fusion framework is described, and discussed in the context of real-world applications such as shipping container security and cyber security.

  15. Applications Using AIRS Data

    NASA Astrophysics Data System (ADS)

    Ray, S. E.; Pagano, T. S.; Fetzer, E. J.; Lambrigtsen, B.; Olsen, E. T.; Teixeira, J.; Licata, S. J.; Hall, J. R.; Thompson, C. K.

    2015-12-01

    The Atmospheric Infrared Sounder (AIRS) on NASA's Aqua spacecraft has been returning daily global observations of Earth's atmospheric constituents and properties since 2002. With a 12-year data record and daily, global observations in near real-time, AIRS data can play a role in applications that fall under many of the NASA Applied Sciences focus areas. For vector-borne disease, research is underway using AIRS near surface retrievals to assess outbreak risk, mosquito incubation periods and epidemic potential for dengue fever, malaria, and West Nile virus. For drought applications, AIRS temperature and humidity data are being used in the development of new drought indicators and improvement in the understanding of drought development. For volcanic hazards, new algorithms using AIRS data are in development to improve the reporting of sulfur dioxide concentration, the burden and height of volcanic ash and dust, all of which pose a safety threat to aircraft. In addition, anomaly maps of many of AIRS standard products are being produced to help highlight "hot spots" and illustrate trends. To distribute it's applications imagery, AIRS is leveraging existing NASA data frameworks and organizations to facilitate archiving, distribution and participation in the BEDI. This poster will communicate the status of the applications effort for the AIRS Project and provide examples of new maps designed to best communicate the AIRS data.

  16. Tactical Integrated Air Defense System

    DTIC Science & Technology

    1978-06-09

    and integrated. The discussion in %,hapter II sunmmarlies the effective. ness of their integration experiences. 4 Any evaluation of current air...require- ments. Therefore, to serve as a baseline for evaluating the present IAD capabilities of the United States, Chapter III contains an analysis...of the present Soviet tactical air threat. Given the historical background and operational requirements for IAD, an evaluation of the present United

  17. Gulf War Air Power Survey.

    DTIC Science & Technology

    1993-01-01

    16 Coalition Strikes against Nuclear, Biological and Chemical Targets ........................ 80 vi p 17 Daily Scud Launches during Desert Storm...against Saudi Arabia and Israel. Since Iraq was known to possess chemical munitions and was believed to have biological weapons, these threats raised...systems; key nuclear, biological , chemical, electrical, military, and oil production facilities; bridges, railroads, and port infrastructure; and air

  18. Neural mechanisms underlying selective attention to threat.

    PubMed

    Bishop, Sonia J

    2008-01-01

    Biased competition models of selective attention suggest that attentional competition is influenced both by bottom-up sensory mechanisms sensitive to stimulus salience and top-down control mechanisms that support the processing of task-relevant stimuli. This provides a framework for investigating the neural mechanisms underlying selective attention to threat. Both subcortical regions implicated in threat detection--specifically the amygdala--and prefrontal cortical regions implicated in top-down attentional control are activated in response to task-irrelevant threat stimuli. A number of questions including the automaticity of the amygdala response to threat distractors, the modulation by anxiety of the amygdala and prefrontal response to these stimuli, and the impact of genetic and environmental factors upon this circuitry are addressed. The empirical literature is considered in the context of theoretical accounts of the neural substrate of selective attention and conscious awareness. It is suggested that the neural activity provoked by a given visual stimulus is influenced by factors impacting upon the strength of the bottom-up trace (e.g., presentation time, backward masking), stimulus salience (including threat relatedness), competition with other visual stimuli for perceptual processing resources, and the augmentation of the stimulus trace by allocation of top-down attentional resources. Individual differences in trait and state anxiety, and in genetic makeup, are thought to modulate the influence of stimulus valence and top-down attention through their impact upon amygdala and prefrontal function.

  19. Stereotype threat affects financial decision making.

    PubMed

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  20. Indoor air quality and human health

    SciTech Connect

    Turiel, I.

    1985-01-01

    The air inside buildings can contain various threats to human health: cigarette smoke, fumes from fires and cookers, microbes, gases, allergens and fumes produced by household products or building materials. Higher standards of insulation and draught-proofing and more use of air conditioning can increase the problems. This book provides a summary of indoor air quality problems in homes, offices and public buildings. Contents: Preface; Introduction; Formaledhyde and other household contaminants; Radon; Particulates; Combustion products; Involuntary smoking; Energy-efficient buildings and indoor air quality; Control of indoor air pollutants; Indoor air quality problems in office buildings; Legal and regulatory issues; Appendices; Sources and suggested reading; Glossary; Index.

  1. Insider Threat Assessment: Model, Analysis and Tool

    NASA Astrophysics Data System (ADS)

    Chinchani, Ramkumar; Ha, Duc; Iyer, Anusha; Ngo, Hung Q.; Upadhyaya, Shambhu

    Insider threat is typically attributed to legitimate users who maliciously leverage their system privileges, and familiarity and proximity to their computational environment to compromise valuable information or inflict damage. According to the annual CSI/FBI surveys conducted since 1996, internal attacks and insider abuse form a significant portion of reported incidents. The strongest indication yet that insider threat is very real is given by the recent study [2] jointly conducted by CERT and the US Secret Service; the first of its kind, which provides an in-depth insight into the problem in a real-world setting. However, there is no known body of work which addresses this problem effectively. There are several challenges, beginning with understanding the threat.

  2. Epidemiology today: Mitigating threats to an ecosystem.

    PubMed

    Kreiger, Nancy

    2016-06-27

    Ecosystems comprise all the living and non-living things in a particular area (e.g., rain forest, desert), which interact and maintain equilibrium. Loss of equilibrium (e.g., clear-cutting trees in a rain forest) can mean the decline of the ecosystem, unless it is able to adapt to the new circumstances. The term "knowledge ecosystem" describes an approach to managing knowledge in a particular field; the components of this system include the people, the technological skills and resources, and information or data. Epidemiology can be thought of as a knowledge ecosystem and, like ecological systems, its existence can be threatened, from both internal and external forces that may alter its equilibrium. This paper describes some threats to the epidemiology knowledge ecosystem, how these threats came about, and what responses we can make that may serve to mitigate those threats.

  3. [The threat of snake and scorpion venoms].

    PubMed

    Płusa, Tadeusz; Smędzik, Katarzyna

    2015-09-01

    Venoms of snakes and scorpions pose a significant threat to the health and life of humans. The speed and range of their actions causes damage of the organ responsible for the maintenance of vital signs. Venomous snake venoms cause blood clotting disorders, tissue necrosis and hemolysis, and the release of a number of proinflammatory cytokines and impair antibody synthesis. Availability of antitoxins is limited and in the most cases supportive treatment is recommended. In turn, the venom of scorpions beside intestinal symptoms cause significant impairment of neuromuscular conduction, causing severe respiratory disorders. Action venom poses a particular threat to sensitive patients. The degree of threat to life caused by the venom of snakes and scorpions authorizes the treatment of these substances as a potential biological weapon.

  4. Multisensor data fusion for IED threat detection

    NASA Astrophysics Data System (ADS)

    Mees, Wim; Heremans, Roel

    2012-10-01

    In this paper we present the multi-sensor registration and fusion algorithms that were developed for a force protection research project in order to detect threats against military patrol vehicles. The fusion is performed at object level, using a hierarchical evidence aggregation approach. It first uses expert domain knowledge about the features used to characterize the detected threats, that is implemented in the form of a fuzzy expert system. The next level consists in fusing intra-sensor and inter-sensor information. Here an ordered weighted averaging operator is used. The object level fusion between candidate threats that are detected asynchronously on a moving vehicle by sensors with different imaging geometries, requires an accurate sensor to world coordinate transformation. This image registration will also be discussed in this paper.

  5. Environmental Health: Threats and their Interactions

    PubMed Central

    Holdstock, Douglas

    2008-01-01

    Improvements in the provision of an acceptable standard of health care, particularly in the developing world, will be undermined by three ongoing processes: ongoing armed conflicts; the threat of global warming due to rising levels of greenhouse gases, particularly carbon dioxide emitted by developed countries; and by rapidly rising populations. The key features of these three threats are summarised, and it is shown that interactions between them increase both the likelihood of their occurrence and the probable harm that they will cause. Some of the interactions are described, with ways of providing health care taking into account the threats and their interactions, and the paradox is emphasised that better health care in the developing world will further increase population growth followed by increased greenhouse gas emissions. Improved education for women and free and unlimited access to modern methods of contraception are vital. PMID:21572838

  6. Left-Wing Extremism: The Current Threat

    SciTech Connect

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  7. Bioterrorism: is it a real threat?

    PubMed

    Gottschalk, René; Preiser, Wolfgang

    2005-05-01

    The Geneva Protocol of 1925 commits the signatory nations to refraining from the use of biological weapons. However, the terrorist assaults of September 2001 and, subsequently, the anthrax-containing letters are cause for great concerns: new threats to the security of nations are expected, as terrorist organizations seem to increasingly explore novel ways of spreading terror. In this context, naturally emerging diseases such as SARS, monkeypox or West Nile fever assume new importance because it is difficult to distinguish between natural epidemics and possible bioweapon assaults. Great efforts on the part of governments and public health authorities are necessary to counteract these threats.

  8. Air Research

    EPA Pesticide Factsheets

    EPA's air research provides the critical science to develop and implement outdoor air regulations under the Clean Air Act and puts new tools and information in the hands of air quality managers and regulators to protect the air we breathe.

  9. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not require a public accommodation to permit an individual to participate in or benefit from the goods, services, facilities, privileges, advantages and accommodations of that public accommodation when...

  10. Primary Auditory Cortex Regulates Threat Memory Specificity

    ERIC Educational Resources Information Center

    Wigestrand, Mattis B.; Schiff, Hillary C.; Fyhn, Marianne; LeDoux, Joseph E.; Sears, Robert M.

    2017-01-01

    Distinguishing threatening from nonthreatening stimuli is essential for survival and stimulus generalization is a hallmark of anxiety disorders. While auditory threat learning produces long-lasting plasticity in primary auditory cortex (Au1), it is not clear whether such Au1 plasticity regulates memory specificity or generalization. We used…

  11. Al Qaeda in Iraq: Demobilizing the Threat

    DTIC Science & Technology

    2005-12-01

    Insurgents.................. 130 b. Amnesty and Reconciliation Program .................... 130 c. Legitimize the Democratically-Elected Government...Socio-Economic............................... 132 a. Provide Employment and Opportunities................. 132 b. Secure the Economic Elite... evaluate strategies that have the potential to defeat or demobilize the threat. A majority of insurgency-counterinsurgency literature deals with

  12. Threats to Academic Freedom in Higher Education.

    ERIC Educational Resources Information Center

    Oldaker, Lawrence Lee

    This paper looks at the meaning of academic freedom and threats to that freedom in recent conflicts and legal rulings. The introduction calls academic freedom confusing and widely misunderstood and offers an historical and legal explanation of the concept as well as discussion of the traditional areas of conflict in instruction, research,…

  13. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    MedlinePlus

    ... resistant Staphylococcus aureus (MRSA) [page 77] Drug-resistant Streptococcus pneumoniae [page 79] Drug-resistant tuberculosis [page 81] Microorganisms with a Threat Level of Concerning Vancomycin-resistant Staphylococcus aureus ... Streptococcus [page 87] Clindamycin-resistant Group B Streptococcus [page ...

  14. Global threat to agriculture from invasive species.

    PubMed

    Paini, Dean R; Sheppard, Andy W; Cook, David C; De Barro, Paul J; Worner, Susan P; Thomas, Matthew B

    2016-07-05

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread.

  15. Threats and countermeasures for network security

    NASA Technical Reports Server (NTRS)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  16. Shape threat detection via adaptive computed tomography

    NASA Astrophysics Data System (ADS)

    Masoudi, Ahmad; Thamvichai, Ratchaneekorn; Neifeld, Mark A.

    2016-05-01

    X-ray Computed Tomography (CT) is used widely for screening purposes. Conventional x-ray threat detection systems employ image reconstruction and segmentation algorithms prior to making threat/no-threat decisions. We find that in many cases these pre-processing steps can degrade detection performance. Therefore in this work we will investigate methods that operate directly on the CT measurements. We analyze a fixed-gantry system containing 25 x-ray sources and 2200 photon counting detectors. We present a new method for improving threat detection performance. This new method is a so-called greedy adaptive algorithm which at each time step uses information from previous measurements to design the next measurement. We utilize sequential hypothesis testing (SHT) in order to derive both the optimal "next measurement" and the stopping criterion to insure a target probability of error Pe. We find that selecting the next x-ray source according to such a greedy adaptive algorithm, we can reduce Pe by a factor of 42.4× relative to the conventional measurement sequence employing all 25 sources in sequence.

  17. Stereotype Threat and Women's Performance in Physics

    ERIC Educational Resources Information Center

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-01-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST…

  18. The silent threat of low genetic diversity

    USGS Publications Warehouse

    Hunter, Margaret E.

    2013-01-01

    Across the Caribbean, protected coastal waters have served as primary feeding and breeding grounds for the endangered Antillean manatee. Unfortunately, these same coastal waters are also a popular “habitat” for humans. In the past, the overlap between human and manatee habitat allowed for manatee hunting and threatened the survival of these gentle marine mammals. Today, however, threats are much more inadvertent and are often related to coastal development, degraded habitats and boat strikes. In the state of Florida, decades of research on the species’ biological needs have helped conservationists address threats to its survival. For example, low wake zones and boater education have protected manatees from boat strikes, and many of their critical winter refuges are now protected. The Florida population has grown steadily, thus increasing from approximately 1,200 in 1991 to more than 5,000 in 2010. It is conceivable that in Florida manatees may one day be reclassified as “threatened” rather than “endangered.” Yet, in other parts of the Caribbean, threats still loom. This includes small, isolated manatee populations found on islands that can be more susceptible to extinction and lack of genetic diversity. To ensure the species’ long-term viability, scientists have turned their sights to the overall population dynamics of manatees throughout the Caribbean. Molecular genetics has provided new insights into long-term threats the species faces. Fortunately, the emerging field of conservation genetics provides managers with tools and strategies for protecting the species’ long-term viability.

  19. Hostile Intelligence Threat U.S. Technology

    DTIC Science & Technology

    1988-11-01

    Assistant Secretary of Defense for DoD 5200.1-PH-2 Command, Control, Comunnications , and Intelligence (703) 695-2686 DEPARTMENT OF DEFENSE DTIC...intelligence threat: "* PROGRAM MANAGER Telephone: "* INSTALLATION SECURITY OFFICE Telephone: "* LOCAL DIS COGNIZANT SECURITY OFFICE (Industrial

  20. Global threat to agriculture from invasive species

    PubMed Central

    Paini, Dean R.; Sheppard, Andy W.; Cook, David C.; De Barro, Paul J.; Worner, Susan P.; Thomas, Matthew B.

    2016-01-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  1. The School Shooter: A Threat Assessment Perspective.

    ERIC Educational Resources Information Center

    O'Toole, Mary Ellen

    This paper presents a systematic procedure for threat assessment and intervention of school shooters. The model is designed to be used by educators, mental-health professionals, and law-enforcement agencies and is intended to help refine and strengthen the efforts of the National Center for the Analysis of Violent Crime. Its fundamental building…

  2. The Lone Wolf Threat: A Different Approach

    DTIC Science & Technology

    2016-03-24

    intelligence communities and law enforcement agencies can employ asymmetric strategic approaches to aid in interdicting the lone wolf terrorist. 15...and a Golden Moment is identified in which intelligence communities and law enforcement agencies can employ asymmetric strategic approaches to aid ...and model presented in the thesis will further aid homeland security entities in combating this asymmetric threat. 40    CHAPTER 7: CONCLUSION

  3. The Nature of the Terrorism Threat

    ERIC Educational Resources Information Center

    Goldstein, Evan R., Comp.

    2008-01-01

    This article describes how Bruce Hoffman and Marc Sageman, two prominent scholars of terrorism, square off over whether Al Qaeda remains the primary global terrorist threat. The dispute began in the pages of "Foreign Affairs," where Hoffman, a professor in the security-studies program at Georgetown University, wrote a withering review of…

  4. Computer Security-Risks, Threats, and Safeguards.

    ERIC Educational Resources Information Center

    Ekhaml, Leticia

    2001-01-01

    Describes a variety of Internet threats to computers and networks used in schools. Discusses electronic trashing; clearing hard drives; cyber spying on Web sites visited; protection against cyber spying, including disposable email accounts; password sniffers; privacy policies; email snooping; email attachments that carry viruses; and hoaxes. (LRW)

  5. Threats to avifauna on oceanic islands.

    PubMed

    Trevino, Heather S; Skibiel, Amy L; Karels, Tim J; Dobson, F Stephen

    2007-02-01

    Results of the study by Blackburn et al. (2004a) of avifauna on oceanic islands suggest that distance from the mainland and time since European colonization have major influences on species extinctions and that island area is a significant but secondary contributing factor. After augmenting the data of the study on geographical properties for some of the islands they examined, we used a causal analysis approach with structural equation modeling to reexamine their conclusions. In our model geographical properties of islands, such as island area and isolation, were considered constraints on biological factors, such as the number of introduced mammalian predators and existing number of avifauna, that can directly or indirectly influence extinction. Of the variables we tested, island area had the greatest total influence on the threat of extinction due to its direct and indirect effects on the size of island avifauna. Larger islands had both a greater number of threatened bird species and more avifauna, increasing the number of species that could become threatened with extinction. Island isolation also had a significant, positive, and direct effect on threats to island avifauna because islands farther from the mainland had fewer current extant avifauna. Time since European colonization had a significant negative, but relatively weaker, influence on threats compared with the traditional biogeographic factors of island area and distance to the mainland. We also tested the hypothesis that the amount of threat is proportionally lower on islands that have had more extinctions (i.e., there is a "filter effect"). Because the proportion of bird extinctions potentially explained only 2.3% of the variation in the proportion of threatened species on islands, our results did not support this hypothesis. Causal modeling provided a powerful tool for examining threat of extinction patterns of known and hypothesized pathways of influence.

  6. Insider Threat - Material Control and Accountability Mitigation

    SciTech Connect

    Powell, Danny H; Elwood Jr, Robert H; Roche, Charles T

    2011-01-01

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with

  7. Criteria air pollutants and toxic air pollutants.

    PubMed Central

    Suh, H H; Bahadori, T; Vallarino, J; Spengler, J D

    2000-01-01

    This review presents a brief overview of the health effects and exposures of two criteria pollutants--ozone and particulate matter--and two toxic air pollutants--benzene and formaldehyde. These pollutants were selected from the six criteria pollutants and from the 189 toxic air pollutants on the basis of their prevalence in the United States, their physicochemical behavior, and the magnitude of their potential health threat. The health effects data included in this review primarily include results from epidemiologic studies; however, some findings from animal studies are also discussed when no other information is available. Health effects findings for each pollutant are related in this review to corresponding information about outdoor, indoor, and personal exposures and pollutant sources. Images Figure 3 Figure 8 Figure 9 PMID:10940240

  8. SEMINAR PUBLICATION: ORGANIC AIR EMISSIONS FROM WASTE MANAGEMENT FACILITIES

    EPA Science Inventory

    The organic chemicals contained in wastes processed during waste management operations can volatilize into the atmosphere and cause toxic or carcinogenic effects or contribute to ozone formation. Because air emissions from waste management operations pose a threat to human health...

  9. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    DTIC Science & Technology

    1992-10-01

    Cryptosporidiosis - a parasitic infection of the epithelial cells of the gastrointestinal . biliary, and respiratory tracts of man, as well as other... gastrointestinal tract (where the female lays eggs) MODE OF TRANSMISSION - penetration of skin or mucous membrane by infective larvae (usually from fecally...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  10. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    DTIC Science & Technology

    2013-08-01

    Research Corp. 1750 Commerce Blvd. North 1001 Leadership Place 60 Frontage Road Fairborn, OH 45324-6362 Killeen, TX...rank, and the MOS by rank. The five Soldiers with MOSs other than 11B had deployed, as did one Soldier with an MOS of infantryman (11B). 9...next to the tree [is a threat] because it could be an IED, the actual tree [could be a threat] because somebody could be hiding in it,” • “The weeds

  11. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    PubMed Central

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  12. Legal Aspects of Asbestos Abatement. Responses to the Threat of Asbestos-Containing Materials in School Buildings.

    ERIC Educational Resources Information Center

    Olson, Kristin

    Exposure to asbestos in the air poses serious health threats, particularly to children. The use of asbestos in schools after World War II may have exposed millions of persons before regulations controlling asbestos use began appearing in the 1970s. Federal efforts to reduce exposure to asbestos have included passage of the Asbestos School Hazard…

  13. 49 CFR 1548.16 - Security threat assessments for each proprietor, general partner, officer, director, and certain...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessments for each proprietor... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.16...

  14. 49 CFR 1548.16 - Security threat assessments for each proprietor, general partner, officer, director, and certain...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.16 Security... 49 Transportation 9 2013-10-01 2013-10-01 false Security threat assessments for each...

  15. 49 CFR 1548.16 - Security threat assessments for each proprietor, general partner, officer, director, and certain...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.16 Security... 49 Transportation 9 2012-10-01 2012-10-01 false Security threat assessments for each...

  16. The Hybrid Threat: Crime, Terrorism and Insurgency in Mexico. Proceedings of the Joint Policy and Research Forum

    DTIC Science & Technology

    2011-12-01

    9 President Santos had me down there a year ago to witness the change. The last time I was there in public office in 2001 there were a couple of...Militares en la Guerra .” Air and Space Power Journal (3d Trimestre, 2009), pp 48–58. The Hybrid Threat: Crime, Terrorism and Insurgency in Mexico 29

  17. Piracy without Penalty.

    ERIC Educational Resources Information Center

    Foster, Andrea L.

    2003-01-01

    Outlines the confusion arising when public colleges invoke a constitutional shield when they are accused of pirating software. Some state institutions claim immunity under the 11th Amendment from prosecution for infringement of intellectual property. (SLD)

  18. Patent and product piracy

    NASA Astrophysics Data System (ADS)

    Ignat, V.

    2016-08-01

    Advanced industrial countries are affected by technology theft. German industry annually loses more than 50 billion euros. The main causes are industrial espionage and fraudulent copying patents and industrial products. Many Asian countries are profiteering saving up to 65% of production costs. Most affected are small medium enterprises, who do not have sufficient economic power to assert themselves against some powerful countries. International organizations, such as Interpol and World Customs Organization - WCO - work together to combat international economic crime. Several methods of protection can be achieved by registering patents or specific technical methods for recognition of product originality. They have developed more suitable protection, like Hologram, magnetic stripe, barcode, CE marking, digital watermarks, DNA or Nano-technologies, security labels, radio frequency identification, micro color codes, matrix code, cryptographic encodings. The automotive industry has developed the method “Manufactures against Product Piracy”. A sticker on the package features original products and it uses a Data Matrix verifiable barcode. The code can be recorded with a smartphone camera. The smartphone is connected via Internet to a database, where the identification numbers of the original parts are stored.

  19. Insider Threat and Information Security Management

    NASA Astrophysics Data System (ADS)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  20. Future Infectious Disease Threats to Europe

    PubMed Central

    Suk, Jonathan E.

    2011-01-01

    We examined how different drivers of infectious disease could interact to threaten control efforts in Europe. We considered projected trends through 2020 for 3 broad groups of drivers: globalization and environmental change, social and demographic change, and health system capacity. Eight plausible infectious disease threats with the potential to be significantly more problematic than they are today were identified through an expert consultation: extensively drug-resistant bacteria, vector-borne diseases, sexually transmitted infections, food-borne infections, a resurgence of vaccine-preventable diseases, health care–associated infections, multidrug-resistant tuberculosis, and pandemic influenza. Preemptive measures to be taken by the public health community to counteract these threats were identified. PMID:21940915

  1. Detecting underwater improvised explosive threats (DUIET)

    NASA Astrophysics Data System (ADS)

    Feeley, Terry

    2010-04-01

    Improvised Explosive Devices (IEDs) have presented a major threat in the wars in Afghanistan and Iraq. These devices are powerful homemade land mines that can be small and easily hidden near roadsides. They are then remotely detonated when Coalition Forces pass by either singly or in convoys. Their rapid detection, classification and destruction is key to the safety of troops in the area. These land based bombs will have an analogue in the underwater theater especially in ports, lakes, rivers and streams. These devices may be used against Americans on American soil as an element of the global war on terrorism (GWOT) Rapid detection and classification of underwater improvised explosive devices (UIED) is critical to protecting innocent lives and maintaining the day to day flow of commerce. This paper will discuss a strategy and tool set to deal with this potential threat.

  2. Current nuclear threats and possible responses

    NASA Astrophysics Data System (ADS)

    Lamb, Frederick K.

    2005-04-01

    Over the last 50 years, the United States has spent more than 100 billion developing and building a variety of systems intended to defend its territory against intercontinental-range ballistic missiles. Most of these systems never became operational and ultimately all were judged ineffective. The United States is currently spending about 10 billion per year developing technologies and systems intended to defend against missiles that might be acquired in the future by North Korea or Iran. This presentation will discuss these efforts ad whether they are likely to be more effective than those of the past. It will also discuss the proper role of anti-ballistic programs at a time when the threat of a nuclear attack on the U.S. by terrorists armed with nuclear weapons is thought to be much higher than the threat of an attack by nuclear-armed ballistic missles.

  3. Securing Infrastructure from High Explosive Threats

    SciTech Connect

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  4. Common Viruses a Deadly Threat At Nursing Homes

    MedlinePlus

    ... 163048.html Common Viruses a Deadly Threat at Nursing Homes RSV and human metapneumovirus need to be ... News) -- Common viruses pose a serious threat in nursing homes, often sabotaging standard infection control measures, a ...

  5. Introduction to Administrative Programs that Mitigate the Insider Threat

    SciTech Connect

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  6. Uncertainties in the North Korean Nuclear Threat

    DTIC Science & Technology

    2010-01-01

    providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world . RAND’s...stigmatize Korean goods, further complicating problems for the Korean economy. And economic disruption can ripple through an economy in devastating ways...the outside world . 1 “N. Korean Poster Seems to Confi rm Succession,” 2009. 4 Uncertainties in the North Korean Nuclear Threat NK Nuclear

  7. Viral haemorrhagic fevers: current status, future threats.

    PubMed

    Speed, B R; Gerrard, M P; Kennett, M L; Catton, M G; Harvey, B M

    1996-01-15

    In developing countries, the major outbreaks of viral haemorrhagic fevers such as Marburg, Ebola and Lassa fever viruses have been nosocomially spread. The high mortality and absence of specific treatment have had a devastating effect. Epidemics of this highly contagious disease remain a constant threat to Australia and, as a result, carefully planned laboratory and public health strategies and clinical infection control measures have been instituted for the management of suspected cases.

  8. SARS: Down But Still a Threat

    DTIC Science & Technology

    2003-08-01

    economic and political impact. • Although SARS has killed far fewer people than die each year from more common maladies such as pneumonia, influenza...is not necessarily authoritative. DI Cartography Center/MPG 764135AI 8-03 All of these diseases, except cholera , dengue, and diphtheria, are... Cholera O1 Dengue/Dengue Hemorrhagic Fever Cholera O139 Dengue 9 Discussion SARS: Down But Still a Threat The Global Health Challenge

  9. Dismount Threat Recognition through Automatic Pose Identification

    DTIC Science & Technology

    2012-03-01

    camera and joint estimation software of the Kinect for Xbox 360. A threat determination is made based on the pose identified by the network. Ac- curacy...The automobile industry continues to refine pedestrian avoidance systems to assist drivers [14,15]. Microsoft’s Kinect for Xbox 360 [3] uses real-time...Conference on Acoustics, Speech and Signal Process- ing , Vol. 4, April 2007, pp. IV–21 – IV–24. 3. Kinect for Xbox 360 , Microsoft Corp., Redmond WA. 4

  10. The Divisive Threat of Immigration in Europe

    DTIC Science & Technology

    2012-12-01

    Europe , immigrant children consistently underperformed in reading. This disparity suggests that immigrant children will have lower literacy rates, less...OF IMMIGRATION IN EUROPE by Andrew J. Sheehan Lars W. Lilleby December 2012 Thesis Advisor: Gordon McCormick Second Reader: Anna...COVERED Master’s Thesis 4. TITLE AND SUBTITLE The Divisive Threat of Immigration in Europe 5. FUNDING NUMBERS 6. AUTHOR(S) Lars W. Lilleby

  11. Understanding Public Responses to Domestic Threats

    DTIC Science & Technology

    2007-09-01

    to shortages and gray markets , including both black market activities and grayer ones, like preferential treatment for families of officials or the...government is creating sufficient stockpiles for them. Insufficient government stockpiling may lead to gray markets for masks, utilized by citizens to build...Potential threats to social resilience are gray markets , addressing shortages illegally or unethically (e.g., favored treatment for officials’ families

  12. Safeguarding Canadian Arctic Sovereignty Against Conventional Threats

    DTIC Science & Technology

    2009-06-01

    The effects of climate change as well as national interests over control of vast amounts of natural resources in the Arctic seem to be... natural resources in the Arctic seem to be destabilizing the geostrategic environment involving the circumpolar states. A traditional conflict...sovereignty in the Arctic. The changing geostrategic environment in the region however, and the nature of the potential conventional threat, may compel

  13. Matrix Characterization in Threat Material Detection Processes

    SciTech Connect

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-03-10

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, ...) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1--contraband material in the sea containers, case 2 - explosives in soil (landmines), case 3 - explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  14. Nonproliferation, Nuclear Security, and the Insider Threat

    SciTech Connect

    Balatsky, Galya I.; Duggan, Ruth

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  15. Avian influenza: an emerging pandemic threat.

    PubMed

    Jin, Xian Wen; Mossad, Sherif B

    2005-12-01

    While we are facing the threat of an emerging pandemic from the current avian flu outbreak in Asia, we have learned important traits of the virus responsible for the 1918 Spanish influenza pandemic that made it so deadly. By using stockpiled antiviral drugs effectively and developing an effective vaccine, we can be in a better position than ever to mitigate the global impact of an avian influenza pandemic.

  16. Harbor Threat Detection, Classification, and Identification

    DTIC Science & Technology

    2006-09-30

    used for testing. As an example, the results for separating divers using structural acoustics-based features for closed systems (MK16, optima , and...for practical deployment purposes but the frequency range are sufficiently broad enough to capitalize on potential discoveries of target/false target...Task 1: Database Generation: NRL will provide measurements and analysis of additional signature threats by using its Laboratory for Structural

  17. The MANPAD Threat to Civilian Airliners

    DTIC Science & Technology

    2006-03-03

    PAGES: 19 KEY TERMS: Homeland Security; Non-Proliferation; Airport Security CLASSIFICATION: Unclassified This paper investigates strategic approaches...technological solutions and law enforcement operations to provide a competent airport security perimeter.”18 To combat this ominous threat of MANPADS...sites for phone and computer tips should be established with access for airport security , local and federal law enforcement, as well as intelligence

  18. Stereotype Threat Reinterpreted as a Regulatory Mismatch

    PubMed Central

    Grimm, Lisa R.; Markman, Arthur B.; Maddox, W. Todd; Baldwin, Grant C.

    2008-01-01

    Research documents performance decrements resulting from the activation of a negative task-relevant stereotype. We combine a number of strands of work to identify causes of stereotype threat in a way that allows us to reverse the effects and improve the performance of individuals with negative task-relevant stereotypes. We draw on prior work suggesting that negative stereotypes induce a prevention focus, and other research suggesting that people exhibit greater flexibility when their regulatory focus matches the reward structure of the task. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks that have an explicit or implicit gains reward structure. We find flexible performance can be induced in individuals who have a negative task-relevant stereotype by using a losses reward structure. We demonstrate the interaction of stereotypes and the reward structure of the task using chronic stereotypes and GRE math problems (Experiment 1), and primed stereotypes and a category learning task (Experiments 2a and 2b). We discuss implications of this research for other work on stereotype threat. PMID:19159133

  19. Asymmetric threat data mining and knowledge discovery

    NASA Astrophysics Data System (ADS)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  20. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  1. Impact! - The Threat of Comets and Asteroids

    NASA Astrophysics Data System (ADS)

    Verschuur, Gerrit L.

    1997-12-01

    In Impact , Gerrit L. Verschuur offers an eye-opening look at the catastrophic collisions of comets and asteroids with our planet. Perhaps more important, he paints an unsettling portrait of the possibility of new collisions with earth, exploring potential threats to our planet and describing what scientists are doing right now to prepare for this frightening possibility. Every day something from space hits our planet, Verschuur reveals. In fact, about 10,000 tons of space debris fall to earth every year, mostly in meteoric form. But meteors are not the greatest threat to life on earth, the author points out. The major threats are asteroids and comets. The reader discovers that astronomers have located some 350 NEAs ("Near Earth Asteroids"), objects whose orbits cross the orbit of the earth. Comets, of course, are even more deadly. He discusses Comet Swift-Tuttle--"the most dangerous object in the solar system"--a comet far larger than the one that many scientists believe killed off the dinosaurs, due to pass through earth's orbit in the year 2126. In addition, the author describes the efforts of Spacewatch and other groups to locate NEAs, and evaluates the idea that comet and asteroid impacts have been an underrated factor in the evolution of life on earth. Whether discussing monumental tsunamis or the innumerable comets in the solar system, Impact will enthrall anyone curious about outer space, remarkable natural phenomenon, or the future of the planet earth.

  2. Bot armies as threats to network security

    NASA Astrophysics Data System (ADS)

    Banks, Sheila B.; Stytz, Martin R.

    2007-04-01

    "Botnets", or "bot armies", are large groups of remotely controlled malicious software. Bot armies pose one of the most serious security threats to all networks. Botnets, remotely controlled and operated by botmasters or botherders, can launch massive denial of service attacks, multiple penetration attacks, or any other malicious network activity on a massive scale. While bot army activity has, in the past, been limited to fraud, blackmail, and other forms of criminal activity, their potential for causing large-scale damage to the entire internet; for launching large-scale, coordinated attacks on government computers and networks; and for large-scale, coordinated data gathering from thousands of users and computers on any network has been underestimated. This paper will not discuss how to build bots but the threats they pose. In a "botnet" or "bot army", computers can be used to spread spam, launch denial-of-service attacks against Web sites, conduct fraudulent activities, and prevent authorized network traffic from traversing the network. In this paper we discuss botnets and the technologies that underlie this threat to network and computer security. The first section motivates the need for improved protection against botnets, their technologies, and for further research about botnets. The second contains background information about bot armies and their key underlying technologies. The third section presents a discussion of the types of attacks that botnets can conduct and potential defenses against them. The fourth section contains a summary and suggestions for future research and development.

  3. Posterror speeding after threat-detection failure.

    PubMed

    Caudek, Corrado; Ceccarini, Francesco; Sica, Claudio

    2015-04-01

    Cognitive control enables individuals to rapidly adapt to changing task demands. To investigate error-driven adjustments in cognitive control, we considered performance changes in posterror trials, when participants performed a visual search task requiring detection of angry, happy, or neutral facial expressions in crowds of faces. We hypothesized that the failure to detect a potential threat (angry face) would prompt a different posterror adjustment than the failure to detect a nonthreatening target (happy or neutral face). Indeed, in 3 sets of experiments, we found evidence of posterror speeding, in the first case, and of posterror slowing, in the second case. Previous results indicate that a threatening stimulus can improve the efficiency of visual search. The results of the present study show that a similar effect can also be observed when participants fail to detect a threat. The impact of threat-detection failure on cognitive control, as revealed by the present study, suggests that posterror adjustments should be understood as the product of domain-specific mechanisms that are strongly influenced by affective information, rather than as the effect of a general-purpose error-monitoring system.

  4. Soil threats in Europe for the RECARE project

    NASA Astrophysics Data System (ADS)

    Stolte, Jannes; Tesfai, Mehretaeb; Oygarden, Lillian

    2015-04-01

    Soil is one of our most important natural resources that provides us with vital goods and services to sustain life. Nevertheless, soils functions are threatened by a wide range of processes and a number of soil threats have been identified in Europe. Although there is a large body of knowledge available on soil threats in Europe, the complexity and functioning of soil systems and their interaction with human activities, climate change, and ecosystem services (ESS), is still not fully understood. An extensive literature review was carried out by a group of experts on soil threats at the European level. In total, around 60 experts from the 17 case study sites of the RECARE project, were involved in the process of reviewing and drafting the report and 11 soil threats were identified. The objective of WP2 of the RECARE project was to provide an improved overview of existing information on soil threats and degradation at the European scale. These soil threats are soil erosion by water, soil erosion by wind, decline of organic matter (OM) in peat, decline of OM in minerals soils, soil compaction, soil sealing, soil contamination, soil salinization, desertification, flooding and landslides and decline in soil biodiversity. The final report of WP2 provides a comprehensive thematic information on the major soil threats of Europe with due attention given to the Driving force-Pressure-State-Impact-Response to soil threats. Interrelationships between soil threats, between soil threats and soil functions and between soil threats and Ecosystems Services are made, and will be presented. A synergy between the soil threats is made based on the given information in each of the chapters, where we tried to identify the interactions between the threats. We tried to identify in what way one threat acts as a threat for another threat. Also, the link between soil degradation and Ecosystem Services are identified. Again, based on the information given in each chapter, the major climate

  5. Space Station crew safety alternatives study. Volume 2: Threat development

    NASA Technical Reports Server (NTRS)

    Raasch, R. F.; Peercy, R. L., Jr.; Rockoff, L. A.

    1985-01-01

    The first 15 years of accumulated space station concepts for initial operational capability (IOC) during the early 1990's were considered. Twenty-five threats to the space station are identified and selected threats addressed as impacting safety criteria, escape and rescue, and human factors safety concerns. Of the 25 threats identified, eight are discussed including strategy options for threat control: fire, biological or toxic contamination, injury/illness, explosion, loss of pressurization, radiation, meteoroid penetration, and debris.

  6. Testosterone biases the amygdala toward social threat approach

    PubMed Central

    Radke, Sina; Volman, Inge; Mehta, Pranjal; van Son, Veerle; Enter, Dorien; Sanfey, Alan; Toni, Ivan; de Bruijn, Ellen R. A.; Roelofs, Karin

    2015-01-01

    Testosterone enhances amygdala reactions to social threat, but it remains unclear whether this neuroendocrine mechanism is relevant for understanding its dominance-enhancing properties; namely, whether testosterone biases the human amygdala toward threat approach. This pharmacological functional magnetic-resonance imaging study shows that testosterone administration increases amygdala responses in healthy women during threat approach and decreases it during threat avoidance. These findings support and extend motivational salience models by offering a neuroendocrine mechanism of motivation-specific amygdala tuning. PMID:26601187

  7. Air Pollution

    MedlinePlus

    Air pollution is a mixture of solid particles and gases in the air. Car emissions, chemicals from factories, ... Ozone, a gas, is a major part of air pollution in cities. When ozone forms air pollution, it's ...

  8. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    PubMed

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures.

  9. Culture, Threat, and Mental Illness Stigma: Identifying Culture-Specific Threat among Chinese-American Groups

    PubMed Central

    Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G.; Saw, Anne; Wong, Gloria; Phelan, Jo C.

    2014-01-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one’s family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002–2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210

  10. Isolating Neural Components of Threat Bias in Pediatric Anxiety

    ERIC Educational Resources Information Center

    Britton, Jennifer C.; Bar-Haim, Yair; Carver, Frederick W.; Holroyd, Tom; Norcross, Maxine A.; Detloff, Allison; Leibenluft, Ellen; Ernst, Monique; Pine, Daniel S.

    2012-01-01

    Background: Attention biases toward threat are often detected in individuals with anxiety disorders. Threat biases can be measured experimentally through dot-probe paradigms, in which individuals detect a probe following a stimulus pair including a threat. On these tasks, individuals with anxiety tend to detect probes that occur in a location…

  11. Death Threat and Death Concerns in the College Student.

    ERIC Educational Resources Information Center

    Tobacyk, Jerome; Eckstein, Daniel

    1980-01-01

    Thanatology students reported significantly lesser death threat and significantly greater death concerns. Trait anxiety was found to be a significant predictor of change in death threat in the Thanatology Group, with lesser anxiety associated with greater decline in death threat. (Author)

  12. Gender, Stereotype Threat, and Anxiety: Psychophysiological and Cognitive Evidence

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2006-01-01

    Introduction: Claude Steele's stereotype threat hypothesis proposed that negative group stereotypes increase individual anxiety levels, hurting performance. However, the role of anxiety in stereotype threat has not been fully explored. This study examined the hypothesis that experimental manipulation of stereotype threat would influence real-time…

  13. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    ERIC Educational Resources Information Center

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  14. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... functions of the position held or desired without posing a direct threat to the health or safety of...

  15. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as a... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... position held or desired without posing a direct threat to the health or safety of the individual or...

  16. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as a... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... position held or desired without posing a direct threat to the health or safety of the individual or...

  17. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    ERIC Educational Resources Information Center

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  18. Assessing the threat of firearms: new threat formula, resources, and ontological linking algorithms

    NASA Astrophysics Data System (ADS)

    Hempelmann, Christian F.; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Sirakov, Nikolay Metodiev

    2014-06-01

    The present work is part of an ongoing larger project.2, 3, 11, 12 The goal of this project is to develop a system capable of automatic threat assessment for instances of firearms use in public places. The main components of the system are: an ontology of firearms;1, 14 algorithms to create the visual footprint of the firearms,1, 14 to compare visual information,2, 3, 11, 12 to facilitate search in the ontology, and to generate the links between the conceptual and visual ontologies; as well as a formula to calculate the threat of individual firearms, firearms classes, and ammunition types in different environments. One part of the dual-level ontology for the properties of the firearms captures key visual features used to identify their type or class in images, while the other part captures their threat-relevant conceptual properties. The visual ontology is the result of image segmentation and matching methods, while the conceptual ontology is designed using knowledge-engineering principles and populated semi-automatically from Web resources. The focus of the present paper is two-fold. On the one hand, we will report on an update of the initial threat formula, based on the substantially increased population of the firearm ontology, including ammunition types and comparisons to actual incidents, and allowing for an overall more accurate assessment. On the other hand, the linking algorithms between the visual and conceptual ontologies are elaborated for faster transfer of information leading to an improvement in accuracy of the threat assessment.

  19. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    ERIC Educational Resources Information Center

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  20. A resolution supporting enhanced maritime security in the Gulf of Guinea and encouraging increased cooperation between the United States and West and Central African countries to fight armed robbery at sea, piracy, and other maritime threats.

    THOMAS, 113th Congress

    Sen. Flake, Jeff [R-AZ

    2013-11-06

    01/07/2014 Resolution agreed to in Senate without amendment and with a preamble by Unanimous Consent. (consideration: CR S81-82; text as passed Senate: CR S81-82) (All Actions) Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:

  1. Mitigation Policy Scenario of Space Debris Threat Related with National Security

    NASA Astrophysics Data System (ADS)

    Herdiansyah, Herdis; Frimawaty, Evy; Munir, Ahmad

    2016-02-01

    The development of air space recently entered a new phase, when the space issues correlated with the future of a country. In past time, the space authorization was related with advancing technology by many space mission and various satellite launchings, or it could be said that who ruled technology will rule the space. Therefore, the numerous satellites in the space could be a threat for the countries which are mainly located in the path of the satellite, especially in the equatorial region including Indonesia. This study aims to create a policy scenario in mitigating the threat of space debris. The results showed that although space debris was not threatened national security for now, but the potential and its impact on the future potentially harmful. The threats of orbit circulation for some experts considered as a threat for national security, because its danger potential which caused by space debris could significantly damage the affected areas. However, until now Indonesia has no comprehensive mitigation strategy for space matters although it has been ratified by the United Nations Convention.

  2. Stereotype threat can reduce older adults' memory errors.

    PubMed

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  3. Protection without detection: a threat mitigation technique

    NASA Astrophysics Data System (ADS)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  4. The threat of nuclear war: Some responses

    PubMed Central

    Marcattilio, A. J. M.; Nevin, John A.

    1986-01-01

    The possibility of nuclear holocaust threatens the very existence of the world community. Biologists, earth scientists, educators, lawyers, philosophers, physicists, physicians, and social scientists have addressed the problem from their special perspectives, and have had substantial impact on the public. Behavior analysts, however, have not as a whole contributed a great deal to the goal of preventing nuclear catastrophe. We argue that the threat of nuclear war is primarily a behavioral problem, and present an analysis of that problem. In addition, we address the difficulty of implementing behavioral interventions that would contribute to the survival of the World. PMID:22478648

  5. Harbor Threat Detection, Classification, and Identification

    DTIC Science & Technology

    2007-09-30

    ed ta rg et Partcile Filter based Tracking of the Closed Circuit Run #2 38 43 48 53 58 63 68 73 78 83 88 380 400 420 440 460 Ping Indices R an ge o...The priority ranking of threats to be studied is (1) diver with commercial rebreathers , (2) diver with diver assisted propulsors, and (3) small...successfully extended the laboratory database to include additional rebreather types and conditions, adding to the database originating in FY06. The FY06/07

  6. Cutaneous leishmaniasis: an increasing threat for travellers.

    PubMed

    Antinori, S; Gianelli, E; Calattini, S; Longhi, E; Gramiccia, M; Corbellino, M

    2005-05-01

    Analysis of the literature on cutaneous leishmaniasis in low-prevalence countries suggests an increase in imported cases that is attributable to the growing phenomenon of international tourism, migration and military operations in highly endemic regions. Cases of imported cutaneous leishmaniasis are often missed initially, but diagnosis can be made non-invasively by PCR using skin scrapings of lesions as starting material. Cutaneous leishmaniasis is an emerging threat for travellers and should be considered in all patients presenting with slow-to-heal ulcers.

  7. Assessing the global threat from Zika virus.

    PubMed

    Lessler, Justin; Chaisson, Lelia H; Kucirka, Lauren M; Bi, Qifang; Grantz, Kyra; Salje, Henrik; Carcelen, Andrea C; Ott, Cassandra T; Sheffield, Jeanne S; Ferguson, Neil M; Cummings, Derek A T; Metcalf, C Jessica E; Rodriguez-Barraquer, Isabel

    2016-08-12

    First discovered in 1947, Zika virus (ZIKV) infection remained a little-known tropical disease until 2015, when its apparent association with a considerable increase in the incidence of microcephaly in Brazil raised alarms worldwide. There is limited information on the key factors that determine the extent of the global threat from ZIKV infection and resulting complications. Here, we review what is known about the epidemiology, natural history, and public health effects of ZIKV infection, the empirical basis for this knowledge, and the critical knowledge gaps that need to be filled.

  8. Threats and opportunities of plant pathogenic bacteria.

    PubMed

    Tarkowski, Petr; Vereecke, Danny

    2014-01-01

    Plant pathogenic bacteria can have devastating effects on plant productivity and yield. Nevertheless, because these often soil-dwelling bacteria have evolved to interact with eukaryotes, they generally exhibit a strong adaptivity, a versatile metabolism, and ingenious mechanisms tailored to modify the development of their hosts. Consequently, besides being a threat for agricultural practices, phytopathogens may also represent opportunities for plant production or be useful for specific biotechnological applications. Here, we illustrate this idea by reviewing the pathogenic strategies and the (potential) uses of five very different (hemi)biotrophic plant pathogenic bacteria: Agrobacterium tumefaciens, A. rhizogenes, Rhodococcus fascians, scab-inducing Streptomyces spp., and Pseudomonas syringae.

  9. Lyssaviruses and Bats: Emergence and Zoonotic Threat

    PubMed Central

    Banyard, Ashley C.; Evans, Jennifer S.; Luo, Ting Rong; Fooks, Anthony R.

    2014-01-01

    The continued detection of zoonotic viral infections in bats has led to the microbial fauna of these mammals being studied at a greater level than ever before. Whilst numerous pathogens have been discovered in bat species, infection with lyssaviruses is of particular significance from a zoonotic perspective as, where human infection has been reported, it is invariably fatal. Here we review the detection of lyssaviruses within different bat species and overview what is understood regarding their maintenance and transmission following both experimental and natural infection. We discuss the relevance of these pathogens as zoonotic agents and the threat of newly discovered viruses to human populations. PMID:25093425

  10. Threat Posed by Mounting Vigilantism in Mexico

    DTIC Science & Technology

    2011-09-01

    Perro’s body was found in the trunk of a vehicle occu- pied by Ismael Quintero Oliver, 32, and Marcos Érik Pérez Mora, 21, who belonged to a”Drivers...POSED BY MOUNTING VIGILANTISM IN MEXICO George W. Grayson U.S. ARMY WAR COLLEGE ,....~ .... :!iO.L STRATEGIC STUDIES INSTITUTE Report...TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Threat Posed by Mounting Vigilantism in Mexico 5a. CONTRACT NUMBER 5b

  11. Recent advances in the development of a novel aerosol sorting and deposition system for bio-threat sensing applications

    NASA Astrophysics Data System (ADS)

    Pletcher, Timothy; McGinn, Joseph; Keller, David; Huston, Alan; Eversole, Jay; Sivaprakasum, Vasanthi

    2007-10-01

    Sarnoff Corporation and the Naval Research Laboratory, through support of the U.S. Department of Homeland Security, are developing an automated, high throughput bio-aerosol physical enrichment system designed for use as part of a biological-threat protection system. The Biological Aerosol-Capture-Enrichment (BioACE) system is a bio-aerosol collection system that combines three unique technologies to create physically enriched aerosol samples that can be subsequently interrogated by any number of bio-threat detection systems for the presence of threat agents. An air-to-air concentrator uses an inertial separation technique to highly concentrate an aerosol sample presented to a dual wavelength ultra-violet laser induced fluorescence (UVLIF) optical trigger used to discriminate potential threat particles from non-threat particles conveyed in a collimated particle stream. This particle classification information is used to trigger an electrostatic deposition mechanism to deposit only those particles determined to be potential bio-threats onto a stainless steel substrate. Non-threat particles are discarded with the exiting airflow. The goal for the most recent development effort has been the integration and optimization of these technologies into a unit capable of producing highly enriched particulate samples from ambient air containing variable background aerosol loading and type. Several key technical and engineering challenges were overcome during the course of this development including a unique solution for compensating particle velocity dispersion within the airflow, development of a real-time signal acquisition and detection algorithm for determining material type on a particle by particle basis at rates greater than 2000 particles per second, and the introduction of a robust method for transferring deposited particulate into a 50ul wet sample suitable for most advanced bio-detection techniques. This paper will briefly describe the overall system architecture and

  12. Users Guide for the Anvil Threat Corridor Forecast Tool V1.7.0 for AWIPS

    NASA Technical Reports Server (NTRS)

    Bauman, William H., III

    2007-01-01

    landing facilities at the Kennedy Space Center (KSC) and Cape Canaveral Air Force Station (CCAFS) and beyond. The anvil clouds were generated around 1930 UTC (1430 EDT) by thunderstorm activity over central Florida and transported 90 n mi east-northeastward within 2 hours, as diagnosed by the anvil forecast tool. Phase III, delivered in February 2003, built upon the results of Phase II by enhancing the Anvil Threat Sector Tool with the capability to use national model forecast winds for depiction of potential anvil lengths and orientations over the KSC/CCAFS area with lead times from 3 through 168 hours (7 days). In September 2003, AMU customers requested the capability to use data from the KSC 50 MHz Doppler Radar Wind Profiler (DRWP) in the Anvil Threat Sector Tool and this capability was delivered by the AMU in December 2003. In March 2005, the AMU was tasked to migrate the MIDDS Anvil Threat Sector Tool capabilities onto the Advanced Weather Interactive Processing System (AWIPS) as the Anvil Threat Corridor Forecast Tool.

  13. Deterring regional threats from nuclear proliferation

    SciTech Connect

    Spector, L.S.

    1992-03-12

    The most prominent shift in the National Military Strategy is from the global Soviet threat to a new focus on regional contingencies. No threat looms larger in these contingencies than the proliferation of nuclear weapons and ballistic missiles. This study examines proliferation trends and proposes a predominately diplomatic strategy for containing the problem. Dr. Spector identifies three waves of proliferation: the first is the five states with declared weapons and doctrine-the United States, Russia, Great Britain, France, and China; the second includes a less visible group that developed a covert capability, without testing weapons or declaring a doctrine of deterrence-for example, Israel, India, and probably Pakistan; and, a third wave of would-be proliferators includes radical states like Iraq, Iran, Libya, and North Korea. Spector's political approach is based on the common interest of wave one and two states to prevent further proliferation. Political-economic incentives have already worked in the cases of Brazil, Argentina, Taiwan, and South Africa-states which appear to have abandoned their nuclear weapons programs. Spector does not rule out the option of military force. Force, especially under international sanctions, can be a powerful tool to back diplomatic efforts. Use of force, however, remains a last resort.

  14. In Brief: Threats to species continue

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2009-11-01

    Of 47,677 assessed species, 17,291 are threatened with extinction, according to the latest update of the Red List of Threatened Species issued by the International Union for Conservation of Nature (IUCN) on 3 November. The list indicates that amphibians are the most threatened group of species known to date, with 1895 (nearly 30%) of 6285 amphibians in danger of extinction. Thirty-nine are already extinct or extinct in the wild, 484 are critically endangered, 754 are endangered, and 657 are vulnerable, according to IUCN. Under threat are 21% of mammals, 30% of amphibians, 12% of birds, 28% of reptiles, 37% of freshwater fishes, 70% of plants, and 35% of invertebrates assessed to date. “We have only managed to assess 47,663 species so far; there are many more millions out there which could be under serious threat,” according to IUCN Red List Unit Manager Craig Hilton-Taylor. For more information, visit http://www.iucnredlist.org.

  15. Identifying chemicals that are planetary boundary threats.

    PubMed

    MacLeod, Matthew; Breitholtz, Magnus; Cousins, Ian T; de Wit, Cynthia A; Persson, Linn M; Rudén, Christina; McLachlan, Michael S

    2014-10-07

    Rockström et al. proposed a set of planetary boundaries that delimit a "safe operating space for humanity". Many of the planetary boundaries that have so far been identified are determined by chemical agents. Other chemical pollution-related planetary boundaries likely exist, but are currently unknown. A chemical poses an unknown planetary boundary threat if it simultaneously fulfills three conditions: (1) it has an unknown disruptive effect on a vital Earth system process; (2) the disruptive effect is not discovered until it is a problem at the global scale, and (3) the effect is not readily reversible. In this paper, we outline scenarios in which chemicals could fulfill each of the three conditions, then use the scenarios as the basis to define chemical profiles that fit each scenario. The chemical profiles are defined in terms of the nature of the effect of the chemical and the nature of exposure of the environment to the chemical. Prioritization of chemicals in commerce against some of the profiles appears feasible, but there are considerable uncertainties and scientific challenges that must be addressed. Most challenging is prioritizing chemicals for their potential to have a currently unknown effect on a vital Earth system process. We conclude that the most effective strategy currently available to identify chemicals that are planetary boundary threats is prioritization against profiles defined in terms of environmental exposure combined with monitoring and study of the biogeochemical processes that underlie vital Earth system processes to identify currently unknown disruptive effects.

  16. Passive acoustic threat detection in estuarine environments

    NASA Astrophysics Data System (ADS)

    Borowski, Brian; Sutin, Alexander; Roh, Heui-Seol; Bunin, Barry

    2008-04-01

    The Maritime Security Laboratory (MSL) at Stevens Institute of Technology supports research in a range of areas relevant to harbor security, including passive acoustic detection of underwater threats. The difficulties in using passive detection in an urban estuarine environment include intensive and highly irregular ambient noise and the complexity of sound propagation in shallow water. MSL conducted a set of tests in the Hudson River near Manhattan in order to measure the main parameters defining the detection distance of a threat: source level of a scuba diver, transmission loss of acoustic signals, and ambient noise. The source level of the diver was measured by comparing the diver's sound with a reference signal from a calibrated emitter placed on his path. Transmission loss was measured by comparing noise levels of passing ships at various points along their routes, where their distance from the hydrophone was calculated with the help of cameras and custom software. The ambient noise in the Hudson River was recorded under varying environmental conditions and amounts of water traffic. The passive sonar equation was then applied to estimate the range of detection. Estimations were done for a subset of the recorded noise levels, and we demonstrated how variations in the noise level, attenuation, and the diver's source level influence the effective range of detection. Finally, we provided analytic estimates of how an array improves upon the detection distance calculated by a single hydrophone.

  17. Mitigating Inadvertent Insider Threats with Incentives

    NASA Astrophysics Data System (ADS)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  18. Prefrontal control of attention to threat.

    PubMed

    Peers, Polly V; Simons, Jon S; Lawrence, Andrew D

    2013-01-01

    Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g., trait anxiety) and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink (AB) following threat-related targets. Moreover, we demonstrate that activity in dorso-lateral prefrontal cortex (DLPFC), is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience.

  19. When threat to society becomes a threat to oneself: implications for right-wing attitudes and ethnic prejudice.

    PubMed

    Onraet, Emma; Van Hiel, Alain

    2013-01-01

    The relationships between threat on one hand and right-wing attitudes and ethnic prejudice on the other were investigated in a heterogeneous sample (N = 588). Specifically, we considered the perception of economic and terroristic threats in terms of their consequences at the societal and personal levels. Previous studies revealed that societal consequences of threat, rather than personal consequences, are related to right-wing attitudes. However, the present results challenge these findings. More specifically, three important results emerged. First, items probing the distinct threat levels loaded on separate dimensions for economic and terroristic threat, validating the distinction between societal and personal threat consequences. Second, consistent with previous research, this study revealed that perceived societal consequences of threat yield strong and robust relationships with all target variables. However, personal consequences of threat were also associated with higher levels of right-wing authoritarianism (RWA), social dominance orientation (SDO), and ethnic prejudice in particular. Third, societal and personal consequences of threat interacted in explaining the target variables. More specifically, feeling personally threatened by terrorism was only related to higher levels of RWA in the presence of low levels of threat to society, whereas experiencing personal economic threat was only related to higher levels of SDO and ethnic prejudice when high societal economic threat was experienced. In sum, although the perception of societal consequences of threat plays a prominent role in explaining right-wing attitudes and ethnic prejudice, the perception of being personally affected by threat is also associated with higher levels of RWA and SDO, and especially ethnic prejudice.

  20. Feeling the Threat: Stereotype Threat as a Contextual Barrier to Women's Science Career Choice Intentions

    ERIC Educational Resources Information Center

    Deemer, Eric D.; Thoman, Dustin B.; Chase, Justin P.; Smith, Jessi L.

    2014-01-01

    Social cognitive career theory (SCCT; Lent, Brown, & Hackett, 1994, 2000) holds that contextual barriers inhibit self-efficacy and goal choice intentions from points both near and far from the active career development situation. The current study examined the influence of one such proximal barrier, stereotype threat, on attainment of these…

  1. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    ERIC Educational Resources Information Center

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  2. ['Piracy of kowledge'--the role of a buccaneer-scientist in the knowledge circulation around diseases and drugs in the tropics].

    PubMed

    Snelders, Stephen

    2009-01-01

    Knowledge circulation in the seventeenth and eighteenth centuries was not only stimulated by the mutual interaction of trade and science. In the context of territorial expansion, war, and the activities of privateers and pirates, knowledge of diseases and drugs in the tropics was increased as well. An important part in this process was performed by so-called 'buccaneer-scientists': adventurers with medical and scientific backgrounds and/or interest who operated on the cultural borders in different parts of the hemisphere. The characteristics of this type of contributor to Early Modern knowledge circulation are explored and analyzed in the example of Scottish surgeon and pirate Lionel Wafer (c. 1660 - c. 1705). The buccaneer scientist had to share the passions of other scientists, resulting in accurate and detailed empirical observation; be able to judge the relevance of observations and 'facts'; be part of a context that stimulates these observations; be capable of describing of these observations; and be part of a network of dissemination of observations. His activities should have an important practical and pragmatic component stimulating trade, expansion and even piracy. And he should possess personal characteristics such as perseverance, a healthy constitution, and ruthlessness, to work and survive in a violent and traumatic environment. Wafer is typical for other 'buccaneer-scientists' of this period--not only pirates and privateers, but also physicians and natural explorers operating in other and more 'respectable' areas of the European overseas expansion.

  3. Identifying key conservation threats to Alpine birds through expert knowledge.

    PubMed

    Chamberlain, Dan E; Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  4. Portable Integrated Wireless Device Threat Assessment to Aircraft Radio Systems

    NASA Technical Reports Server (NTRS)

    Salud, Maria Theresa P.; Williams, Reuben A. (Technical Monitor)

    2004-01-01

    An assessment was conducted on multiple wireless local area network (WLAN) devices using the three wireless standards for spurious radiated emissions to determine their threat to aircraft radio navigation systems. The measurement process, data and analysis are provided for devices tested using IEEE 802.11a, IEEE 802.11b, and Bluetooth as well as data from portable laptops/tablet PCs and PDAs (grouping known as PEDs). A comparison was made between wireless LAN devices and portable electronic devices. Spurious radiated emissions were investigated in the radio frequency bands for the following aircraft systems: Instrument Landing System Localizer and Glideslope, Very High Frequency (VHF) Communication, VHF Omnidirectional Range, Traffic Collision Avoidance System, Air Traffic Control Radar Beacon System, Microwave Landing System and Global Positioning System. Since several of the contiguous navigation systems were grouped under one encompassing measurement frequency band, there were five measurement frequency bands where spurious radiated emissions data were collected for the PEDs and WLAN devices. The report also provides a comparison between emissions data and regulatory emission limit.

  5. COAMPS Application to Global and Homeland Security Threat Problems

    SciTech Connect

    Chin, H S; Glascoe, L G

    2004-09-14

    Atmospheric dispersion problems have received more attention with regard to global and homeland security than their conventional roles in air pollution and local hazard assessment in the post 9/11 era. Consequently, there is growing interest to characterize meteorology uncertainty at both low and high altitudes (below and above 30 km, respectively). A 3-D Coupled Ocean Atmosphere Prediction System (COAMPS, developed by Naval Research Laboratory; Hodur, 1997) is used to address LLNL's task. The objective of this report is focused on the effort at the improvement of COAMPS forecast to address the uncertainty issue, and to provide new capability for high-altitude forecast. To assess the atmospheric dispersion behavior in a wider range of meteorological conditions and to expand its vertical scope for the potential threat at high altitudes, several modifications of COAMPS are needed to meet the project goal. These improvements include (1) the long-range forecast capability to show the variability of meteorological conditions at a much larger time scale (say, a year), and (2) the model physics enhancement to provide new capability for high-altitude forecast.

  6. When threats foreign turn domestic: Two ways for distant realistic intergroup threats to carry over into local intolerance.

    PubMed

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2015-09-01

    In times of economic downturn, perceived realistic intergroup threats (e.g., labour competition) often dominate political and media discourse. Although local outgroups (e.g., local immigrants) can be experienced as sources of realistic threats, we propose that such threats can also be perceived to be caused by distant outgroups (e.g., European Union members perceiving Greece to threaten their economies) and that such distant threats can carry over into local intolerance (e.g., increasing intolerance towards local immigrant groups). We predicted and found in two studies that perceived distant realistic threats carried over into local intolerance via two different pathways. First, direct reactions towards the distant outgroup can generalize to culturally similar local outgroups (the group-based association pathway). Secondly, Study 2 indicated that when the distant threat was attributed to stereotypical outgroup traits (e.g., being lazy), distant realistic threats activated local realistic threats, which subsequently influenced local intolerance (the threat-based association pathway). Taken together, our studies indicate that perceived realistic threats foreign can turn domestic, but in two different ways.

  7. An Overview of Non-traditional Nuclear Threats

    SciTech Connect

    Geelhood, Bruce D.; Wogman, Ned A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or ''dirty'' bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials entering our borders is considered. The radiation and other signatures or potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

  8. When anticipation beats accuracy: Threat alters memory for dynamic scenes.

    PubMed

    Greenstein, Michael; Franklin, Nancy; Martins, Mariana; Sewack, Christine; Meier, Markus A

    2016-05-01

    Threat frequently leads to the prioritization of survival-relevant processes. Much of the work examining threat-related processing advantages has focused on the detection of static threats or long-term memory for details. In the present study, we examined immediate memory for dynamic threatening situations. We presented participants with visually neutral, dynamic stimuli using a representational momentum (RM) paradigm, and manipulated threat conceptually. Although the participants in both the threatening and nonthreatening conditions produced classic RM effects, RM was stronger for scenarios involving threat (Exps. 1 and 2). Experiments 2 and 3 showed that this effect does not generalize to the nonthreatening objects within a threatening scene, and that it does not extend to arousing happy situations. Although the increased RM effect for threatening objects by definition reflects reduced accuracy, we argue that this reduced accuracy may be offset by a superior ability to predict, and thereby evade, a moving threat.

  9. Impaired Retrieval Inhibition of Threat Material in Generalized Anxiety Disorder.

    PubMed

    Kircanski, Katharina; Johnson, Douglas C; Mateen, Maria; Bjork, Robert A; Gotlib, Ian H

    2016-03-01

    Generalized Anxiety Disorder (GAD) is characterized by cognitive biases toward threat-relevant information, but the underlying mechanisms are unclear. We translated a retrieval-practice paradigm from cognitive science to investigate impaired inhibition of threat information as one such mechanism. Participants diagnosed with GAD and never-disordered control participants learned a series of cue-target pairs; whereas some cues were associated only with neutral targets, others were associated with both neutral and threat targets. Next, participants practiced retrieving neutral targets, which typically suppresses the subsequent recall of unpracticed associated targets (retrieval-induced forgetting; RIF). Finally, participants were tested on their recall of all targets. Despite showing intact RIF of neutral targets, the GAD group failed to exhibit RIF of threat targets. Furthermore, within the GAD group, less RIF of threat targets correlated with greater pervasiveness of worry. Deficits in inhibitory control over threat-relevant information may underlie the cognitive pathology of GAD, which has important treatment implications.

  10. Cyclone: A close air support aircraft for tomorrow

    NASA Technical Reports Server (NTRS)

    Cox, George; Croulet, Donald; Dunn, James; Graham, Michael; Ip, Phillip; Low, Scott; Vance, Gregg; Volckaert, Eric

    1991-01-01

    To meet the threat of the battlefield of the future, the U.S. ground forces will require reliable air support. To provide this support, future aircrews demand a versatile close air support aircraft capable of delivering ordinance during the day, night, or in adverse weather with pin-point accuracy. The Cyclone aircraft meets these requirements, packing the 'punch' necessary to clear the way for effective ground operations. Possessing anti-armor, missile, and precision bombing capability, the Cyclone will counter the threat into the 21st Century. Here, it is shown that the Cyclone is a realistic, economical answer to the demand for a capable close air support aircraft.

  11. Bioterrorism as a public health threat.

    PubMed Central

    Henderson, D. A.

    1998-01-01

    The threat of bioterrorism, long ignored and denied, has heightened over the past few years. Recent events in Iraq, Japan, and Russia cast an ominous shadow. Two candidate agents are of special concern--smallpox and anthrax. The magnitude of the problems and the gravity of the scenarios associated with release of these organisms have been vividly portrayed by two epidemics of smallpox in Europe during the 1970s and by an accidental release of aerosolized anthrax from a Russian bioweapons facility in 1979. Efforts in the United States to deal with possible incidents involving bioweapons in the civilian sector have only recently begun and have made only limited progress. Only with substantial additional resources at the federal, state, and local levels can a credible and meaningful response be mounted. For longer-term solutions, the medical community must educate both the public and policy makers about bioterrorism and build a global consensus condemning its use. PMID:9716981

  12. Females that experience threat are better teachers.

    PubMed

    Kleindorfer, Sonia; Evans, Christine; Colombelli-Négrel, Diane

    2014-05-01

    Superb fairy-wren (Malurus cyaneus) females use an incubation call to teach their embryos a vocal password to solicit parental feeding care after hatching. We previously showed that high call rate by the female was correlated with high call similarity in fairy-wren chicks, but not in cuckoo chicks, and that parent birds more often fed chicks with high call similarity. Hosts should be selected to increase their defence behaviour when the risk of brood parasitism is highest, such as when cuckoos are present in the area. Therefore, we experimentally test whether hosts increase call rate to embryos in the presence of a singing Horsfield's bronze-cuckoo (Chalcites basalis). Female fairy-wrens increased incubation call rate when we experimentally broadcast cuckoo song near the nest. Embryos had higher call similarity when females had higher incubation call rate. We interpret the findings of increased call rate as increased teaching effort in response to a signal of threat.

  13. Mission configurable threat detection sensor suite

    NASA Astrophysics Data System (ADS)

    Fortin, Jean; Cantin, Andre; Dubois, Jacques; Trudel, Carol

    2000-12-01

    This article describes work that has been undertaken at the Defence Research Establishment Valcartier (DREV) to integrate a number of electro-optics sensors into a modular mission configurable threat detection sensor suite (TDSS) demonstrator. The sensor suite is based on a series of plug and play detection heads networked together in the same fashion as a computer network. The architecture allows optimization of the detection capabilities according to a mission requirement. The TDSS demonstrator was developed to study different sensor configuration in order to establish the requirements to improve the protection of the military platforms. It is a good example showing how networking can help in adapting military systems to specific requirements. The paper gives an up to date description of the TDSS demonstrator. To our knowledge, it is the first time that this approach is used in the field of military detection sensors.

  14. Stereotype Threat and Women's Performance in Physics

    NASA Astrophysics Data System (ADS)

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-12-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST conditions. The conditions included an explicit ST condition, an implicit ST condition, and a nullified condition. Results indicated that males in all three conditions performed similarly on a set of physics problems. Females in the nullified condition outperformed females in the explicit ST condition and females in the implicit and explicit conditions performed similarly. Males performed better than females in the implicit and explicit ST conditions, but male and female performance on the physics problems was not significantly different in the nullified condition. The implications of these findings for physics instruction and future research on gender differences in physics and ST in science are discussed.

  15. 'Threats' to and hopes for estimating benefits.

    PubMed

    Ryan, Mandy; Amaya-Amaya, Mabelle

    2005-06-01

    In a recent paper in this journal, Andrew Lloyd reviewed some potential threats to the estimation of health care benefits in monetary terms. Particular emphasis was placed on the extent to which the use of non-compensatory heuristics may distort the results. Although it is useful to be reminded of these problems, Lloyd's paper does not do justice to the attention such issues have already received, and continue to receive, within Health Economics. The aim of this paper is twofold. Firstly, it seeks to provide a more balanced and comprehensive view of the evidence by considering some of the methodological work that health economists have conducted in many of the areas pointed out by Lloyd. Secondly, and more importantly, it suggests ways to combine the economic and psychological views of human decision-making, providing a much more positive perspective to all those researchers out there who recognize the necessity of using stated preference methods to inform health policy.

  16. Threat detection system for intersection collision avoidance

    NASA Astrophysics Data System (ADS)

    Jocoy, Edward H.; Pierowicz, John A.

    1998-01-01

    Calspan SRL Corporation is currently developing an on- vehicle threat detection system for intersection collision avoidance (ICA) as part of its ICA program with the National Highway Transportation Safety Administration. Crash scenarios were previously defined and an on-board radar sensor was designed. This paper describes recent efforts that include the development of a simulation of a multitarget tracker and collision avoidance algorithm used to predict system performance in a variety of target configurations in the various ICA crash scenarios. In addition, a current headway radar was mounted on the Calspan Instrumented Vehicle and in-traffic data were recorded for two limited crash scenarios. Warning functions were developed through the simulation and applied to the recorded data.

  17. Females that experience threat are better teachers

    PubMed Central

    Kleindorfer, Sonia; Evans, Christine; Colombelli-Négrel, Diane

    2014-01-01

    Superb fairy-wren (Malurus cyaneus) females use an incubation call to teach their embryos a vocal password to solicit parental feeding care after hatching. We previously showed that high call rate by the female was correlated with high call similarity in fairy-wren chicks, but not in cuckoo chicks, and that parent birds more often fed chicks with high call similarity. Hosts should be selected to increase their defence behaviour when the risk of brood parasitism is highest, such as when cuckoos are present in the area. Therefore, we experimentally test whether hosts increase call rate to embryos in the presence of a singing Horsfield's bronze-cuckoo (Chalcites basalis). Female fairy-wrens increased incubation call rate when we experimentally broadcast cuckoo song near the nest. Embryos had higher call similarity when females had higher incubation call rate. We interpret the findings of increased call rate as increased teaching effort in response to a signal of threat. PMID:24806422

  18. Monitoring Technologies for Mitigating Insider Threats

    NASA Astrophysics Data System (ADS)

    Bowen, Brian M.; Salem, Malek Ben; Keromytis, Angelos D.; Stolfo, Salvatore J.

    In this chapter, we propose a design for an insider threat detection system that combines an array of complementary techniques that aims to detect evasive adversaries. We are motivated by real world incidents and our experience with building isolated detectors: such standalone mechanisms are often easily identified and avoided by malefactors. Our work-in-progress combines host-based user-event monitoring sensors with trap-based decoys and remote network detectors to track and correlate insider activity. We introduce and formalize a number of properties of decoys as a guide to design trap-based defenses to increase the likelihood of detecting an insider attack. We identify several challenges in scaling up, deploying, and validating our architecture in real environments.

  19. Resurrecting Letters of Marque and Reprisal to Address Modern Threats

    DTIC Science & Technology

    2013-03-01

    framework for resurrecting a letter of marque and reprisal system as a means of addressing contemporary security threats within an environment of...and reprisal system as a means of addressing contemporary security threats within an environment of constrained military budgets and rebalanced...proposes a conceptual framework for resurrecting a letter of marque and reprisal system as a means of addressing contemporary security threats within an

  20. Managing the threat of terrorism in abortion facilities.

    PubMed

    Teasenfitz, J

    Acts of violence by anti-abortion terrorists are a growing threat to healthcare facilities and clinics. This article provides advice on deterring bomb threats, developing a bomb incident plan, ensuring the physical security of a facility, handling a bomb threat phone call or a suspicious object, and dealing with the media. Security plays a vital role in any anti-terrorist plan, says the author.

  1. Postural threat influences vestibular-evoked muscular responses.

    PubMed

    Lim, Shannon B; Cleworth, Taylor W; Horslen, Brian C; Blouin, Jean-Sébastien; Inglis, J Timothy; Carpenter, Mark G

    2017-02-01

    Standing balance is significantly influenced by postural threat. While this effect has been well established, the underlying mechanisms of the effect are less understood. The involvement of the vestibular system is under current debate, and recent studies that investigated the effects of height-induced postural threat on vestibular-evoked responses provide conflicting results based on kinetic (Horslen BC, Dakin CJ, Inglis JT, Blouin JS, Carpenter MG. J Physiol 592: 3671-3685, 2014) and kinematic (Osler CJ, Tersteeg MC, Reynolds RF, Loram ID. Eur J Neurosci 38: 3239-3247, 2013) data. We examined the effect of threat of perturbation, a different form of postural threat, on coupling (cross-correlation, coherence, and gain) of the vestibulo-muscular relationship in 25 participants who maintained standing balance. In the "No-Threat" conditions, participants stood quietly on a stable surface. In the "Threat" condition, participants' balance was threatened with unpredictable mediolateral support surface tilts. Quiet standing immediately before the surface tilts was compared to an equivalent time from the No-Threat conditions. Surface EMG was recorded from bilateral trunk, hip, and leg muscles. Hip and leg muscles exhibited significant increases in peak cross-correlation amplitudes, coherence, and gain (1.23-2.66×) in the Threat condition compared with No-Threat conditions, and significant correlations were observed between threat-related changes in physiological arousal and medium-latency peak cross-correlation amplitude in medial gastrocnemius (r = 0.408) muscles. These findings show a clear threat effect on vestibular-evoked responses in muscles in the lower body, with less robust effects of threat on trunk muscles. Combined with previous work, the present results can provide insight into observed changes during balance control in threatening situations.

  2. S5: New Threats to Cyber-Security

    DTIC Science & Technology

    2014-10-29

    2014 Carnegie Mellon University 29-Oct-2014 S5: New Threats to Cyber - Security Software Engineering Institute Carnegie Mellon University...TITLE AND SUBTITLE New Threats to Cyber - Security 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Sherman /Mark S. 5d...unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 2 Mark Sherman S5: New Threats to Cyber - Security © 2014 Carnegie

  3. Mechanisms of Visual Threat Detection in Specific Phobia

    PubMed Central

    Weierich, Mariann R.; Treat, Teresa A.

    2014-01-01

    People with anxiety or stress-related disorders attend differently to threat-relevant compared with non-threat stimuli, yet the temporal mechanisms of differential allocation of attention are not well-understood. We investigated two independent mechanisms of temporal processing of visual threat by comparing spider-phobic and non-fearful participants using a rapid serial visual presentation task. Consistent with prior literature, spider phobics, but not non-fearful controls, displayed threat-specific facilitated detection of spider stimuli relative to negative stimuli and neutral stimuli. Further, signal detection analyses revealed that facilitated threat detection in spider-phobic participants was driven by greater sensitivity to threat stimulus features and a trend toward a lower threshold for detecting spider stimuli. However, phobic participants did not display reliably slowed temporal disengagement from threat-relevant stimuli. These findings advance our understanding of threat feature processing that might contribute to the onset and maintenance of symptoms in specific phobia and disorders that involve visual threat information more generally. PMID:25251896

  4. Stereotype Threat Alters the Subjective Experience of Memory.

    PubMed

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  5. Stereotype threat in salary negotiations is mediated by reservation salary.

    PubMed

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation.

  6. Mechanisms of visual threat detection in specific phobia.

    PubMed

    Weierich, Mariann R; Treat, Teresa A

    2015-01-01

    People with anxiety or stress-related disorders attend differently to threat-relevant compared with non-threat stimuli, yet the temporal mechanisms of differential allocation of attention are not well understood. We investigated two independent mechanisms of temporal processing of visual threat by comparing spider-phobic and non-fearful participants using a rapid serial visual presentation task. Consistent with prior literature, spider phobics, but not non-fearful controls, displayed threat-specific facilitated detection of spider stimuli relative to negative stimuli and neutral stimuli. Further, signal detection analyses revealed that facilitated threat detection in spider-phobic participants was driven by greater sensitivity to threat stimulus features and a trend towards a lower threshold for detecting spider stimuli. However, phobic participants did not display reliably slowed temporal disengagement from threat-relevant stimuli. These findings advance our understanding of threat feature processing that might contribute to the onset and maintenance of symptoms in specific phobia and disorders that involve visual threat information more generally.

  7. Out-Group Mating Threat and Disease Threat Increase Implicit Negative Attitudes Toward the Out-Group Among Men

    PubMed Central

    Klavina, Liga; Buunk, Abraham P.; Pollet, Thomas V.

    2011-01-01

    We investigated if perceiving an out-group as a threat to one's mating opportunities enhanced the implicit negative attitudes toward that out-group. In addition, we examined the moderating effect of disease threat on the relationship between an out-group mating threat and implicit negative attitudes toward that out-group. In Experiment 1, an out-group mating threat led to stronger implicit negative out-group attitudes as measured by the Implicit Association Test, but only for men with high chronic perceived vulnerability to disease. No such effects were found among women. In Experiment 2, men in the out-group mating threat condition who were primed with disease prevalence showed significantly stronger implicit negative attitudes toward the out-group than controls. Findings are discussed with reference to the functional approach to prejudice and sex-specific motivational reactions to different out-group threats. PMID:21687447

  8. Maritime Security in the Gulf of Guinea Subregion: Threats, Challenges and Solutions

    DTIC Science & Technology

    2011-03-16

    number of piracy attacks.10 The GoG is among the world’s richest marine ecosystem , yet its fisheries are among the most weakly protected and are extremely...vulnerable to illicit commercial fishing and overfishing . This marine basin is also home to crime syndicates that have successfully stolen large...International Maritime Organization, Movement for the Emancipation of Niger Delta, Marine Pollution, Maritime Organization of West and Central Africa

  9. Threats to sandy beach ecosystems: A review

    NASA Astrophysics Data System (ADS)

    Defeo, Omar; McLachlan, Anton; Schoeman, David S.; Schlacher, Thomas A.; Dugan, Jenifer; Jones, Alan; Lastra, Mariano; Scapini, Felicita

    2009-01-01

    We provide a brief synopsis of the unique physical and ecological attributes of sandy beach ecosystems and review the main anthropogenic pressures acting on the world's single largest type of open shoreline. Threats to beaches arise from a range of stressors which span a spectrum of impact scales from localised effects (e.g. trampling) to a truly global reach (e.g. sea-level rise). These pressures act at multiple temporal and spatial scales, translating into ecological impacts that are manifested across several dimensions in time and space so that today almost every beach on every coastline is threatened by human activities. Press disturbances (whatever the impact source involved) are becoming increasingly common, operating on time scales of years to decades. However, long-term data sets that describe either the natural dynamics of beach systems or the human impacts on beaches are scarce and fragmentary. A top priority is to implement long-term field experiments and monitoring programmes that quantify the dynamics of key ecological attributes on sandy beaches. Because of the inertia associated with global climate change and human population growth, no realistic management scenario will alleviate these threats in the short term. The immediate priority is to avoid further development of coastal areas likely to be directly impacted by retreating shorelines. There is also scope for improvement in experimental design to better distinguish natural variability from anthropogenic impacts. Sea-level rise and other effects of global warming are expected to intensify other anthropogenic pressures, and could cause unprecedented ecological impacts. The definition of the relevant scales of analysis, which will vary according to the magnitude of the impact and the organisational level under analysis, and the recognition of a physical-biological coupling at different scales, should be included in approaches to quantify impacts. Zoning strategies and marine reserves, which have not

  10. Driving Less for Better Air: Impacts of a Public Information Campaign

    ERIC Educational Resources Information Center

    Henry, Gary T.; Gordon, Craig S.

    2003-01-01

    In the wake of the 1990 amendments to the Clean Air Act, localities across the United States initiated public information campaigns both to raise awareness of threats to air quality and to change behavior related to air pollution by recommending specific behavioral changes in the campaign messages. These campaigns are designed to reduce the health…

  11. How Does Air Pollution Threaten Basic Human Rights? The Case Study of Bulgaria

    ERIC Educational Resources Information Center

    Ahmedova, Aylin Hasanova

    2016-01-01

    The main purpose of this article is to analyze the relationship between air pollution and human rights. It investigates whether air pollution threatens basic human rights such as the right to health, life, and the environment. Air pollution represents a major threat both to health and to the environment. Despite the adoption of numerous…

  12. 33 CFR 334.740 - North Shore Choctawhatchee Bay, Eglin Air Force Base, Fla.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., Eglin Air Force Base, Fla. 334.740 Section 334.740 Navigation and Navigable Waters CORPS OF ENGINEERS... Shore Choctawhatchee Bay, Eglin Air Force Base, Fla. (a) The area. The restricted area shall encompass... identification checks by U.S. Air Force patrol boats. During times of high security threats against Eglin...

  13. 33 CFR 334.740 - North Shore Choctawhatchee Bay, Eglin Air Force Base, Fla.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., Eglin Air Force Base, Fla. 334.740 Section 334.740 Navigation and Navigable Waters CORPS OF ENGINEERS... Shore Choctawhatchee Bay, Eglin Air Force Base, Fla. (a) The area. The restricted area shall encompass... identification checks by U.S. Air Force patrol boats. During times of high security threats against Eglin...

  14. 33 CFR 334.740 - North Shore Choctawhatchee Bay, Eglin Air Force Base, Fla.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., Eglin Air Force Base, Fla. 334.740 Section 334.740 Navigation and Navigable Waters CORPS OF ENGINEERS... Shore Choctawhatchee Bay, Eglin Air Force Base, Fla. (a) The area. The restricted area shall encompass... identification checks by U.S. Air Force patrol boats. During times of high security threats against Eglin...

  15. Threat Level High (School): Curriculum Reform with Violence in Mind

    ERIC Educational Resources Information Center

    Hawkes, T. Elijah; Twemlow, Stuart W.

    2015-01-01

    When school communities are troubled by violence, or threats of violence, at the hands of young people, educators have an opportunity to learn about aggression and adolescent identity development. A disturbing threat incident provides the point of departure for this principal's reflection on how high school curriculum can better meet the identity…

  16. 49 CFR 1572.5 - Standards for security threat assessments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Standards for security threat assessments. 1572.5... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.5 Standards for...

  17. Research in Review. Children Living with the Nuclear Threat.

    ERIC Educational Resources Information Center

    Reifel, Stuart

    1984-01-01

    Reviews the literature on children and the threat of nuclear war, focusing on four areas: awareness of nuclear weapons, fear of the bomb, influences on personality, and denial of the threat. The research is briefly critiqued, and implications for early childhood are drawn. (RH)

  18. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 1 2013-07-01 2013-07-01 false Direct threat defense. 60-250.22 Section 60-250.22 Public Contracts and Property Management Other Provisions Relating to... PROTECTED VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as...

  19. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 1 2013-07-01 2013-07-01 false Direct threat defense. 60-741.22 Section 60-741.22 Public Contracts and Property Management Other Provisions Relating to... REGARDING INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense....

  20. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Direct threat defense. 60-741.22 Section 60-741.22 Public Contracts and Property Management Other Provisions Relating to Public... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor...

  1. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 1 2013-07-01 2013-07-01 false Direct threat defense. 60-300.22 Section 60-300.22 Public Contracts and Property Management Other Provisions Relating to... MEDAL VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as...

  2. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Direct threat defense. 60-250.22 Section 60-250.22 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as...

  3. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Direct threat defense. 60-300.22 Section 60-300.22 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as...

  4. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Direct threat defense. 60-250.22 Section 60-250.22 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as...

  5. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Direct threat defense. 60-741.22 Section 60-741.22 Public Contracts and Property Management Other Provisions Relating to Public... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor...

  6. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Direct threat defense. 60-300.22 Section 60-300.22 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as...

  7. Lack of Stereotype Threat at a Liberal Arts College

    ERIC Educational Resources Information Center

    Rivardo, Mark G.; Rhodes, Michael E.; Klein, Brandi

    2008-01-01

    Stereotype threat has been demonstrated to reduce the performance of stereotyped individuals in the threatened domain (Steele & Aronson, 1995). This study attempted to replicate the finding that stereotype threat instruction can erase the performance deficit women experience in math performance (Johns, Schmader, & Martens, 2005) and to…

  8. Creating Safe Learning Zones: Invisible Threats, Visible Actions.

    ERIC Educational Resources Information Center

    2002

    This report is a follow-up to the first publication of the Child Proofing Our Communities Campaign, titled "Poisoned Schools: Invisible Threats, Visible Actions." The previous report looked at the problems of public schools built on contaminated land years ago, the trend of proposing new schools on contaminated land, and the threat of…

  9. Maternal Anxiety Predicts Attentional Bias Towards Threat in Infancy.

    PubMed

    Morales, Santiago; Brown, Kayla M; Taber-Thomas, Bradley C; LoBue, Vanessa; Buss, Kristin A; Pérez-Edgar, Koraly E

    2017-02-16

    Although cognitive theories of psychopathology suggest that attention bias toward threat plays a role in the etiology and maintenance of anxiety, there is relatively little evidence regarding individual differences in the earliest development of attention bias toward threat. The current study examines attention bias toward threat during its potential first emergence by evaluating the relations between attention bias and known risk factors of anxiety (i.e., temperamental negative affect and maternal anxiety). We measured attention bias to emotional faces in infants (N = 98; 57 male) ages 4 to 24 months during an attention disengagement eye-tracking paradigm. We hypothesized that (a) there would be an attentional bias toward threat in the full sample of infants, replicating previous studies; (b) attentional bias toward threat would be positively related to maternal anxiety; and (c) attention bias toward threat would be positively related to temperamental negative affect. Finally, (d) we explored the potential interaction between temperament and maternal anxiety in predicting attention bias toward threat. We found that attention bias to the affective faces did not change with age, and that bias was not related to temperament. However, attention bias to threat, but not attention bias to happy faces, was positively related to maternal anxiety, such that higher maternal anxiety predicted a larger attention bias for all infants. These findings provide support for attention bias as a putative early mechanism by which early markers of risk are associated with socioemotional development. (PsycINFO Database Record

  10. Is Academic Freedom a Threat to Teaching Introductory Science?

    ERIC Educational Resources Information Center

    French, Donald P.

    2005-01-01

    Graves (2005) suggested that academic freedom might impede efforts to improve institutional performance and achieve the goals set for learning outcomes, cost efficiency, and preparing students for the workplace. The author's initial response to threats to academic freedom and calls for efficiency is to bristle, because he views these as threats to…

  11. Investigating Hypervigilance for Social Threat of Lonely Children

    ERIC Educational Resources Information Center

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  12. Soviet military power: an assessment of the threat

    SciTech Connect

    Not Available

    1988-01-01

    Contents include: the nature of the Soviet threat--Soviet national-security policies; Soviet foreign policy under Gorbachev; military resources allocation; Soviet strategic programs and space forces; Soviet conventional forces; an assessment of the threat--the strategic balance; regional and functional balances; research and development: the technological competition; collective security: our risks and responsibilities.

  13. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION... 49 Transportation 9 2012-10-01 2012-10-01 false Procedures for security threat assessment. 1540... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  14. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION... 49 Transportation 9 2011-10-01 2011-10-01 false Procedures for security threat assessment. 1540... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  15. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION... 49 Transportation 9 2014-10-01 2014-10-01 false Procedures for security threat assessment. 1540... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  16. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION... 49 Transportation 9 2013-10-01 2013-10-01 false Procedures for security threat assessment. 1540... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  17. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION... 49 Transportation 9 2010-10-01 2010-10-01 false Procedures for security threat assessment. 1540... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  18. Cybersecurity: The Nation’s Greatest Threat to Critical Infrastructure

    DTIC Science & Technology

    2013-03-01

    Cybersecurity: The Nation’s Greatest Threat To Critical Infrastructure by Lieutenant Colonel Nikki L. Griffin Olive...The Nation’s Greatest Threat To Critical Infrastructure 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S... infrastructure has grown to potentially catastrophic dimensions. Critical Infrastructure protection has become a matter of national security, public safety

  19. Protected areas in tropical Africa: assessing threats and conservation activities.

    PubMed

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  20. Superior Detection of Threat-Relevant Stimuli in Infancy

    ERIC Educational Resources Information Center

    LoBue, Vanessa; DeLoache, Judy S.

    2010-01-01

    The ability to quickly detect potential threat is an important survival mechanism for humans and other animals. Past research has established that adults have an attentional bias for the detection of threat-relevant stimuli, including snakes and spiders as well as angry human faces. Recent studies have documented that preschool children also…

  1. Of guns and snakes: testing a modern threat superiority effect.

    PubMed

    Subra, Baptiste; Muller, Dominique; Fourgassie, Lisa; Chauvin, Alan; Alexopoulos, Theodore

    2017-02-03

    Previous studies suggest that ancient (i.e. evolutionary-based) threats capture attention because human beings possess an inborn module shaped by evolution and dedicated to their detection. An alternative account proposes that a key feature predicting whether a stimulus will capture attention is its relevance rather than its ontology (i.e. phylogenetic or ontogenetic threat). Within this framework, the present research deals with the attentional capture by threats commonly encountered in our urban environment. In two experiments, we investigate the attentional capture by modern threats (i.e. weapons). In Experiment 1, participants responded to a target preceded by a cue, which was a weapon or a non-threatening stimulus. We found a larger cuing effect (faster reaction times to valid vs. invalid trials) with weapons as compared with non-threatening cues. In Experiment 2, modern (e.g. weapons) and ancient threats (e.g. snakes) were pitted against one another as cues to determine which ones preferentially capture attention. Crucially, participants were faster to detect a target preceded by a modern as opposed to an ancient threat, providing initial evidence for a superiority of modern threat. Overall, the present findings appear more consistent with a relevance-based explanation rather than an evolutionary-based explanation of threat detection.

  2. A Stereotype Threat Account of Boys' Academic Underachievement

    ERIC Educational Resources Information Center

    Hartley, Bonny L.; Sutton, Robbie M.

    2013-01-01

    Three studies examined the role of stereotype threat in boys' academic underachievement. Study 1 (children aged 4-10, n = 238) showed that girls from age 4 years and boys from age 7 years believed, and thought adults believed, that boys are academically inferior to girls. Study 2 manipulated stereotype threat, informing children aged…

  3. Coping with threats of terrorism: a protocol for group intervention.

    PubMed

    Ottenstein, Richard J

    2003-01-01

    This article presents a group protocol designed to assist people in coping with direct and ongoing threats of terrorism. The protocol is intended to enable participants to address the psychological issues necessary to cope during periods of extreme threat. A step-by-step description of the protocol is provided.

  4. Political homogeneity can nurture threats to research validity.

    PubMed

    Chambers, John R; Schlenker, Barry R

    2015-01-01

    Political homogeneity within a scientific field nurtures threats to the validity of many research conclusions by allowing ideologically compatible values to influence interpretations, by minimizing skepticism, and by creating premature consensus. Although validity threats can crop in any research, the usual corrective activities in science are more likely to be minimized and delayed.

  5. Protected Areas in Tropical Africa: Assessing Threats and Conservation Activities

    PubMed Central

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M.; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A.; Davenport, Tim R. B.; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A.; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C.; Holbech, Lars H.; Huijbregts, Bas; Kühl, Hjalmar S.; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K.; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G.; Petre, Charles-Albert; Rainey, Hugo J.; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M.; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  6. 78 FR 46782 - Federal Acquisition Regulation; Iran Threat Reduction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-01

    ... RIN 9000-AM44 Federal Acquisition Regulation; Iran Threat Reduction AGENCIES: Department of Defense... expansion of sanctions relating to the energy sector of Iran and sanctions with respect to Iran's Revolutionary Guard Corps, as contained in titles II and III of the Iran Threat Reduction and Syria Human...

  7. An examination of stereotype threat effects on girls' mathematics performance.

    PubMed

    Ganley, Colleen M; Mingle, Leigh A; Ryan, Allison M; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-10-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In a series of 3 studies, with a total sample of 931 students, we investigated stereotype threat effects during childhood and adolescence. Three activation methods were used, ranging from implicit to explicit. Across studies, we found no evidence that the mathematics performance of school-age girls was impacted by stereotype threat. In 2 of the studies, there were gender differences on the mathematics assessment regardless of whether stereotype threat was activated. Potential reasons for these findings are discussed, including the possibility that stereotype threat effects only occur in very specific circumstances or that they are in fact occurring all the time. We also address the possibility that the literature regarding stereotype threat in children is subject to publication bias.

  8. Coupling measurement and lightning threat assessment report for Pantex Cell 12-44-1

    SciTech Connect

    Ong, Mike; Anderson, Robert

    1998-09-01

    This report is the first of a series that will quantify the lightning threat to the Pantex Plant where high-risk operations occur. More information can be found in the report written by the Lightning Protection Team [1] and Sandia National Laboratory documents. Low-power RF coupling measurements were completed on Cell 12-44-1 in May 1998. These measurements quantify the voltage and current levels that could leak into the cell from possible lightning strike points. Cell 1 is representative of the most "leaky" class of cells at Pantex because the floor was not intentionally electrically connected to the walls. From the measurement data, linear models were developed. These transfer functions allow us to calculate the effect in the cell from the much higher power lightning threat. Two types of coupling paths were characterized: (1) external ventilation stack to cell interior and (2) cell ceiling to other cell elements. For the maximum lightning threat [2], an estimate of the maximum cell-to-floor voltage is 150 kV. The extrapolated voltage levels at normal working heights are lower. The potential between the air duct and the electro-static ground is estimated to be 4 kV. A secondary goal was to compare results with Sandia as a quality control check. While the estimated maximum ceiling-to-floor voltages are similar, the comparison was limited by high-frequency resonances on the drive wire.

  9. A New Approach to Ballistic Missile Defense for Countering Antiaccess/Area-Denial Threats from Precision-Guided Weapons

    DTIC Science & Technology

    2013-04-01

    Congress, CRS Report for Congress (Washington, DC: Congressional Research Ser- vice, 18 March 2012), 3–5. 5. Mohammad-Ali Massoumnia, Q- Guidance in Rotating...NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Air Force Research Institute (AFRI),155 N. Twining...Furthermore, the MDA has dedicated nearly all of its re- cent development to the midcourse phase of flight, where the threat has the greatest freedom to

  10. Perceived control qualifies the effects of threat on prejudice.

    PubMed

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat.

  11. Dissociated neural effects of cortisol depending on threat escapability.

    PubMed

    Montoya, Estrella R; van Honk, Jack; Bos, Peter A; Terburg, David

    2015-11-01

    Evolution has provided us with a highly flexible neuroendocrine threat system which, depending on threat imminence, switches between active escape and passive freezing. Cortisol, the "stress-hormone", is thought to play an important role in both fear behaviors, but the exact mechanisms are not understood. Using pharmacological functional magnetic resonance imaging we investigated how cortisol modulates the brain's fear systems when humans are under virtual-predator attack. We show dissociated neural effects of cortisol depending on whether escape from threat is possible. During inescapable threat cortisol reduces fear-related midbrain activity, whereas in anticipation of active escape cortisol boosts activity in the frontal salience network (insula and anterior cingulate cortex), which is involved in autonomic control, visceral perception and motivated action. Our findings suggest that cortisol adjusts the human neural threat system from passive fear to active escape, which illuminates the hormone's crucial role in the adaptive flexibility of fear behaviors.

  12. Unhealthy interactions: the role of stereotype threat in health disparities.

    PubMed

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  13. Biological warfare--an emerging threat.

    PubMed

    Agarwal, Reshma; Shukla, S K; Dharmani, S; Gandhi, A

    2004-09-01

    As we approach the 21st century, there is an increasing worldwide awareness and threat regarding the use of biological warfare agents both for war and terrorist attack. Biological agents include microorganisms or biological toxins that are used to produce death in humans, animals and plants. They are characterized by low visibility, high potency, substantial accessibility and relatively easy delivery. Biological warfare agents are unconventional weapons that can be delivered by unconventional means like aerosol sprays, food and water contamination, conventional explosive munitions or by covert injections. Because of their concealed delivery, easy transportation and difficult identification they are readily adaptable for terrorist operations or to gain political advantages. The detection of such attack requires recognition of the clinical syndromes associated with various biological warfare agents. Diagnosis can be made on clinical grounds and on investigations. Protective measures can be taken against biological warfare agents. These should be implemented early (if warning is received) or later (once suspicion of agent use is made). After the confirmation of diagnosis emergency medical treatment and decontamination are performed in rapid sequence. Patients are then evacuated and specific therapy is given according to the agent involved. Appropriate emergency department and hospital response could significantly limit the morbidity and mortality of biological warfare agents.

  14. [Chikungunya fever - A new global threat].

    PubMed

    Montero, Antonio

    2015-08-07

    The recent onset of epidemics caused by viruses such as Ebola, Marburg, Nipah, Lassa, coronavirus, West-Nile encephalitis, Saint Louis encephalitis, human immunodeficiency virus, dengue, yellow fever and Venezuelan hemorrhagic fever alerts about the risk these agents represent for the global health. Chikungunya virus represents a new threat. Surged from remote African regions, this virus has become endemic in the Indic ocean basin, the Indian subcontinent and the southeast of Asia, causing serious epidemics in Africa, Indic Ocean Islands, Asia and Europe. Due to their epidemiological and biological features and the global presence of their vectors, chikungunya represents a serious menace and could become endemic in the Americas. Although chikungunya infection has a low mortality rate, its high attack ratio may collapse the health system during epidemics affecting a sensitive population. In this paper, we review the clinical and epidemiological features of chikungunya fever as well as the risk of its introduction into the Americas. We remark the importance of the epidemiological control and mosquitoes fighting in order to prevent this disease from being introduced into the Americas.

  15. Integrated optic chip for laser threat identification

    NASA Astrophysics Data System (ADS)

    McAulay, Alastair D.

    2010-04-01

    In this conference last year, we proposed free-space gratings, Fizeau interferometers and wavefront estimation for detecting the different lasers deployed in the battlefield for range finding, target designation, communications, dazzle, location of targets, munitions guidance, and destruction. Since last year, advanced laser weapons of the electron cyclotron type, are in development, such as the free-electron laser, that are tunable and can, unlike conventional bound-electron state lasers, be used at any wavelength from microwaves to soft X-rays. We list the characteristics of the nine dominant laser weapons because we assume that the free-electron lasers will initially use one of the current threat wavelengths because of availability of components and instrumentation. In this paper we replace the free-space grating with a higher performing array waveguide grating integrated optic chip, similar to that used in telecommunications, because integrated circuits are more robust and less expensive. It consists of a star coupler that fans out amongst waveguides of different length followed by a star coupler that focuses different wavelengths to different outputs in order to separate them. Design equations are derived to cover a range of frequencies at specific frequency spacing relevant to this application.

  16. Depressed mood enhances anxiety to unpredictable threat

    PubMed Central

    Robinson, OJ; Overstreet, C; Letkiewicz, A; Grillon, C

    2011-01-01

    Background Depression and anxiety disorders (AD) are highly comorbid, but the reason for this comorbidity is unclear. One possibility is that they predispose one another. An informative way to examine interactions between disorders without the confounds present in patient populations is to manipulate the psychological processes thought to underlie the pathological states in healthy individuals. In this paper we therefore asked whether a model of the sad mood in depression can enhance psychophysiological responses (startle) to a model of the anxiety in AD. We predicted that sad mood would increase anxious anxiety-potentiated startle responses. Methods In a between-subjects design, participants (N=36) completed either a sad mood induction procedure (N=18) or neutral mood induction procedure (N=18). Startle responses were assessed during short duration predictable electric shock conditions (fear-potentiated startle) or long-duration unpredictable threat of shock conditions (anxiety-potentiated startle). Results Induced sadness enhanced anxiety-, but not fear- potentiated startle. Conclusions This study provides support for the hypothesis that sadness can increase anxious responding measured by the affective startle response. This, taken together with prior evidence that AD can contribute to depression, provides initial experimental support for the proposition that AD and depression are frequently comorbid because they may be mutually reinforcing. PMID:22088577

  17. Gonococcal endocarditis: an ever-present threat

    PubMed Central

    Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society’s poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient’s clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  18. Superluminous supernovae: no threat from eta Carinae.

    PubMed

    Thomas, Brian C; Melott, Adrian L; Fields, Brian D; Anthony-Twarog, Barbara J

    2008-02-01

    Recently, Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of approximately 10(44) Joules. It was proposed that the progenitor may have been a massive evolved star similar to eta Carinae, which resides in our own Galaxy at a distance of about 2.3 kpc. eta Carinae appears ready to detonate. Although it is too distant to pose a serious threat as a normal supernova, and given that its rotation axis is unlikely to produce a gamma-ray burst oriented toward Earth, eta Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We have found that, given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over approximately 10(4) y and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possible effect of supernovae-e-ndocrine disruption induced by blue light near the peak of the optical spectrum. This is a possibility for nearby supernovae at distances too large to be considered "dangerous" for other reasons. However, due to reddening and extinction by the interstellar medium, eta Carinae is unlikely to trigger such effects to any significant degree.

  19. Countering GPS jamming and EW threat

    NASA Astrophysics Data System (ADS)

    Pereira, Carlos M.; Rastegar, J.; McLain, Clifford E.; Alanson, T.; McMullan, Charles; Nguyen, H.-L.

    2007-09-01

    Efforts at the U.S. Army Research, Development and Engineering Center (ARDEC) at Picatinny, New Jersey are focused on developing methods to counter GPS jamming and electronic warfare (EW) threat by eliminating GPS dependency entirely. In addition, the need for munitions cost reduction requires alternatives to expensive high-grade inertia components. Efforts at ARDEC include investigations of novel methods for onboard measurement of munitions full position and angular orientation independent of GPS signals or high-grade inertia components. Currently, two types of direct angular measurement sensors are being investigated. A first sensor, Radio Frequency Polarized Sensor (RFPS), uses an electromagnetic field as a reference. A second sensor is based on magnetometers, using the Earth magnetic field for orientation measurement. Magnetometers, however, can only provide two independent orientation measurements. The RFPS may also be used to make full object position and angular orientation measurement relative to a reference coordinate system, which may be moving or stationary. The potential applications of novel RFPS sensors is in providing highly effective inexpensive replacement for GPS, which could be used in a "Layered Navigation" scheme employing alternate referencing methods and reduce the current dependency on GPS as a primary reference for guided gun-fired munitions. Other potential applications of RFPSs is in UAVs, UGVs, and robotic platforms.

  20. SLATE: scanning laser automatic threat extraction

    NASA Astrophysics Data System (ADS)

    Clark, David J.; Prickett, Shaun L.; Napier, Ashley A.; Mellor, Matthew P.

    2016-10-01

    SLATE is an Autonomous Sensor Module (ASM) designed to work with the SAPIENT system providing accurate location tracking and classifications of targets that pass through its field of view. The concept behind the SLATE ASM is to produce a sensor module that provides a complementary view of the world to the camera-based systems that are usually used for wide area surveillance. Cameras provide a hi-fidelity, human understandable view of the world with which tracking and identification algorithms can be used. Unfortunately, positioning and tracking in a 3D environment is difficult to implement robustly, making location-based threat assessment challenging. SLATE uses a Scanning Laser Rangefinder (SLR) that provides precise (<1cm) positions, sizes, shapes and velocities of targets within its field-of-view (FoV). In this paper we will discuss the development of the SLATE ASM including the techniques used to track and classify detections that move through the field of view of the sensor providing the accurate tracking information to the SAPIENT system. SLATE's ability to locate targets precisely allows subtle boundary-crossing judgements, e.g. on which side of a chain-link fence a target is. SLATE's ability to track targets in 3D throughout its FoV enables behavior classification such as running and walking which can provide an indication of intent and help reduce false alarm rates.

  1. Warhead Performance Calculations for Threat Hazard Assessment

    DTIC Science & Technology

    1996-08-01

    correlation can be drawn between an explosive’s heat of combustion, heat of detonation , and its EWF. The method of Baroody and Peters41 was used to calculate...from air-blast tests can be rationalized to a combination of an explosive’s heat of combustion and heat of detonation ratioed to the heat of...Center, China Lake, California, NWC TM 3754, February 1979. 41. Baroody, E. and Peters, S., Heats of Explosion, Heat of Detonation , and Reaction

  2. SPETsNAZ: A Soviet Sabotage Threat.

    DTIC Science & Technology

    1986-04-01

    Commissioning Program (AECPF. In 1972 he graduated with honors from Michigan State University with a Bachelor of Arts degree in Political Science ...on air attac: or oerhaos missile taraetino if warranted. Althouah SFETsNAZ saboteurs ma’ not physicall ,,, destroy or damage the target themselves, the...N BIBLIOGRAPHY A. REFERENCES CITED Books 1. Barnett. Frank R.. Richard H. Shultz, and B. Hugh Tovar (ed). Special Operations in US Strategy. National

  3. Identifying key conservation threats to Alpine birds through expert knowledge

    PubMed Central

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  4. Public health and bioterrorism: renewed threat of anthrax and smallpox.

    PubMed

    Wallin, Arūne; Luksiene, Zivile; Zagminas, Kestutis; Surkiene, Gene

    2007-01-01

    Bioterrorism is one of the main public health categorical domains. According to sociological analytics, in postmodern society terrorism is one of the real threats of the 21st century. While rare, the use of biological weapons has a long history. Recently, anthrax has been evaluated as one of the most dangerous biological weapons. Naturally occurring anthrax in humans is a disease acquired from contact with anthrax-infected animals or anthrax-contaminated animal products. Usually anthrax infection occurs in humans by three major routes: inhalational, cutaneous, and gastrointestinal. Inhalational anthrax is expected to account for most serious morbidity and most mortality. The clinical presentation of inhalation anthrax has been described as a two-stage illness. Many factors contribute to the pathogenesis of Bacillus anthracis. Antibiotics, anthrax globulin, corticosteroids, mechanical ventilation, vaccine are possible tools of therapy. Smallpox existed in two forms: variola major, which accounted for most morbidity and mortality, and a milder form, variola minor. Smallpox spreads from person to person primarily by droplet nuclei or aerosols expelled from the oropharynx of infected persons and by direct contact. In the event of limited outbreak with few cases, patients should be admitted to the hospital and confined to rooms that are under negative pressure and equipped with high-efficiency particulate air filtration. In larger outbreaks, home isolation and care should be the objective for most patients. Progress in detection, suitable vaccines, postexposure prophylaxis, infection control, and decontamination might be serious tools in fight against the most powerful biological weapon. To assure that the public health and healthcare system can respond to emergencies, the government should direct resources to strengthen the emergency-response system, create medication stockpiles, and improve the public health infrastructure.

  5. Back to the Future: Integrated Air and Missile Defense in the Pacific

    DTIC Science & Technology

    2015-02-01

    credible threat to airfields, access led the Air Force toward a model of air base operation s that emphasized the use of main operating bases ( MOB ...attack simply because a credible threat did not exist. In Clausewitzian terms, these MOBs are centers of gravity-not only a source of strength for...PACAF has pro- grammed for CRATR at its MOBs to ensure the restoration of combat- sortie generation quickly despite enemy attacks. The Best Defense Is a

  6. World wide web: opportunities, challenges, and threats.

    PubMed

    Edworthy, S M

    1999-01-01

    The Internet provides new opportunities to gather information on the population and may provide alternatives to the traditional methods of conducting clinical trials in systemic lupus erythematosus. The 'world wide web-www' has grown extensively in the past decade and it is estimated that there will be over 1 billion individuals on the net by the year 2005. Notifying, recruiting and assessing patients using Internet technology are already potential uses of this electronic medium. However, total reliance on the Internet could lead to biased sampling of patients with lupus. Women with low incomes or who are unemployed are less likely to have access to the Internet. Individuals with neurological deficits may have trouble using the Internet effectively. Data collected on the web may not have high reliability and much work needs to be completed to determine the psychometric properties of information derived from this source. One of the greatest threats to contend with is protecting the confidentiality of patient information when using electronic communication. Safeguards against inadvertent or unintended release of information must receive high priority in any attempt to use the Internet for clinical trials. Particular attention should be paid to email messages, which have the potential to be intercepted or sent to individuals without clearance to see patient information. Nevertheless, the costs to systems performance caused by security measures must also be considered and balanced against the need for access by those with appropriate authority. A number of websites already exist for the benefit of patients and providers. Clinicians and scientists interested in the field of lupus research will need to keep up to date on the rapidly proliferating information that is becoming available. This article lists sites which can be visited now.

  7. Recognizing the real threat of biological terror.

    PubMed Central

    Wenzel, Richard P.

    2002-01-01

    Weapons of mass destruction can be used to harm and terrorize populations. Such weapons include those with chemical, nuclear or biological properties. Obviously computer viruses can add additional barriers to a quick response. The most effective, least costly and greatest threats are biologicals. Biological terror is not new, and biological weapons have been used for centuries. However, as a result of modern technology, the risks are greater now and the outcomes more terrible. Today they include live pathogens, various toxins, and theoretically "bioregulators"--biochemicals affecting cell signaling. Altered cell signaling could be used to induce apoptosis-cell death, or a heightened outpouring of cytokines mimicking overwhelming sepsis, or even an intracellular, biochemical "strike" causing cellular paralysis. Biological weaponeers now have the frightening ability to alter the genetic makeup of pathogens, rendering them resistant not only to available antibiotic therapy but also to currently effective vaccines. In dark corners of some fringe groups, bioweaponeers are searching for the capability of designing pathogens that target specific races, by virtue of discriminating ligands (1). The resulting morbidity and mortality from use of any biological weapons will be accompanied by chaos, governmental and social instability, panic, an extraordinary utilization of available resources, and an ongoing epidemic of sleepless nights (2,3). Herein I will review some of the issues and some of the currently available biological weapons. The major goal is to highlight the clinical presentations of patients with infections that could be used as biological weapons. Images Fig. 1 Fig. 2 Fig. 3 Fig. 4 PMID:12053717

  8. Chemical-Sensing Cables Detect Potential Threats

    NASA Technical Reports Server (NTRS)

    2007-01-01

    Intelligent Optical Systems Inc. (IOS) completed Phase I and II Small Business Innovation Research (SBIR) contracts with NASA's Langley Research Center to develop moisture- and pH-sensitive sensors to detect corrosion or pre-corrosive conditions, warning of potentially dangerous conditions before significant structural damage occurs. This new type of sensor uses a specially manufactured optical fiber whose entire length is chemically sensitive, changing color in response to contact with its target, and demonstrated to detect potentially corrosive moisture incursions to within 2 cm. After completing the work with NASA, the company received a Defense Advanced Research Projects Agency (DARPA) Phase III SBIR to develop the sensors further for detecting chemical warfare agents, for which they proved just as successful. The company then worked with the U.S. Department of Defense (DoD) to fine tune the sensors for detecting potential threats, such as toxic industrial compounds and nerve agents. In addition to the work with government agencies, Intelligent Optical Systems has sold the chemically sensitive fiber optic cables to major automotive and aerospace companies, who are finding a variety of uses for the devices. Marketed under the brand name Distributed Intrinsic Chemical Agent Sensing and Transmission (DICAST), these unique continuous-cable fiber optic chemical sensors can serve in a variety of applications: Corrosive-condition monitoring, aiding experimentation with nontraditional power sources, as an economical means of detecting chemical release in large facilities, as an inexpensive "alarm" systems to alert the user to a change in the chemical environment anywhere along the cable, or in distance-resolved optical time domain reflectometry systems to provide detailed profiles of chemical concentration versus length.

  9. Pulicat Lake: A Fragile Ecosystem Under Threat

    NASA Astrophysics Data System (ADS)

    Saraswathy, R.; Pandian, Pitchai Kasinatha

    2016-09-01

    The Pulicat Lake is the second largest brackish water lake after Chilika Lake in India. The average area of the water spread is 461 sq km. During the monsoon Pulicat Lake receives freshwater through three major rivers, namely, the Swarnamukhi, the Kalangi and the Arani. The Pulicat lagoon system, which is a storehouse of rich biological resources, is under great threat because of the anthropogenic influences. The Pulicat Lake ecosystem is degraded by siltation, bar mouth dynamics, shell mining and processing and population pressure due to the resettlement of villagers from Sriharikota Island. It has been determined that the extent of the lake, including its water spread area, is decreasing. Therefore, it is essential to assess the land use / land cover changes taking place in and around Pulicat Lake using remote sensing and GIS. Studies on its sediment characteristics are also vital. The grain size content reveals that most of the sediments contain clay and silt in enormous amounts. This lake has been the prime source of a livelihood through fishing for a large section of the population living in the surrounding villages. It is the most important refuge for water birds in south India. The fishing community who lives in and around Pulicat Lake follows the Padu system for fishing in the lake. In this study, apart from studies on configuration changes and sediment analysis, a study of the flora and fauna of the lake and the socio-economic conditions of the local community were also carried out. Finally, mitigation measures for the sustainable protection of the lake's ecosystem were identified.

  10. Technosocial Modeling of IED Threat Scenarios and Attacks

    SciTech Connect

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

    2009-03-23

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

  11. Cardiac threat appraisal and depression after first myocardial infarction.

    PubMed

    Vögele, Claus; Christ, Oliver; Spaderna, Heike

    2012-01-01

    The present study investigated cardiac threat appraisal and its association with depression after first myocardial infarction (MI). A semi-structured interview allowing for DSM-IV-axis I diagnoses was administered to 36 patients after first MI. Patients completed self-reports 5-15 days after the MI (time 1), 6-8 weeks later (time 2), and again 6 months later (time 3). Assessments at time 1 included indices of cardiac threat appraisal, locus of control, coping, and depression while at time 2 and time 3 only measures of depression were obtained. Cardiac threat appraisal was significantly correlated with depression at time 1, but was unrelated to depression scores at time 2 and time 3. Furthermore, there was a significant inverse association between cardiac threat appraisal and the subscales "search for affiliation" and "threat minimization" of the coping questionnaire. Additionally, "search for affiliation" correlated negatively with depression scores at time 1 and time 3, and "threat minimization" negatively with depression scores at time 1 and time 2. These results suggest a significant association between cardiac threat appraisal and depressive symptoms shortly after MI. Practical implications for treatment are discussed.

  12. The consequences of chronic stereotype threat: domain disidentification and abandonment.

    PubMed

    Woodcock, Anna; Hernandez, Paul R; Estrada, Mica; Schultz, P Wesley

    2012-10-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s "leak" from each juncture of the academic scientific pipeline in disproportionately greater numbers than their White and Asian counterparts. Using structural equation modeling, we tested the stereotype threat-disidentification hypothesis across 3 academic years with a national longitudinal panel of undergraduate minority science students. Experience of stereotype threat was associated with scientific disidentification, which in turn predicted a significant decline in the intention to pursue a scientific career. Race/ethnicity moderated this effect, whereby the effect was evident for Hispanic/Latino(a) students but not for all African American students. We discuss findings in terms of understanding chronic stereotype threat.

  13. Stereotype threat can both enhance and impair older adults' memory.

    PubMed

    Barber, Sarah J; Mather, Mara

    2013-12-01

    Negative stereotypes about aging can impair older adults' memory via stereotype threat; however, the mechanisms underlying this phenomenon are unclear. In two experiments, we tested competing predictions derived from two theoretical accounts of stereotype threat: executive-control interference and regulatory fit. Older adults completed a working memory test either under stereotype threat about age-related memory declines or not under such threat. Monetary incentives were manipulated such that recall led to gains or forgetting led to losses. The executive-control-interference account predicts that stereotype threat decreases the availability of executive-control resources and hence should impair working memory performance. The regulatory-fit account predicts that threat induces a prevention focus, which should impair performance when gains are emphasized but improve performance when losses are emphasized. Results were consistent only with the regulatory-fit account. Although stereotype threat significantly impaired older adults' working memory performance when remembering led to gains, it significantly improved performance when forgetting led to losses.

  14. Manipulating cardiovascular indices of challenge and threat using resource appraisals.

    PubMed

    Turner, Martin J; Jones, Marc V; Sheffield, David; Barker, Jamie B; Coffee, Peter

    2014-10-01

    Challenge and threat reflect two distinct psychophysiological approaches to motivated performance situations. Challenge is related to superior performance in a range of tasks compared to threat, thus methods to promote challenge are valuable. In this paper we manipulate challenge and threat cardiovascular reactivity using only resource appraisals, without altering perceived task demands between challenge and threat conditions. Study 1 used a competitive throwing task and Study 2 used a physically demanding climbing task. In both studies challenge task instructions led to challenge cardiovascular reactivity and threat task instructions led to threat cardiovascular reactivity. In Study 1, participants who received challenge instructions performed better than participants who received threat instructions. In Study 2, attendance at the climbing task did not differ across groups. The findings have implications for stress management in terms of focusing on manipulating appraisals of upcoming tasks by promoting self-efficacy and perceived control and focusing on approach goals. Future research could more reliably assess the influence of similar task instructions on performance.

  15. Air Pollution.

    ERIC Educational Resources Information Center

    Gilpin, Alan

    A summary of one of our most pressing environmental problems, air pollution, is offered in this book by the Director of Air Pollution Control for the Queensland (Australia) State Government. Discussion of the subject is not restricted to Queensland or Australian problems and policies, however, but includes analysis of air pollution the world over.…

  16. Air Pollution

    MedlinePlus

    ... of Climate Change on Children's Health: Session Two: Air Quality Impacts MODERATOR: Susan Anenberg, EPA Meredith McCormack, Johns ... University • Effects of Climate Change on Children’s Health: Air Quality Impacts Frederica Perera, Columbia University • Air quality Impacts ...

  17. Web-enabled medical databases: a threat to security?

    PubMed

    Herrin, J; Dempsey, B J

    2000-12-01

    An increasing number of clinical databases are being adapted to allow access through Internet protocols, particularly Hypertext Transfer Protocol (HTTP). The World Wide Web (WWW) provides a user-friendly, standardized, broadly distributed database interface; at the same time, it may also present a threat to the security and confidentiality of patient data. However, there is little empirical evidence concerning such threats. Using publicly available records we estimate the additional risk of security violations due to web-enabling a database. The evidence, though limited, suggests that the additional risk may be small relative to more traditional security threats.

  18. THREAT ANTICIPATION AND DECEPTIVE REASONING USING BAYESIAN BELIEF NETWORKS

    SciTech Connect

    Allgood, Glenn O; Olama, Mohammed M; Lake, Joe E

    2009-01-01

    Recent events highlight the need for tools to anticipate threats posed by terrorists. Assessing these threats requires combining information from disparate data sources such as analytic models, simulations, historical data, sensor networks, and user judgments. These disparate data can be combined in a coherent, analytically defensible, and understandable manner using a Bayesian belief network (BBN). In this paper, we develop a BBN threat anticipatory model based on a deceptive reasoning algorithm using a network engineering process that treats the probability distributions of the BBN nodes within the broader context of the system development process.

  19. Threat from Rubble-Pile Asteroids

    NASA Astrophysics Data System (ADS)

    Schultz, P. H.

    2015-12-01

    Artemieva, 2004]. The "needle model" for the Carancas meteorite entry, however, raises questions about this lower limit for threats by rubble-pile asteroids, e.g., Itokawa. Consequently, we modeled the fate of a rubble-pile entering earth's atmosphere using GEODYN, an Eulerian code with adaptive mesh refinement (Antoun et al., 2001).

  20. A Physicist Looks at the Terrorist Threat

    NASA Astrophysics Data System (ADS)

    Muller, Richard

    2009-05-01

    Many people fear a terrorist nuclear device, smuggled into the United States, as the one weapon that could surpass the destruction and impact of 9-11. I'll review the design of nuclear weapons, with emphasis on the kinds that can be developed by rogue nations, terrorist groups, and high-school students. Saddam, prior to the first gulf war, was developing a uranium bomb, similar to the one that destroyed Hiroshima. His calutrons (named after my university) were destroyed by the United Nations. The North Korean nuclear weapon was, like the U.S. bomb used on Nagasaki, based on plutonium. Its test released the energy equivalent of about 400 tons of TNT. Although some people have speculated that they were attempting to build a small bomb, it is far more likely that this weapon was a fizzle, with less than 1 percent of the plutonium exploded. In contrast, the energy released from burning jet fuel at the 9-11 World Trade Center attack was the equivalent of 900 tons of TNT for each plane -- over twice that of the North Korean Nuke. The damage came from the fact that gasoline delivers 10 kilocalories per gram, about 15 times the energy of an equal weight of TNT. It is this huge energy per gram that also accounts for our addiction to gasoline; per gram, high performance lithium-ion computer batteries carry only 1 percent as much energy. A dirty bomb (radiological weapon) is also unattractive to terrorists because of the threhold effect: doses less than 100 rem produce no radiation illness and will leave no dead bodies at the scene. That may be why al Qaeda instructed Jose Padilla to abandon his plans for a dirty bomb attack in Chicago, and to try a fossil fuel attack (natural gas) instead. I will argue that the biggest terrorist threat is the conventional low-tech one, such as an airplane attack on a crowded stadium using the explosive fuel that they can legally buy at the corner station.

  1. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... current cost of conducting security threat assessments. TSA determines fee amounts and any necessary revisions to the fee amounts based on current costs, using a method of analysis consistent with...

  2. Antibiotic Resistance Threats in the U.S.

    MedlinePlus

    ... What's this? Submit Button Past Emails CDC Features Antibiotic Resistance Threats in the US Recommend on Facebook Tweet Share Compartir Antibiotics are powerful tools for fighting illness and disease, ...

  3. Mildly Low Thyroid Function in Pregnancy Not a Threat

    MedlinePlus

    ... even mildly low thyroid function (so-called subclinical hypothyroidism) during pregnancy could also pose a threat to ... Health and Human Services. More Health News on: Hypothyroidism Pregnancy Recent Health News Related MedlinePlus Health Topics ...

  4. Biological warfare agents as threats to potable water.

    PubMed Central

    Burrows, W D; Renner, S E

    1999-01-01

    Nearly all known biological warfare agents are intended for aerosol application. Although less effective as potable water threats, many are potentially capable of inflicting heavy casualties when ingested. Significant loss of mission capability can be anticipated even when complete recovery is possible. Properly maintained field army water purification equipment can counter this threat, but personnel responsible for the operation and maintenance of the equipment may be most at risk of exposure. Municipal water treatment facilities would be measurably less effective. Some replicating (infectious) agents and a few biotoxins are inactivated by chlorine disinfection; for others chlorine is ineffective or of unknown efficacy. This report assesses the state of our knowledge of agents as potable water threats and contemplates the consequences of intentional or collateral contamination of potable water supplies by 18 replicating agents and 9 biotoxins known or likely to be weaponized or otherwise used as threats. PMID:10585901

  5. Threat, prejudice and the impact of the riots in England.

    PubMed

    de Rooij, Eline A; Goodwin, Matthew J; Pickup, Mark

    2015-05-01

    This paper examines how a major outbreak of rioting in England in 2011 impacted on prejudice toward three minority groups in Britain: Muslims, Black British and East Europeans. We test whether the riots mobilized individuals by increasing feelings of realistic and symbolic threat and ultimately prejudice, or whether the riots galvanized those already concerned about minorities, thus strengthening the relationship between threat and prejudice. We conducted three national surveys - before, after and one year on from the riots - and show that after the riots individuals were more likely to perceive threats to society's security and culture, and by extension express increased prejudice toward Black British and East European minorities. We find little evidence of a galvanizing impact. One year later, threat and prejudice had returned to pre-riots levels; however, results from a survey experiment show that priming memories of the riots can raise levels of prejudice.

  6. The cyber threat landscape: Challenges and future research directions

    NASA Astrophysics Data System (ADS)

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-07-01

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.

  7. Impaired threat prioritisation after selective bilateral amygdala lesions

    PubMed Central

    Bach, Dominik R.; Hurlemann, Rene; Dolan, Raymond J.

    2015-01-01

    The amygdala is proposed to process threat-related information in non-human animals. In humans, empirical evidence from lesion studies has provided the strongest evidence for a role in emotional face recognition and social judgement. Here we use a face-in-the-crowd (FITC) task which in healthy control individuals reveals prioritised threat processing, evident in faster serial search for angry compared to happy target faces. We investigate AM and BG, two individuals with bilateral amygdala lesions due to Urbach–Wiethe syndrome, and 16 control individuals. In lesion patients we show a reversal of a threat detection advantage indicating a profound impairment in prioritising threat information. This is the first direct demonstration that human amygdala lesions impair prioritisation of threatening faces, providing evidence that this structure has a causal role in responding to imminent danger. PMID:25282058

  8. College Leaders Wrestle with How to Prepare for Unknown Threats

    ERIC Educational Resources Information Center

    Selingo, Jeffrey

    2008-01-01

    This article describes how colleges are seeking the best ways to respond to dangerous incidents like the shootings that occurred at Virginia Tech, and how best to alert people on their campuses to various threats to public safety and emergencies.

  9. How Moral Threat Shapes Laypersons' Engagement With Science.

    PubMed

    Bender, Jens; Rothmund, Tobias; Nauroth, Peter; Gollwitzer, Mario

    2016-12-01

    Laypersons' engagement with science has grown over the last decade, especially in Internet environments. While this development has many benefits, scientists also face the challenge of devaluation and public criticism by laypersons. Embedding this phenomenon in social-psychological theories and research on value-behavior correspondence, we investigated moral threat as a factor influencing laypersons' engagement with science. Across three studies, we hypothesized and found that moral values shape the way laypersons evaluate and communicate about science when these values are threatened in a given situation and central to people's self-concept. However, prior research on the underlying mechanism of moral threat effects cannot fully rule out value salience as an alternative explanation. To close this gap, we situationally induced value salience while varying the degree of moral threat (Study 3). Our findings indicate that moral threat amplifies the influence of moral values on laypersons' evaluation of science above and beyond value salience.

  10. Mediators of Stereotype Threat among Black College Students.

    PubMed

    Massey, Douglas S; Owens, Jayanti

    2014-04-01

    We hypothesize that the manner in which stereotype threat affects college grade achievement is mediated by institutional context as well as individual characteristics. Drawing on a sample of black students from the National Longitudinal Survey of Freshmen we find weak and inconsistent evidence that institutional characteristics influence the operation of stereotype threat. We find more consistent evidence to indicate that the effect of stereotype threat is conditioned by individual factors such as skin color, multiracial origins, and an integrated upbringing. Most of the effect on grade achievement occurs through the internalization pathway, in which the internalization of negative stereotypes leads to disinvestment manifested by a reduction in academic effort. The reduction in work effort, in turn, lowers grades. We also find evidence that immigrant origin confers protection from the negative effects of stereotype threat through both internalization and externalization mechanisms, though the ultimate effect of grade achievement is rather small.

  11. Champ or chump? Challenge and threat states during pressurized competition.

    PubMed

    Moore, Lee J; Wilson, Mark R; Vine, Samuel J; Coussens, Adam H; Freeman, Paul

    2013-12-01

    The present research examined the immediate impact of challenge and threat states on golf performance in both real competition and a laboratory-based task. In Study 1, 199 experienced golfers reported their evaluations of competition demands and personal coping resources before a golf competition. Evaluating the competition as a challenge (i.e., sufficient resources to cope with demands) was associated with superior performance. In Study 2, 60 experienced golfers randomly received challenge or threat manipulation instructions and then performed a competitive golf-putting task. Challenge and threat states were successfully manipulated and the challenge group outperformed the threat group. Furthermore, the challenge group reported less anxiety, more facilitative interpretations of anxiety, less conscious processing, and displayed longer quiet eye durations. However, these variables failed to mediate the group-performance relationship. These studies demonstrate the importance of considering preperformance psychophysiological states when examining the influence of competitive pressure on motor performance.

  12. Death Threats and a Sit-In Divide Penn State.

    ERIC Educational Resources Information Center

    Hoover, Eric

    2001-01-01

    Describes how death threats against black students at Penn State prompted an extended sit-in and a debate over whether the university was doing enough to protect black students and promote diversity. (EV)

  13. Reassessing Biological Threats: Implications for Cooperative Mitigation Strategies

    PubMed Central

    Galloway, Summer Elise; Petzing, Stephanie Rachel; Young, Catharine Grace

    2015-01-01

    Multiple factors ranging from globalization to ecosystem disruption are presenting the global community with evolving biological threats to local, national, and global security that reach beyond the realm of traditional bioweapon threats. As a result, mitigation strategies have adapted necessarily to the increased diversity of biological threats. In general, response and preparedness strategies have largely shifted from being primarily reactive to traditional biological weapons to more proactive in nature. In this review, we briefly explore biological threats through a wider aperture, to embrace a greater appreciation of viral pathogens, antimicrobial resistance, and agricultural pathogens, and their potential to cause civil, economic, and political devastation. In addition, we discuss current mitigation strategies codified by the Global Health Security Agenda and the One Health paradigm as well as some of the available tools to assist with their sustainable implementation. PMID:26649289

  14. Solutions to the new threats to academic freedom?

    PubMed

    Tooley, Michael

    2014-05-01

    In my commentary on Francesca Minerva's article 'New Threats to Academic Freedom', I agree with her contention that the existence of the Internet has given rise to new and very serious threats to academic freedom. I think that it is crucial that we confront those threats, and find ways to eliminate them, which I believe can be done. The threats in question involve both authors and editors. In the case of authors, I argue that the best solution is not anonymous publication, but publication using pseudonyms, and I describe how that would work. In the case of editors, my proposal is a website that a number of journals would have access to, where papers that editors judge to be clearly worthy of publication, but whose publication seems likely to set off a firestorm of public and media protest, could be published without any indication of the journal that had accepted the paper for publication.

  15. Attention to Threats and Combat-Related Posttraumatic Stress Symptoms

    PubMed Central

    Wald, Ilan; Degnan, Kathryn A.; Gorodetsky, Elena; Charney, Dennis S.; Fox, Nathan A.; Fruchter, Eyal; Goldman, David; Lubin, Gad; Pine, Daniel S.; Bar-Haim, Yair

    2015-01-01

    Importance Combat places soldiers at risk for post-traumatic stress disorder (PTSD). The excessive rates of PTSD and other adjustment disorders in soldiers returning home make it imperative to identify risk and resilience factors that could be targeted by novel therapeutic treatments. Objective To investigate the interplay among attention to threat, combat exposure, and other risk factors for PTSD symptoms in soldiers deployed to combat. Design and Setting Longitudinal prospective study of Israeli Defense Force infantry soldiers carried out in 2008 through 2010. Repeated measurements during a 1-year period included baseline and predeployment data collected in training camps and deployment data collected in the combat theater. Participants Infantry soldiers (1085 men; mean age,18.8 years). Main Outcome Measures Postcombat PTSD symptoms. Results Soldiers developed threat vigilance during combat deployment, particularly when they were exposed to high-intensity combat, as indicated by faster response times to targets appearing at the location of threat relative to neutral stimuli (P < .001). Threat-related attention bias also interacted with combat exposure to predict risk for PTSD (P <.05). Bias toward threat at recruitment (P <.001) and bias away from threat just before deployment (P < .05) predicted postcombat PTSD symptoms. Moreover, these threat-related attention associations with PTSD were moderated by genetic and environmental factors, including serotonin transporter (5-HTTLPR) genotype. Conclusions and Relevance Combat exposure interacts with threat-related attention to place soldiers at risk for PTSD, and interactions with other risk factors account for considerable variance in PTSD vulnerability. Understanding these associations informs research on novel attention bias modification techniques and prevention of PTSD. PMID:23407816

  16. Best Practices and Controls for Mitigating Insider Threats

    DTIC Science & Technology

    2013-08-08

    for plagiarism in academic papers, the process is virtually identical Solution: Managing The Insider Threat: What Every Organization Should Know...hundreds of actual cases of insider IT sabotage, theft of intellectual property, fraud, and espionage Managing The Insider Threat: What Every...service provider that meets or exceeds the organization’s own levels of security. •  Understand how the cloud provider protect data and other assets

  17. Assessing the Threat of Islamically Motivated Terrorism in Bulgaria

    DTIC Science & Technology

    2015-12-01

    THREAT OF ISLAMICALLY MOTIVATED TERRORISM IN BULGARIA by Stefan L. Dimov December 2015 Thesis Advisor: Heather S. Gregg Second Reader...DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE ASSESSING THE THREAT OF ISLAMICALLY MOTIVATED TERRORISM IN BULGARIA 5. FUNDING NUMBERS 6...Extremism Manifestation Model (REMM), that will help identify whether specific conditions in Bulgaria are favorable for the emergence of Islamic extremism

  18. The Transition From Threat Situations to International Crises

    DTIC Science & Technology

    1976-09-01

    SEP 197& I.. nternational Relations Research Institut School of International Relations University of Southern California September 1976 THE...TRANSITION FROM THREAT SITUATIONS TO INTERNATIONAL CRISES TR&A Technical Report #34 Threat Recognition and Analysis Project "Approved for public release...the Advanced Research Projects Agency of the Department of Defense and was monitored by ONR under Contract No. N00014-76-C-0137. The views and

  19. Physician office readiness for managing Internet security threats.

    PubMed

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  20. Communicating Homeland Security Threats: Government and Public Efforts

    DTIC Science & Technology

    2010-12-01

    further analyze public perception and involvement in homeland security, this research will continue beyond the evolution of the National Exercise Program...information continues to undermine the importance of threats to the homeland. Current research identifies a growing perception disparity relative to...localities, loss to tourism , and the indirect cost on the economy during a period of heightened threat level.”15 Yim also presents a perspective

  1. Force Health Protection (FHP): Occupational and Environmental Health (OEH) Threats

    DTIC Science & Technology

    2001-06-27

    Occupational and Environmental Health (OEH) Threats Contract Number Grant Number Program Element Number Author(s) Project Number Task Number...situations during peacetime, Federal regulations governing environmental , safety, and occupational health hazards were applied. At the strategic level o f...o f t h e Army for FHP-OEH matters. DASA–ESOH SUBJECT: Force Health Protection (FHP): Occupational and Environmental Health (OEH) Threats 3 b. The ASA

  2. Fiber Optically Coupled Eyesafe Laser Threat Warning System

    DTIC Science & Technology

    2000-05-11

    WARNING SYSTEM 11 MAY 2000 MSS SPECIALTY GROUP ON INFRARED COUNTERMEASURES NAVAL POSTGRADUATE SCHOOL, MONTEREY, CA PRESENTED BY: DR. AL TORRES...A Dates Covered (from... to) - Title and Subtitle Fiber Optically Coupled Eyesafe Laser Threat Warning System Contract Number Grant Number... WARNING SYSTEM (ESLTWS) PHASE II SBIR PROGRAM • CONCEPT: - TO DEVELOP A UNIQUE AND NOVEL EYE SAFE LASER THREAT WARNING RECEIVER SYSTEM. MUST BE

  3. Overview of the Threat Posed by Insiders to Critical Assets

    DTIC Science & Technology

    2013-08-08

    TRUE STORY: An undercover agent who claims to be on the “No Fly list” buys fake drivers license from a ring of DMV employees... The 7 person...PII from hospital... •  Over 1100 victims and over $2.8 M in fraudulent claims A database administrator at major US Insurance Co. downloaded...4th Ed. (http://www.sei.cmu.edu/library/abstracts/reports/12tr012.cfm) Insider threat workshops Insider threat assessments New controls from

  4. Insider Threat Mitigation Project: A Dynamic Network Approach (Poster)

    DTIC Science & Technology

    2014-10-23

    OCT 2014 2. REPORT TYPE N/A 3. DATES COVERED 4. TITLE AND SUBTITLE Insider Threat Mitigation Project: A Dynamic Network Approach 5a...Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Insider Threat Mitigation Project A Dynamic Network Approach Approach: • Semi-automated coding...to- external communication • Remove suspected distribution lists • Identify “normal behavior” using Enron • Develop pattern for “ insiders ” in

  5. A Bayesian belief network of threat anticipation and terrorist motivations

    NASA Astrophysics Data System (ADS)

    Olama, Mohammed M.; Allgood, Glenn O.; Davenport, Kristen M.; Schryver, Jack C.

    2010-04-01

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

  6. Threat facilitates subsequent executive control during anxious mood.

    PubMed

    Birk, Jeffrey L; Dennis, Tracy A; Shin, Lisa M; Urry, Heather L

    2011-12-01

    Dual competition framework (DCF) posits that low-level threat may facilitate behavioral performance by influencing executive control functions. Anxiety is thought to strengthen this effect by enhancing threat's affective significance. To test these ideas directly, we examined the effects of low-level threat and experimentally induced anxiety on one executive control function, the efficiency of response inhibition. In Study 1, briefly presented stimuli that were mildly threatening (i.e., fearful faces) relative to nonthreatening (i.e., neutral faces) led to facilitated executive control efficiency during experimentally induced anxiety. No such effect was observed during an equally arousing, experimentally induced happy mood state. In Study 2, we assessed the effects of low-level threat, experimentally induced anxiety, and individual differences in trait anxiety on executive control efficiency. Consistent with Study 1, fearful relative to neutral faces led to facilitated executive control efficiency during experimentally induced anxiety. No such effect was observed during an experimentally induced neutral mood state. Moreover, individual differences in trait anxiety did not moderate the effects of threat and anxiety on executive control efficiency. The findings are partially consistent with the predictions of DCF in that low-level threat improved executive control, at least during a state of anxiety.

  7. The effect of threat on attentional interruption by pain.

    PubMed

    Moore, David J; Keogh, Edmund; Eccleston, Christopher

    2013-01-01

    Pain is known to interrupt attention. This interruption is highly sensitive to the extent of involvement of both attentional control and the level of threat associated with the sensation. However, few studies have examined these factors together. This study aimed to examine the interruptive effect of pain on higher-order attentional tasks under conditions of low and high threat. Fifty participants completed an n-back task, an attentional switching task, and a divided attention task, once in pain and once without pain. Twenty-five participants were given standard task instructions (control condition), and the remainder were given additional verbal information designed to increase threat (threat condition). Pain interrupted participant performance on both the n-back and attentional switching task, but not on the divided attention task. The addition of the threat manipulation did not seem to significantly alter the effect of pain on these attentional tasks. However, independent of pain, threat did moderate performance on the divided attention task. These findings support the robustness of the effect of pain on performance on higher-order attention tasks. Future research is needed to examine what factors alter the cognitive interruption caused by pain.

  8. How to test the threat-simulation theory.

    PubMed

    Revonsuo, Antti; Valli, Katja

    2008-12-01

    Malcolm-Smith, Solms, Turnbull and Tredoux [Malcolm-Smith, S., Solms, M.,Turnbull, O., & Tredoux, C. (2008). Threat in dreams: An adaptation? Consciousness and Cognition, 17, 1281-1291.] have made an attempt to test the Threat-Simulation Theory (TST), a theory offering an evolutionary psychological explanation for the function of dreaming [Revonsuo, A. (2000a). The reinterpretation of dreams: An evolutionary hypothesis of the function of dreaming. Behavioral and Brain Sciences, 23(6), 877-901]. Malcolm-Smith et al. argue that empirical evidence from their own study as well as from some other studies in the literature does not support the main predictions of the TST: that threatening events are frequent and overrepresented in dreams, that exposure to real threats activates the threat-simulation system, and that dream threats contain realistic rehearsals of threat avoidance responses. Other studies, including our own, have come up with results and conclusions that are in conflict with those of Malcolm-Smith et al. In this commentary, we provide an analysis of the sources of these disagreements, and their implications to the TST. Much of the disagreement seems to stem from differing interpretations of the theory and, consequently, of differing methods to test it.

  9. Preliminary thoughts concerning potential US Army threats/roles

    SciTech Connect

    Greene, R.A.; Solomon, K.A.; Miles, J.T.

    1991-06-01

    The rate at which the current world military/political perspective is changing demands consideration of a broader spectrum of potential threats then has been the case for the past few decades--during which the Soviet Union was the preeminent threat. Seemingly overnight, the cold war ceased, the requirement for massive U.S. military counters to the Soviet Union forces faded, and an era of constant (obvious) military threat disappeared. This situation has in turn been revolutionized by the Iraq invasion of Kuwait and the U.S. response. The paper addresses part of the problem facing military planners by defining a spectrum of threats that typify those the U.S. Army might face over the next decade or two. The purpose of the threat set is to support the evaluation of the effectiveness and usefulness, to the U.S. Army, of advanced technologies. The set of threats is intended to provide a complete set of characteristics rather then to be a complete list of the possibilities; it is illustrative rather than exhaustive. Although largely completed before the war with Iraq started, its content is still valid in that its purpose is to provide a framework for thinking about future U.S. Army technology needs.

  10. Policing of reproduction by hidden threats in a cooperative mammal.

    PubMed

    Cant, Michael A; Nichols, Hazel J; Johnstone, Rufus A; Hodge, Sarah J

    2014-01-07

    The evolution of cooperation in animal and human societies is associated with mechanisms to suppress individual selfishness. In insect societies, queens and workers enforce cooperation by "policing" selfish reproduction by workers. Insect policing typically takes the form of damage limitation after individuals have carried out selfish acts (such as laying eggs). In contrast, human policing is based on the use of threats that deter individuals from acting selfishly in the first place, minimizing the need for damage limitation. Policing by threat could in principle be used to enforce reproductive suppression in animal societies, but testing this idea requires an experimental approach to simulate reproductive transgression and provoke out-of-equilibrium behavior. We carried out an experiment of this kind on a wild population of cooperatively breeding banded mongooses (Mungos mungo) in Uganda. In this species, each group contains multiple female breeders that give birth to a communal litter, usually on the same day. In a 7-y experiment we used contraceptive injections to manipulate the distribution of maternity within groups, triggering hidden threats of infanticide. Our data suggest that older, socially dominant females use the threat of infanticide to deter selfish reproduction by younger females, but that females can escape the threat of infanticide by synchronizing birth to the same day as older females. Our study shows that reproduction in animal societies can be profoundly influenced by threats that remain hidden until they are triggered experimentally. Coercion may thus extend well beyond the systems in which acts of infanticide are common.

  11. A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations

    SciTech Connect

    Olama, Mohammed M; Allgood, Glenn O; Davenport, Kristen M; Schryver, Jack C

    2010-01-01

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

  12. Does stereotype threat affect women in academic medicine?

    PubMed

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  13. Exciting fear in adolescence: Does pubertal development alter threat processing?

    PubMed Central

    Spielberg, Jeffrey M.; Olino, Thomas M.; Forbes, Erika E.; Dahl, Ronald E.

    2014-01-01

    Adolescent development encompasses an ostensible paradox in threat processing. Risk taking increases dramatically after the onset of puberty, contributing to a 200% increase in mortality. Yet, pubertal maturation is associated with increased reactivity in threat-avoidance systems. In the first part of this paper we propose a heuristic model of adolescent affective development that may help to reconcile aspects of this paradox, which focuses on hypothesized pubertal increases in the capacity to experience (some) fear-evoking experiences as an exciting thrill. In the second part of this paper, we test key features of this model by examining brain activation to threat cues in a longitudinal study that disentangled pubertal and age effects. Pubertal increases in testosterone predicted increased activation to threat cues, not only in regions associated with threat avoidance (i.e., amygdala), but also regions associated with reward pursuit (i.e., nucleus accumbens). These findings are consistent with our hypothesis that puberty is associated with a maturational shift toward more complex processing of threat cues–which may contribute to adolescent tendencies to explore and enjoy some types of risky experiences. PMID:24548554

  14. Managing Threats against Control in Old Age: A Narrative Inquiry

    PubMed Central

    Black, Helen K.; Santanello, Holly R.; Caruso, Christa J.

    2014-01-01

    Background The desire to retain personal control over self and life circumstances continues into old age; it exists in tension with late-life vulnerabilities. Objectives This article investigates how elders respond to threats against control in light of changes surrounding health and identity. Methods Community-dwelling African-American (n = 10) and European-American elders (n = 10), aged 70 years and older, with varied self-reported health statuses were qualitatively interviewed. Open-ended interviews explored elders’ perceptions of control and threats to control in older age. Results Three themes linked elders’ responses to threats to control. Elders: (a) proactively monitored physical and mental health; (b) maintained roles that shaped important aspects of identity, and (c) fostered personal growth and development by generative practices. Responses of participants who had difficulty countering threats to control are also offered. Discussion This study shows that the construct of control is not abstract; it is interpreted and applied by elders in the contexts of everyday life. Respondents used personal resources honed throughout the life course to respond to threats to control. Elders viewed control as a cultural construct with nuanced meanings that recalled past roles and current changes that occur with age. Suggestions are offered for how health professionals can assist elders with the cognitive and emotional tasks required to deal with threats to personal control surrounding health and identity. PMID:24165219

  15. Attention Bias to Threat Faces in Severe Mood Dysregulation

    PubMed Central

    Hommer, Rebecca E.; Meyer, Allison; Stoddard, Joel; Connolly, Megan E.; Mogg, Karin; Bradley, Brendan P.; Pine, Daniel S.; Leibenluft, Ellen; Brotman, Melissa A.

    2013-01-01

    Background We used a dot-probe paradigm to examine attention bias toward threat (i.e., angry) and happy face stimuli in Severe Mood Dysregulation (SMD) vs. healthy comparison (HC) youth. The tendency to allocate attention to threat is well established in anxiety and other disorders of negative affect. SMD is characterized by the negative affect of irritability, and longitudinal studies suggest childhood irritability predicts adult anxiety and depression. Therefore, it is important to study pathophysiologic connections between irritability and anxiety disorders. Methods SMD patients (N=74) and HC youth (N=42) completed a visual probe paradigm to assess attention bias to emotional faces. Diagnostic interviews were conducted and measures of irritability and anxiety were obtained in patients. Results SMD youth differed from HC youth in having a bias toward threatening faces (p<0.01). Threat bias was positively correlated with the severity of the SMD syndrome and depressive symptoms; degree of threat bias did not differ between SMD youth with and without co-occurring anxiety disorders or depression. SMD and HC youth did not differ in bias toward or away from happy faces. Conclusions SMD youth demonstrate an attention bias toward threat, with greater threat bias associated with higher levels of SMD symptom severity. Our findings suggest that irritability may share a pathophysiological link with anxiety and depressive disorders. This finding suggests the value of exploring further whether attention bias modification treatments that are effective for anxiety are also helpful in the treatment of irritability. PMID:23798350

  16. Policing of reproduction by hidden threats in a cooperative mammal

    PubMed Central

    Cant, Michael A.; Nichols, Hazel J.; Johnstone, Rufus A.; Hodge, Sarah J.

    2014-01-01

    The evolution of cooperation in animal and human societies is associated with mechanisms to suppress individual selfishness. In insect societies, queens and workers enforce cooperation by “policing” selfish reproduction by workers. Insect policing typically takes the form of damage limitation after individuals have carried out selfish acts (such as laying eggs). In contrast, human policing is based on the use of threats that deter individuals from acting selfishly in the first place, minimizing the need for damage limitation. Policing by threat could in principle be used to enforce reproductive suppression in animal societies, but testing this idea requires an experimental approach to simulate reproductive transgression and provoke out-of-equilibrium behavior. We carried out an experiment of this kind on a wild population of cooperatively breeding banded mongooses (Mungos mungo) in Uganda. In this species, each group contains multiple female breeders that give birth to a communal litter, usually on the same day. In a 7-y experiment we used contraceptive injections to manipulate the distribution of maternity within groups, triggering hidden threats of infanticide. Our data suggest that older, socially dominant females use the threat of infanticide to deter selfish reproduction by younger females, but that females can escape the threat of infanticide by synchronizing birth to the same day as older females. Our study shows that reproduction in animal societies can be profoundly influenced by threats that remain hidden until they are triggered experimentally. Coercion may thus extend well beyond the systems in which acts of infanticide are common. PMID:24367092

  17. Fear-related behaviors in situations of mass threat

    PubMed Central

    Espinola, Maria; Shultz, James M.; Espinel, Zelde; Althouse, Benjamin M.; Cooper, Janice L.; Baingana, Florence; Marcelin, Louis Herns; Cela, Toni; Towers, Sherry; Mazurik, Laurie; Greene, M. Claire; Beck, Alyssa; Fredrickson, Michelle; McLean, Andrew; Rechkemmer, Andreas

    2016-01-01

    ABSTRACT This Disaster Health Briefing focuses on the work of an expanding team of researchers that is exploring the dynamics of fear-related behaviors in situations of mass threat. Fear-related behaviors are individual or collective behaviors and actions initiated in response to fear reactions that are triggered by a perceived threat or actual exposure to a potentially traumatizing event. Importantly, fear-related behaviors modulate the future risk of harm. Disaster case scenarios are presented to illustrate how fear-related behaviors operate when a potentially traumatic event threatens or endangers the physical and/or psychological health, wellbeing, and integrity of a population. Fear-related behaviors may exacerbate harm, leading to severe and sometimes deadly consequences as exemplified by the Ebola pandemic in West Africa. Alternatively, fear-related behaviors may be channeled in a constructive and life-saving manner to motivate protective behaviors that mitigate or prevent harm, depending upon the nature of the threat scenario that is confronting the population. The interaction between fear-related behaviors and a mass threat is related to the type, magnitude, and consequences of the population encounter with the threat or hazard. The expression of FRBs, ranging from risk exacerbation to risk reduction, is also influenced by such properties of the threat as predictability, familiarity, controllability, preventability, and intentionality. PMID:28265486

  18. Neuroimaging the temporal dynamics of human avoidance to sustained threat.

    PubMed

    Schlund, Michael W; Hudgins, Caleb D; Magee, Sandy; Dymond, Simon

    2013-11-15

    Many forms of human psychopathology are characterized by sustained negative emotional responses to threat and chronic behavioral avoidance, implicating avoidance as a potential transdiagnostic factor. Evidence from both nonhuman neurophysiological and human neuroimaging studies suggests a distributed frontal-limbic-striatal brain network supports avoidance. However, our understanding of the temporal dynamics of the network to sustained threat that prompts sustained avoidance is limited. To address this issue, 17 adults were given extensive training on a modified free-operant avoidance task in which button pressing avoided money loss during a sustained threat period. Subsequently, subjects underwent functional magnetic resonance imaging while completing the avoidance task. In our regions of interest, we observed phasic, rather than sustained, activation during sustained threat in dorsolateral and inferior frontal regions, anterior and dorsal cingulate, ventral striatum and regions associated with emotion, including the amygdala, insula, substantia nigra and bed nucleus of the stria terminalis complex. Moreover, trait levels of experiential avoidance were negatively correlated with insula, hippocampal and amygdala activation. These findings suggest knowledge that one can consistently avoid aversive outcomes is not associated with decreased threat-related responses and that individuals with greater experiential avoidance exhibit reduced reactivity to initial threat. Implications for understanding brain mechanisms supporting human avoidance and psychological theories of avoidance are discussed.

  19. Evidence for stasis and not genetic piracy in developmental expression patterns of Branchiostoma lanceolatum and Branchiostoma floridae, two amphioxus species that have evolved independently over the course of 200 Myr.

    PubMed

    Somorjai, Ildiko; Bertrand, Stéphanie; Camasses, Alain; Haguenauer, Anne; Escriva, Hector

    2008-12-01

    Cephalochordates, the most basal extant group in the phylum Chordata, are represented chiefly by about 20 species of the genus Branchiostoma, commonly called amphioxus or lancelets. In recent years, insights into the evolutionary origin of the vertebrates have been gained from molecular genetic studies during the development of three of these amphioxus species (Branchiostoma floridae in North America, Branchiostoma lanceolatum in Europe, and Branchiostoma belcheri in East Asia). In spite of an estimated divergence time of 100-200 Myr among these species, all three are remarkably similar morphologically, and students of amphioxus have tacitly assumed that such resemblances arise during ontogeny from nearly identical networks of developmental genes. We felt that this assumption needed to be reexamined because instances are known--even in comparisons of closely related species--where characters seeming homologous on the basis of morphology actually develop under the control of conspicuously divergent genetic programs (a phenomenon termed "genetic piracy"). In the present work, we tested the hypothesis that morphological similarities reflect strict conservation of developmentally important genes' expression patterns in order to assess whether the developmental genetics of different amphioxus species show evidence of genetic piracy. To these ends, we cloned 18 genes implicated in different developmental functions in B. lanceolatum and compared their gene expression patterns with the known expression patterns of their orthologous genes in B. floridae. We show that, for the most part, conservation of gene expression parallels that of morphology in these two species. We also identified some differences in gene expression, likely reflecting experimental sensitivity, with the exception of Pax1/9, which may result from true developmental specificities in each amphioxus species. Our results demonstrate that morphological conservation reflects stasis in developmental gene

  20. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... internal corrosion, external corrosion, and stress corrosion cracking; (2) Static or resident threats, such... incident history, corrosion control records, continuing surveillance records, patrolling records... external corrosion direct assessment, the operator must integrate data from these assessments with...