Sample records for border security symposium

  1. 78 FR 57408 - U.S. Customs and Border Protection 2013 East Coast Trade Symposium: “Increasing Economic...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-18

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection U.S. Customs and Border Protection 2013 East Coast Trade Symposium: ``Increasing Economic Competitiveness Through Global Partnership..., 2013. The theme for the 2013 East Coast Trade Symposium will be ``Increasing Economic Competitiveness...

  2. 78 FR 77141 - U.S. Customs and Border Protection 2014 East Coast Trade Symposium: “Increasing Economic...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-20

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection U.S. Customs and Border Protection 2014 East Coast Trade Symposium: ``Increasing Economic Competitiveness Through Global Partnership... Competitiveness Through Global Partnership and Innovation.'' The format of the East Coast Trade Symposium will be...

  3. 77 FR 52753 - U.S. Customs and Border Protection 2012 East Coast Trade Symposium: “Expanding 21st Century...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-30

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection U.S. Customs and Border Protection 2012 East Coast Trade Symposium: ``Expanding 21st Century Global Partnerships'' AGENCY: U.S... 21st Century Global Partnerships.'' The format of this year's East Coast Symposium will be held with...

  4. 77 FR 16048 - U.S. Customs and Border Protection 2012 West Coast Trade Symposium: “Harmonizing Trade for a...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-19

    ...This year, U.S. Customs and Border Protection (CBP) will be holding two trade symposia. One trade symposium will be held on the West Coast in May and the other will be on the East Coast later in the year. This document announces that CBP will convene the 2012 West Coast Trade Symposium to discuss issues relating to the agency's role in international trade initiatives and programs. This year marks our twelfth year hosting trade symposia. Members of the international trade and transportation communities and other interested parties on the West Coast are encouraged to attend.

  5. 2008 Homeland Security Symposium and Exposition

    DTIC Science & Technology

    2008-09-10

    Untitled Document 2008 Homeland Security Symposium and Exposition.html[5/19/2016 8:49:43 AM] 2008 Homeland Security Symposium and Exposition "New...national defenSe magazine Advertise in National Defense and increase your company exposure at this symposium! National Defense will be distributed to all...use the Internet Cafe to check their e-mail and search the Internet. Brand your name with maximum exposure at this high traffic area. Benefits

  6. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Booker, Paul M.; Maple, Scott A.

    2010-06-08

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a causemore » add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance to smuggling activities after training or technology is deployed at a given location. This paper will present an approach to holistic border security information analysis.« less

  7. Decision Model for U.S.- Mexico Border Security Measures

    DTIC Science & Technology

    2017-09-01

    and money assigned to border security investments. 14. SUBJECT TERMS Department of Homeland Security (DHS), border security, U.S.–Mexico border...and money assigned to border security investments. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION...FAA Federal Aviation Administration FAMS Federal Air Marshals Service FAST Free and Secure Trade GSA General Services Administration HIR Human

  8. 2006 Homeland Security Symposium and Exposition. Held in Arlington, VA on 29-31 March 2006

    DTIC Science & Technology

    2006-03-31

    Consequences , Vulnerabilities, and Threats) Prioritize Implement Protective Programs Measure Effectiveness 9March 2006 Major NIPP Theme: Sector Partnership... effect of exposure • Full understanding of the levels of exposure that mark the onset of miosis • Refined human operational exposure standard for GB...Untitled Document 2006 Homeland Security Symposium and Exposition.html[7/7/2016 11:38:26 AM] 2006 Homeland Security Symposium and Exposition

  9. 77 FR 17086 - U.S. Customs and Border Protection 2012 West Coast Trade Symposium: “Transforming Trade for a...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-23

    ...U.S. Customs and Border Protection (CBP) published a document in the Federal Register on March 19, 2012, announcing that it will be holding two trade symposia this year. One trade symposium will be held on the West Coast on May 10, 2012, and the other will be on the East Coast later in the year. This document corrects that March 19 document to note that the theme of this year's symposia has been changed to ``Transforming Trade for a Stronger Economy''; and to inform the public that the fees have changed for both attendance at the Long Beach Convention and Entertainment Center and for access to the live web- casting of the event; that the trade symposium will now be one hour longer, running from 8:30 a.m. until 4 p.m.; and that registration will open to the public on or about March 20, 2012.

  10. Analytical Chemistry for Homeland Defense and National Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    S.Randolph Long; Dan rock; Gary Eiceman

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  11. Monitoring Across Borders: 2010 Joint Meeting of the Forest Inventory and Analysis (FIA) Symposium and the Southern Mensurationists

    Treesearch

    Will McWilliams; Francis A. Roesch

    2012-01-01

    These proceedings represent the range of topics covered during the 2010 Joint Meeting of the Forest Inventory and Analysis (FIA) Symposium and the Southern Mensurationists, October 5-7, 2010 in Knoxville, TN. The meeting was a gathering of forest scientists with a quantitative leaning and, as such, the papers discuss the aspects of the observation, estimation, modeling...

  12. Next-Generation Botnet Detection and Response

    DTIC Science & Technology

    2008-06-24

    REPORT Final Report of "Next-Generation Botnet Detection and Response" 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: In this project, we developed...and Wenke Lee. ?In Proceedings of The 13th Annual Network and Distributed System Security Symposium (NDSS 2006), San Diego, CA, February 2006. 2...In Proceedings of The 16th USENIX Security Symposium ( Security 󈧋), Boston, MA, August 2007. 3. A Taxonomy of Botnet Structures. ?David Dagon, Guofei

  13. Security training symposium: Meeting the challenge: Firearms and explosives recognition and detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1990-09-01

    These conference proceedings have been prepared in support of the US Nuclear Regulatory Commission's Security Training Symposium on Meeting the Challenge -- Firearms and Explosives Recognition and Detection,'' November 28 through 30, 1989, in Bethesda, Maryland. This document contains the edited transcripts of the guest speakers. It also contains some of the speakers' formal papers that were distributed and some of the slides that were shown at the symposium (Appendix A).

  14. Patriot War and the Fenian Raids: Case Studies in Border Security on the U.S. Canada Border in the Nineteenth Century

    DTIC Science & Technology

    2017-06-09

    THE PATRIOT WAR AND THE FENIAN RAIDS: CASE STUDIES IN BORDER SECURITY ON THE U.S.-CANADA BORDER IN THE NINETEENTH CENTURY...3. DATES COVERED (From - To) AUG 2016 – JUN 2017 4. TITLE AND SUBTITLE The Patriot War and the Fenian Raids: Case Studies in Border Security on ...nineteenth century. The Patriot War and Fenian Raids are examined as case studies on the same border occurring roughly thirty years apart. The

  15. A Sustainable WMD Nonproliferation Strategy for East Africa: Connecting the WMD Nonproliferation Agenda with Local Border Security Needs to Achieve Mutually Beneficial Outcomes

    DTIC Science & Technology

    2014-01-01

    Government of Kenya stakeholders with providing a framework for analysis by engaging with a wide range of border security experts from key donor states...holistic national border security action plan and gap analysis were necessary to simultaneously deal with the global WMD nonproliferation agenda and...efforts from a research and analysis vantage point. The underlying idea was that Kenya, through this border security action plan and gap analysis , would

  16. Border Security: A Conceptual Model of Complexity

    DTIC Science & Technology

    2013-12-01

    maximum 200 words ) This research applies complexity and system dynamics theory to the idea of border security, culminating in the development of...alternative policy options. E. LIMITATIONS OF RESEARCH AND MODEL This research explores whether border security is a living system. In other words , whether...border inspections. Washington State, for example, experienced a 50% drop in tourism and lost over $100 million in local revenue because of the

  17. General Framework for Evaluating Password Complexity and Strength

    DTIC Science & Technology

    2015-11-15

    stronger password requirements: User attitudes and behaviors,” in Pro- ceedings of the Sixth Symposium on Usable Privacy and Security, ser. SOUPS ’10. New...Proceedings of the Eighth Symposium on Usable Privacy and Security, ser. SOUPS ’12. New York, NY, USA: ACM, 2012, pp. 1–20. [22] P. Kelley, S. Komanduri

  18. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America.

    PubMed

    Baird, Theodore

    2017-06-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.

  19. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America

    PubMed Central

    Baird, Theodore

    2017-01-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices. PMID:29046601

  20. Imagining and Imaging Borders: Understanding Borderlands for Global Sustainability

    NASA Astrophysics Data System (ADS)

    Konrad, V.

    2013-11-01

    Borders are increasingly complex human responses and social constructions in a world where globalizing forces confront basic human concerns for security and certainty. In an effort to provide a background to assess research directions for imaging borders, this paper explores what we know about borders, and what we do not know well about borders. Borders in globalization are the meeting points of globalizing forces of security, trade and migration flows with emerging technologies, self determination and regionalization around the world. We need to know more about how: self determination fuels secessions and new borders; borders result from complex rather than simple policy and governance issues; borders depend on the political clout of borderland communities; market and migration flows impact borders; and borders are always in motion. The paper shows how these organizing principles underlie the basic themes of border governance, flows, culture, history, security and sustainability. Finally, the paper offers two brief illustrations of border imaging to link this presentation to the following discussion of the workshop.

  1. A model for international border management systems.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duggan, Ruth Ann

    2008-09-01

    To effectively manage the security or control of its borders, a country must understand its border management activities as a system. Using its systems engineering and security foundations as a Department of Energy National Security Laboratory, Sandia National Laboratories has developed such an approach to modeling and analyzing border management systems. This paper describes the basic model and its elements developed under Laboratory Directed Research and Development project 08-684.

  2. 77 FR 34055 - Agency Information Collection Activities: Certificate of Registration

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-08

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection.... SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of Homeland Security will be... addressed to the OMB Desk Officer for U.S. Customs and Border Protection, Department of Homeland Security...

  3. 78 FR 16701 - Agency Information Collection Activities: Application for Foreign Trade Zone and/or Status...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Zone Activity Permit AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security...-0029. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of Homeland Security will be...

  4. 76 FR 65207 - U.S. Customs and Border Protection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-20

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses AGENCY: U.S. Customs and Border Protection, U.S. Department of Homeland Security.... 1641) and the U.S. Customs and Border Protection regulations (19 CFR 111.51), the following Customs...

  5. Fermilab | Tevatron | Tevatron Symposium | Agenda

    Science.gov Websites

    Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and brochures Media media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Symposium Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at Work For Industry

  6. Fermilab | Tevatron | Tevatron Symposium

    Science.gov Websites

    Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and brochures Media media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Symposium Energy Office of Science Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book

  7. Regional Joint Border Commands: A Pathway to Improving Collaboration and Effectiveness for Border Control

    DTIC Science & Technology

    2009-12-01

    Police xii SBI Secure Border Initiative SES Senior Executive Service SSP Secretaria de Seguridad Publica TSA Transportation Security...also been involvement from the Mexican law enforcement agency, Secretaria de Seguridad Publica (SSP) on the southwest border (CBP, 2009; ICE, 2009, p. 5...The U.S. border is comprised of nearly 20,000 miles of a mix of coastline and rugged land borders with Mexico and Canada; this includes parts of

  8. Modeling the U.S. Border Patrol Tucson Sector for the Deployment and Operations of Border Security Forces

    DTIC Science & Technology

    2006-03-01

    Crime_Trends_2005.pdf (accessed August 3, 2005). Consejo de Seguridad Publica , “Programa de Mediano Plazo 2004 - 2009: Seguridad Publica ,” http...international Southwest border. The issue of illegal human smuggling is not new to the United States- Mexico border or to law enforcement agencies...Operation Gatekeeper; Operation Hold the Line; Operation Stonegarden; Tucson Sector; US Border Patrol; US- Mexico border. 16. PRICE CODE 17. SECURITY

  9. Fermilab | Tevatron | Tevatron Symposium | Travel and Lodging

    Science.gov Websites

    Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and brochures Media media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Symposium Office of Science Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at

  10. 76 FR 67755 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-02

    ... 1974; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP-003 Credit/Debit Card... Security/U.S Customs and Border Protection--003 Credit/Debit Card Data System of Records.'' This system... any credit and debit card transactions with it has with individuals. Additionally, the Department of...

  11. 17th International Seapower Symposium

    DTIC Science & Technology

    2006-06-01

    rewarding, and impactful three days. Throughout its history, the ISS has been an intellectual gathering of friends and shipmates. Former U.S. CNO...you. To my peers and colleagues, welcome to this important Symposium, the seven- teenth of its kind and spanning a history that coincides with many of...There is no inherent conflict between a country’s national interests in maritime security and the greater security of the global com- mons. They are

  12. 77 FR 73038 - Agency Information Collection Activities: Foreign Assembler's Declaration

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-07

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Foreign Assembler's Declaration AGENCY: U.S. Customs and Border Protection, Department of... information. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of Homeland Security will be...

  13. Border Cracks: Approaching Border Security From a Complexity Theory and Systems Perspective

    DTIC Science & Technology

    2012-12-01

    The judicial system ensures the laws passed, along with the enforcement, are legal and in accordance with the Constitution . Judicial rulings are...54 4. Prohibition: The Beginning of Border Security as a Law Enforcement Tool...64 5. Law Enforcement ...............................................................................65 6

  14. Measuring the Effectiveness of Border Security Between Ports of Entry

    DTIC Science & Technology

    2010-01-01

    missions. Th is report describes the results of a short study on such measures. It should be of interest to analysts and leaders responsible for...32 6.2 Identifying and Exploiting Opportunities to Estimate Attempted Illegal Crossings . . . . . . . 33 6.3 Translating Studies of...ected discussions with DHS component agencies engaged in border-security eff orts, review of prior studies of border security, and fi eld visits to

  15. NNSA Administrator Looks to Future of Nuclear Security at STRATCOM Symposium

    ScienceCinema

    Thomas D'Agostino

    2017-12-09

    Administrator Thomas P. DAgostino of the National Nuclear Security Administration (NNSA) discusses the future of the Nuclear Security Enterprise and its strategic deterrence mission in light of President Obamas unprecedented nuclear security agenda.

  16. The Design Process of Physical Security as Applied to a U.S. Border Point of Entry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wagner, G.G.

    1998-10-26

    This paper describes the design process of physical security as applied to a U.S. Border Port of Entry (PoE). Included in this paper are descriptions of the elements that compose U.S. border security. The physical security design will describe the various elements that make up the process as well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry and exit of illegal contraband will be emphasized.

  17. 77 FR 55486 - Agency Information Collection Activities: Importer ID Input Record

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-10

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Importer ID Input Record AGENCY: U.S. Customs and Border Protection, Department of Homeland... information. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of Homeland Security will be...

  18. 78 FR 48458 - Notice of Reinstatement of Customs Broker License

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-08

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Reinstatement of Customs Broker License AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION...) on December 6, 2012, U.S. Customs and Border Protection, pursuant to section 641 of the Tariff Act of...

  19. 77 FR 45647 - Notice of Cancellation of Customs Broker Licenses

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-01

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses AGENCY: U.S. Customs and Border Protection, U.S. Department of Homeland Security... 1641) and the U.S. Customs and Border Protection regulations (19 CFR 111.51), the following Customs...

  20. 77 FR 9954 - Agency Information Collection Activities: Declaration of Owner and Declaration of Consignee When...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-21

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs And Border Protection Agency Information Collection.... Customs and Border Protection, Department of Homeland Security. ACTION: 30-Day notice and request for comments; Extension of an existing information collection. SUMMARY: U.S. Customs and Border Protection (CBP...

  1. 75 FR 5487 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-03

    ...The Department of Homeland Security is issuing a final rule to amend its regulations to exempt portions of a Department of Homeland Security/U.S. Customs and Border Protection system of records entitled the, ``Department of Homeland Security/U.S. Customs and Border Protection--006 Automated Targeting System of Records'' from certain provisions of the Privacy Act. Specifically, the Department exempts portions of the Department of Homeland Security/U.S. Customs and Border Protection--006 Automated Targeting system of records from one or more provisions of the Privacy Act because of criminal, civil, and administrative enforcement requirements.

  2. Business models for implementing geospatial technologies in transportation decision-making : GIS-T symposium, April 8, 2009.

    DOT National Transportation Integrated Search

    2009-04-08

    In 2005 and 2006, the Federal Highway Administration (FHWA) Office of Interstate and Border Planning (HEPI), along with several state transportation executives, conducted a series of site visits to transportation agencies and GIS vendors to identify ...

  3. Development of Indonesia-Papua New Guinea border, Muara Tami District, Jayapura City through agropolitan concept

    NASA Astrophysics Data System (ADS)

    Subagiyo, A.; Dwiproborini, F.; Sari, N.

    2017-06-01

    The border of RI-PNG Muara Tami district is located on the eastern part of Jayapura city, which has agricultural potential. The past paradigm put the border as the backyard caused underdevelopment in border RI-PNG Muara Tami district, so that needed acceleration development through agropolitan concept. The purpose of the research is to define the aspect of physical, social, economic and border security to support agropolitan concept in border RI-PNG Muara Tami district. The analytical research method are border interactionan analysis, border security analysis, land capability analysis, land availability analysis, schallogram analysis, institutional analysis, leading comodity analysis (LQ and Growth Share), agribusiness linkage system analysis, accessibility analysis and A’WOT analysis. The result shown that mobilization from PNG to Muara Tami district could increase the economic opportunities with agricultural based. Border security of RI-PNG Muara Tami district is vulnerable, yet still condusive to mobilization. There is 12.977,94 Ha potensial land for agricultural (20,93%). There are six leading commodities to developed are rice, watermelon, banana, coconut, areca nut and cocoa. The border of RI-PNG Muara Tami district is ready enough to support agropolitan concept, but still have problems in social and economy aspect.

  4. DefenseLink Special: Travels with Gates, February 2007

    Science.gov Websites

    to address the 43rd Munich Conference on Security Policy, Feb. 10 and 11, in Munich, Germany. Feb. 12 , the secretary traveled to Pakistan to meet with Pakistan President Pervez Musharaff to discuss border security on the Pakistan-Afghanistan border. Islamabad, Pakistan Gates, Pakistani President Discuss Border

  5. 78 FR 26648 - Agency Information Collection Activities: Passenger List/Crew List (CBP Form I-418)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-07

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Passenger List/Crew List (CBP Form I-418) AGENCY: U.S. Customs and Border Protection (CBP... prescribed by the Department of Homeland Security, Customs and Border Protection (CBP), for use by masters...

  6. Authoritarianism among border police officers, career soldiers, and airport security guards at the Israeli border.

    PubMed

    Rubinstein, Gidi

    2006-12-01

    Several personality theories focusing on specific personality variables involved in career choice and job satisfaction are based on the assumption that individuals choose certain career choices because they believe that they may be able to meet their emotional needs (J. L. Holland, 1977). The author of this study investigated the personality traits of border police officers, career soldiers, and airport security guards in Israel. The participants were 160 men--40 border policemen, 40 career soldiers, 40 airport security guards, and 40 control participants--who filled out a demographic questionnaire and a Hebrew version of the right-wing authoritarianism (RWA) shortened scale (B. Altemeyer, personal communication, February 2000). The present hypothesis predicted that the RWA scores of border police officers would be the highest, followed by those of career soldiers, airport security guards, and control participants, in that order. Statistically significant differences in RWA scores occurred between these groups in the predicted order, with the exception of the career soldiers' RWA scores, which did not significantly differ from those of the airport security guards.

  7. 78 FR 77139 - Agency Information Collection Activities: Small Vessel Reporting System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-20

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Security. ACTION: 30-Day notice and request for comments; Extension of an existing information collection: 1651-0137. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of Homeland Security...

  8. Higher Educational Institutions Providing Border Security Training: What Motivates Cadets and Instructors

    ERIC Educational Resources Information Center

    Talynev, V. E.

    2007-01-01

    The specific character of border troops' performance of their operational and service tasks at border security posts and "hot spots" makes it necessary to analyze in depth and study the problems of how to improve the training of graduates and how to motivate the cadets enrolled in higher educational institutions of Russia's Federal…

  9. 76 FR 82314 - Agency Information Collection Activities: Small Vessel Reporting System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-30

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Security. ACTION: 30-Day notice and request for comments; Establishment of a new collection of information. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of Homeland Security will be...

  10. Challenges and opportunities in supporting sustainable agriculture and food security

    USDA-ARS?s Scientific Manuscript database

    The 2014 IUPAC International Congress of Pesticide Chemistry (San Francisco, August, 2014) included a symposium on “Challenges Associated with Global Adoption of Agricultural Biotechnology” to review current obstacles in promoting GM crops. Challenges identified by symposium presenters included i) ...

  11. Securing our Borders and our Data Act of 2009

    THOMAS, 111th Congress

    Rep. Engel, Eliot L. [D-NY-17

    2009-01-07

    House - 02/09/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Challenge theme 7: Information support for management of border security and environmental protection: Chapter 9 in United States-Mexican Borderlands: Facing tomorrow's challenges through USGS science

    USGS Publications Warehouse

    Parcher, Jean W.; Page, William R.

    2013-01-01

    Historically, international borders were located far from the major political and economic capitals of their countries and rarely received adequate planning or infrastructure development. Today, as a result of global economics and increased movement of goods between nations, border regions play a much greater role in commerce, tourism, and transportation. For example, Mexico is the second largest destination for United States exports (Woodrow Wilson Center Mexico Institute, 2009). The rapid population and economic growth along the United States–Mexican border, undocumented human border crossings, and the unique natural diversity of resources in the Borderlands present challenges for border security and environmental protection. Assessing risks and implementing sustainable growth policies to protect the environment and quality of life greatly increase in complexity when the issues cross an international border, where social services, environmental regulations, lifestyles, and cultural beliefs are unique for each country. Shared airsheds, water and biological resources, national security issues, and disaster management needs require an integrated binational approach to assess risks and develop binational management strategies.

  13. Border Security, Cooperation, and Act Now Drug War Prevention Act

    THOMAS, 111th Congress

    Rep. Jackson-Lee, Sheila [D-TX-18

    2009-04-02

    House - 05/26/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. Cooperative Monitoring Center Occasional Paper/8: Cooperative Border Security for Jordan: Assessment and Options

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Qojas, M.

    1999-03-01

    This document is an analysis of options for unilateral and cooperative action to improve the security of Jordan's borders. Sections describe the current political, economic, and social interactions along Jordan's borders. Next, the document discusses border security strategy for cooperation among neighboring countries and the adoption of confidence-building measures. A practical cooperative monitoring system would consist of hardware for early warning, command and control, communications, and transportation. Technical solutions can expand opportunities for the detection and identification of intruders. Sensors (such as seismic, break-wire, pressure-sensing, etc.) can warn border security forces of intrusion and contribute to the identification of themore » intrusion and help formulate the response. This document describes conceptual options for cooperation, offering three scenarios that relate to three hypothetical levels (low, medium, and high) of cooperation. Potential cooperative efforts under a low cooperation scenario could include information exchanges on military equipment and schedules to prevent misunderstandings and the establishment of protocols for handling emergency situations or unusual circumstances. Measures under a medium cooperation scenario could include establishing joint monitoring groups for better communications, with hot lines and scheduled meetings. The high cooperation scenario describes coordinated responses, joint border patrols, and sharing border intrusion information. Finally, the document lists recommendations for organizational, technical, and operational initiatives that could be applicable to the current situation.« less

  15. Nonimmigrant Overstays: Brief Synthesis of the Issue

    DTIC Science & Technology

    2010-01-15

    finger biometric system for immigration identification17 to the major identity management and screening... finger scans and digital photographs) to check identity. Enhanced Border Security and Visa Entry Reform Act of 2002 The Enhanced Border Security ...further provides: “A determination by the Secretary of Homeland Security that an alien who applied for authorization to travel to the United States

  16. 77 FR 44642 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection-DHS/CBP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-30

    ... 1974; Department of Homeland Security U.S. Customs and Border Protection-DHS/CBP-009 Electronic System for Travel Authorization (ESTA) System of Records AGENCY: Privacy Office, Department of Homeland Security. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of...

  17. Fermilab | Science | Inquiring Minds

    Science.gov Websites

    Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and brochures Media media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Symposium Office of Science Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at

  18. Fermilab | Tritium at Fermilab

    Science.gov Websites

    Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and brochures Media media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Symposium Energy Office of Science Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book

  19. Fermilab | Tevatron | Shutdown Process

    Science.gov Websites

    Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and brochures Media media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Symposium Science Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at Work For

  20. Border Security Agency Structure: A Hindrance to Demonstrating Border Security Success

    DTIC Science & Technology

    2013-12-01

    Barrett and Ronald E. Fry, the inquiry is about the honest desire “…to learn about something at its premise. It is not only about mobilizing human...Enforcement ( Skinner , 2005). That was followed by Detention and Removal of Illegal Aliens, U.S. Immigration and Customs Enforcement (ICE) ( Skinner , 2006...and DHS’ Progress in Addressing Coordination Challenges Between Customs and Border Protection and Immigration and Customs Enforcement ( Skinner

  1. The Economic Impact of the Homeland Security Advisory System: The Cost of Heightened Border Security

    DTIC Science & Technology

    2008-12-01

    the United States. Secondary economic impacts of the HSAS such as the airline industry , lost tourism , and retail business from cross-border...Ontario and its businesses. The study is aimed at the trucking, automotive, and tourism industries ; and how they are impacted by border delays. The...19 A. DETROIT-WINDSOR AND THE AUTOMOTIVE INDUSTRY ............19 B. THE AMBASSADOR BRIDGE SYSTEM .................................................21

  2. 77 FR 36292 - Notice Pursuant to the National Cooperative Research and Production Act of 1993-Border Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-18

    ... research, development, engineering and production of border security-related systems; and (iii) to insert.... Patricia A. Brink, Director of Civil Enforcement, Antitrust Division. [FR Doc. 2012-14766 Filed 6-15-12; 8...

  3. 78 FR 57402 - Privacy Act of 1974; Department of Homeland Security/U.S. Customs and Border Protection-019 Air...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-18

    ... forth in this system of records notice. AMOSS also has users from the Department of Defense (DOD... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0021] Privacy Act of 1974; Department of Homeland Security/U.S. Customs and Border Protection--019 Air and Marine Operations...

  4. Cost and effectiveness analysis on unmanned aerial vehicle (UAV) use at border security

    NASA Astrophysics Data System (ADS)

    Yilmaz, Bahadır.

    2013-06-01

    Drones and Remotely Piloted Vehicles are types of Unmanned Aerial Vehicles. UAVs began to be used with the war of Vietnam, they had a great interest when Israel used them in Bekaa Valley Operations of 1982. UAVs have been used by different countries with different aims with the help of emerging technology and investments. In this article, in the context of areas of UAV usage in national security, benefits and disadvantages of UAVs are put forward. Particularly, it has been evaluated on the basis of cost-effectiveness by focusing the use of UAV in the border security. UAVs have been studied by taking cost analysis, procurement and operational costs into consideration. Analysis of effectiveness has been done with illegal passages of people and drugs from flight times of UAVs. Although the procurement cost of the medium-level UAVs is low, its operational costs are high. For this reason, the idea of less costly alternative systems have been revealed for the border security. As the costs are reduced to acceptable level involving national security and border security in future with high-technology products in their structure, it will continue to be used in an increasing proportion.

  5. Surveillance of borders, coastlines, and harbours (SOBCAH): a European commission preparatory action on security research

    NASA Astrophysics Data System (ADS)

    Clarke, David J.; Davis, Eric; Varco, Alan G.

    2008-10-01

    Surveillance Of Borders Coastlines And Harbours (SOBCAH ) is becoming increasingly challenging in Europe due to the expansion of new European borders coupled with the increased risks from the potential quantity and variety of terrorist activities. SOBCAH was an 18-month programme undertaken as a European Commission funded Preparatory Action in the field of Security Research (PASR) initiative to identify and demonstrate improvements in security; initially focusing on techniques to maximise the surveillance and detection effectiveness of existing sensor systems and technologies. This paper discusses the rationale in identifying the requirements, establishing a system architecture and the findings of building a security system demonstrator that underwent trials in the Port of Genoa, Italy in July 2007. It will provide an overview of the main drivers for a European-wide concept to standardise the development of enhanced border security systems. The paper will focus on techniques employed in the demonstrator to maximise the intelligence gathered from many disparate sensor sources without burdening the work load of the operators; providing enhanced situational awareness of the threat environment.

  6. Surface-enhanced Raman spectroscopy and homeland security: a perfect match?

    PubMed

    Golightly, Rebecca S; Doering, William E; Natan, Michael J

    2009-10-27

    This Nano Focus article reviews recent developments in surface-enhanced Raman spectroscopy (SERS) and its application to homeland security. It is based on invited talks given at the "Nanorods and Microparticles for Homeland Security" symposium, which was organized by one of the authors and presented at the 238th ACS National Meeting and Exhibition in Washington, DC. The three-day symposium included approximately 25 experts from academia, industry, and national laboratories and included both SERS and non-SERS approaches to detection of chemical and biological substances relevant to homeland security, as well as fundamental advances. Here, we focus on SERS and how it is uniquely positioned to have an impact in a field whose importance is increasing rapidly. We describe some technical challenges that remain and offer a glimpse of what form solutions might take.

  7. The Design Process of Physical Security as Applied to a U.S. Border Port of Entry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wagner, G.G.

    1999-02-22

    This paper details the application of a standard physical security system design process to a US Border Port of Entry (PoE) for vehicle entry/exit. The physical security design methodology is described as well as the physical security similarities to facilities currently at a US Border PoE for vehicles. The physical security design process description includes the various elements that make up the methodologies well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry/exit of illegal contraband and personnel are described. The potential to enhance the functionsmore » of drug/contraband detection in the Pre-Primary Inspection area through the application of emerging technologies are also addressed.« less

  8. Fermilab | Science | Fermilab and the Higgs Boson

    Science.gov Websites

    Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and brochures Media media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Symposium Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at Work For Industry

  9. Fermilab | Science | Particle Accelerators | LHC and Future Accelerators

    Science.gov Websites

    Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and brochures Media media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Symposium Office of Science Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at

  10. Fermilab | Tritium at Fermilab | Kress Creek Results

    Science.gov Websites

    Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and brochures Media media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Symposium Science Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at Work For

  11. Fermilab | Science | Particle Accelerators | Fermilab's Accelerator Complex

    Science.gov Websites

    Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and brochures Media media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Symposium Science Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at Work For

  12. Fermilab | Tritium at Fermilab | Indian Creek Aerial View

    Science.gov Websites

    Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and brochures Media media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Symposium Office of Science Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at

  13. Fermilab | Science | Inquiring Minds | Questions About Physics

    Science.gov Websites

    Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and brochures Media media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Symposium Science Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at Work For

  14. Fermilab | Tritium at Fermilab | Kress Creek Aerial View

    Science.gov Websites

    Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and brochures Media media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Symposium Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at Work For Industry

  15. Fermilab | Science | Questions for the Universe

    Science.gov Websites

    Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and brochures Media media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Symposium Science Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at Work For

  16. Fermilab | Tritium at Fermilab | Ferry Creek Aerial View

    Science.gov Websites

    Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and brochures Media media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Symposium Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at Work For Industry

  17. HRD: Past, Present and Future. Symposium.

    ERIC Educational Resources Information Center

    2002

    This document contains three papers from a symposium on the past, present, and future of human resource development (HRD). "Revisiting the New Deal: A Longitudinal Case Study" (Judy Pate, Graeme Martin, Jim McGoldrick) draws upon data from a longitudinal case study of the links between job security and HRD to examine the new…

  18. 76 FR 3649 - Agency Information Collection Activities: Request for Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-20

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Request for Information AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: 30-Day notice and request for comments; Extension of an existing information collection...

  19. 78 FR 26649 - Agency Information Collection Activities: Trusted Traveler Programs

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-07

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Trusted Traveler Programs AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security. ACTION: 60-Day Notice and request for comments; Extension of an existing collection of...

  20. 77 FR 40892 - Agency Information Collection Activities: Crew Member's Declaration

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-11

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Crew Member's Declaration AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security. ACTION: 60-Day Notice and request for comments; Extension of an existing collection of...

  1. 78 FR 48457 - Correction of Document Revoking Customs Broker Licenses

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-08

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Correction of Document Revoking Customs Broker Licenses AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Correction of document revoking certain customs broker licenses. SUMMARY: In a notice published...

  2. 78 FR 70065 - Agency Information Collection Activities: Customs Declaration

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-22

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Customs Declaration AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security ACTION: 60-Day notice and request for comments; Extension of an existing collection of information...

  3. 78 FR 48456 - Notice of Cancellation of Customs Broker Licenses

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-08

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Customs broker license cancellations. SUMMARY: Notice is hereby given that the customs broker...

  4. 77 FR 73038 - Agency Information Collection Activities: Application for Allowance in Duties

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-07

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Application for Allowance in Duties AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security. ACTION: 60-day notice and request for comments; Extension of an existing...

  5. 78 FR 64234 - Notice of Reinstatement of Customs Broker Licenses; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-28

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Reinstatement of Customs Broker Licenses; Correction AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice; correction. SUMMARY: CBP published a notice in the Federal Register on August 8...

  6. Immigration And Its Effects On The National Security Of Sri Lanka

    DTIC Science & Technology

    2016-12-01

    Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE December 2016 3...conflict, counter-terrorism, border security management , diaspora, census, ideologies, refugees, human smuggling, trafficking, trans-border... MANAGEMENT ................................................................71 1. Domestic Control Measures

  7. Homeland Security Department: FY2009 Appropriations

    DTIC Science & Technology

    2009-03-04

    security fees 2,113 2,329 TWIC 64 9 Hazmat 18 18 TSA Registered Traveler 4 10 FEMA/EPR National Flood Insurance Fund 111 157 CBP Small airports 7...Border. f. Fees include TWIC, HAZMAT, Registered Traveler , and Alien Flight School Checks. Homeland Security Department: FY2009 Appropriations CRS...unauthorized travelers and immigrants; and enforcing more than 400 laws and regulations at the border on behalf of more than 60 government agencies

  8. Measuring cross-border travel times for freight : Otay Mesa international border crossing.

    DOT National Transportation Integrated Search

    2010-09-01

    Cross border movement of people and goods is a vital part of the North American economy. Accurate real-time data on travel times along the US-Mexico border can help generate a range of tangible benefits covering improved operations and security, lowe...

  9. 78 FR 35044 - U.S. Customs and Border Protection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-11

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Visa Waiver Program Carrier Agreement (CBP Form I-775) AGENCY: U.S. Customs and Border Protection... information collection: 1651-0110. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of...

  10. 76 FR 54780 - Agency Information Collection Activities: Foreign Trade Zone Annual Reconciliation Certification...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-02

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection.... Customs and Border Protection (CBP), Department of Homeland Security. ACTION: 60-Day notice and request... November 1, 2011, to be assured of consideration. ADDRESSES: Direct all written comments to U.S. Customs...

  11. 77 FR 13348 - Approval of VIP Chemical, Inc., As a Commercial Gauger

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-06

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Approval of VIP Chemical, Inc., As a Commercial Gauger AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of approval of VIP Chemical, Inc., as a commercial gauger. SUMMARY: Notice is hereby given...

  12. Border Enforcement Security Task Force Act of 2011

    THOMAS, 112th Congress

    Rep. Cuellar, Henry [D-TX-28

    2011-02-17

    House - 02/24/2011 Referred to the Subcommittee on Border and Maritime Security. (All Actions) Notes: For further action, see H.R.915, which became Public Law 112-205 on 12/7/2012. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. Re-Casting the U.S.-Mexico Border Security Net

    DTIC Science & Technology

    2014-03-01

    the best fence money can buy , and they counter us with a 2,500-year-old technology.214 The incident proved that these organizations are extremely...created a demand that has attracted illicit activity. DTOs have expanded their franchises to increase the size of their profits. Border security

  14. 76 FR 71994 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-21

    ... recommendations on how to proceed on those topics: Subcommittee: The Global Supply Chain Security Land Border... document for public release.--Report by the Global Supply Chain Security Air Cargo Subcommittee. Status... surveys (IPR Partnership Program Survey and IPR Distribution Chain Management survey). Subcommittee...

  15. 78 FR 76851 - Agency Information Collection Activities: BP Regulations Pertaining to Customs Brokers

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-19

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: BP Regulations Pertaining to Customs Brokers AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security. ACTION: 60-day notice and request for comments; extension of an existing...

  16. 78 FR 23280 - Agency Information Collection Activities: United States-Caribbean Basin Trade Partnership Act...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-18

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Protection (CBP), Department of Homeland Security. ACTION: 60-Day Notice and request for comments; Extension... assured of consideration. ADDRESSES: Direct all written comments to U.S. Customs and Border Protection...

  17. 78 FR 48460 - Notice of Revocation of Customs Broker License

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-08

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Revocation of Customs Broker License AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of revocation of a customs broker license. SUMMARY: Notice is hereby given that a customs broker...

  18. 78 FR 2416 - Agency Information Collection Activities: Application To Establish a Centralized Examination Station

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-11

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Protection, Department of Homeland Security. ACTION: 60-Day notice and request for comments; Extension of an...: Direct all written comments to U.S. Customs and Border Protection, Attn: Tracey Denning, Office of...

  19. 78 FR 16520 - Agency Information Collection Activities: Application To Establish a Centralized Examination Station

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-15

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Protection, Department of Homeland Security. ACTION: 30-Day notice and request for comments; Extension of an existing information collection: 1651-0061. SUMMARY: U.S. Customs and Border Protection (CBP) of the...

  20. 77 FR 26776 - Agency Information Collection Activities: Declaration of Persons Who Performed Repairs or...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Protection, Department of Homeland Security. ACTION: 30-Day notice and request for comments; Extension of an existing information collection. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of...

  1. 77 FR 5819 - Notice of Cancellation of Customs Broker Licenses

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-06

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses AGENCY: U.S. Customs and Border Protection, U.S. Department of Homeland Security ACTION: General notice. SUMMARY: Pursuant to section 641 of the Tariff Act of 1930, as amended, (19 USC...

  2. 75 FR 11898 - Notice of Cancellation of Customs Broker License

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-12

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker License AGENCY: U.S. Customs and Border Protection, U.S. Department of Homeland Security. ACTION: General Notice. SUMMARY: Pursuant to section 641 of the Tariff Act of 1930, as amended (19 USC...

  3. 75 FR 47825 - Notice of Cancellation of Customs Broker Licenses

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-09

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses AGENCY: U.S. Customs and Border Protection, U.S. Department of Homeland Security. ACTION: General notice. SUMMARY: Pursuant to section 641 of the Tariff Act of 1930, as amended, (19 USC...

  4. 75 FR 5618 - Notice of Cancellation of Customs Broker License

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-03

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker License AGENCY: U.S. Customs and Border Protection, U.S. Department of Homeland Security. ACTION: General notice. SUMMARY: Pursuant to section 641 of the Tariff Act of 1930, as amended, (19 USC...

  5. Numbers Matter: Post-2014 Afghan National Security Force End Strength

    DTIC Science & Technology

    2013-03-01

    Afghan Border Police ( ABP ), and the Afghan National Civil Order Police (ANCOP).16 Two other Afghan security organizations, which did not factor...Air Force (AAF), Afghan Border Police ( ABP ), and Afghan Uniform Police (AUP), is also a significant challenge to the legitimacy of the ANSF with the

  6. MSFC Director welcomes attendees to the 10th Annual Wernher von

    NASA Image and Video Library

    2017-10-26

    Marshall Space Flight Center director Todd May welcomes attendees to the 10th annual Dr. Wernher von Braun Memorial Symposium held at the University of Alabama, Huntsville, Alabama. The three-day symposium brought together experts for discussion panels on science, engineering and technology under the theme “Gateways in Space: Exploration, Security, and Commerce.”

  7. Proceedings of Border Institute VI: transboundary ecosystem management

    Treesearch

    D. Rick Van Schoik

    2005-01-01

    Ecosystems are bisected by international borders along the United States-Mexican border; infrastructure and the heightened security activities bisect the north-south cores, corridors, and buffers essential to preservation of ecosystems. The Southwest Consortium for Environmental Research and Policy (SCERP) and its partners convened an annual policy conference, Border...

  8. 76 FR 7873 - U.S. Customs and Border Protection Trade Symposium 2011: “Working Together To Strengthen Economic...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-11

    .... Dated: February 7, 2011. Maria Luisa O'Connell, Senior Advisor for Trade and Public Relations, Office of... Trade Relations at (202) 344-1440, or at [email protected] . To obtain the latest information on the... should be sent to the Office of Trade Relations at [email protected] . SUPPLEMENTARY INFORMATION: The...

  9. Computer Security Models

    DTIC Science & Technology

    1984-09-01

    Verification Technique for a Class of Security Kernels," International Symposium on Programming , Lecture Notes in Computer Science 137, Springer-Verlag, New York...September 1984 MTR9S31 " J. K. Millen Computer Security C. M. Cerniglia Models * 0 Ne c - ¢- C. S• ~CONTRACT SPONSOR OUSDRE/C31 & ESO/ALEE...ABSTRACT The purpose of this report is to provide a basis for evaluating security models in the context of secure computer system development

  10. Homeland Security: A Selected Bibliography

    DTIC Science & Technology

    2011-04-01

    ProQuest Witzleb, Robert W., and Scott C . Truver. "Not Just a Bad Hair Day." [underwater mines] Proceedings: U.S. Naval Institute 134, no. 10...SAR) 18. NUMBER OF PAGES 35 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT unclassified c . THIS PAGE unclassified...IP_15_09_MigrationAndBorderSecurity.pdf Haddal, Chad C . Border Security: Key Agencies and Their Missions. Washington, DC: Library of Congress, Congressional Research Service

  11. 77 FR 12866 - Accreditation and Approval of Coastal Gulf and International, Inc. as a Commercial Gauger and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-02

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation and Approval of Coastal Gulf and International, Inc. as a Commercial Gauger and Laboratory AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of Coastal Gulf and...

  12. 77 FR 34054 - Accreditation and Approval of Amspec Services LLC, as a Commercial Gauger and Laboratory

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-08

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation and Approval of Amspec Services LLC, as a Commercial Gauger and Laboratory AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of Amspec Services LLC, as a...

  13. 77 FR 34055 - Accreditation and Approval of Saybolt LP, as a Commercial Gauger and Laboratory

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-08

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation and Approval of Saybolt LP, as a Commercial Gauger and Laboratory AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of Saybolt LP, as a commercial...

  14. 77 FR 50523 - Accreditation and Approval of Amspec Services LLC, as a Commercial Gauger and Laboratory

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-21

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation and Approval of Amspec Services LLC, as a Commercial Gauger and Laboratory AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of Amspec Services LLC, as a...

  15. 77 FR 50522 - Accreditation and Approval of Amspec Services LLC, as a Commercial Gauger and Laboratory

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-21

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation and Approval of Amspec Services LLC, as a Commercial Gauger and Laboratory AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of Amspec Services LLC, as a...

  16. 76 FR 55082 - Re-Accreditation and Re-Approval Intertek Testing Services as a Commercial Gauger and Laboratory

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-06

    ... DEPARTMENT OF HOMELAND SECURITY Bureau of Customs and Border Protection Re-Accreditation and Re... Border Protection, Department of Homeland Security. ACTION: Notice of re-approval of Intertek Testing..., Texas 78406, has been re-approved to gauge petroleum and petroleum products, organic chemicals and...

  17. 76 FR 64964 - Re-Accreditation and Re-Approval of Inspectorate America Corporation as a Commercial Gauger and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-19

    ... DEPARTMENT OF HOMELAND SECURITY Bureau of Customs and Border Protection Re-Accreditation and Re... Customs and Border Protection, Department of Homeland Security. ACTION: Notice of re-approval of..., has been re- approved to gauge petroleum and petroleum products, organic chemicals and vegetable oils...

  18. Preface of "The Second Symposium on Border Zones Between Experimental and Numerical Application Including Solution Approaches By Extensions of Standard Numerical Methods"

    NASA Astrophysics Data System (ADS)

    Ortleb, Sigrun; Seidel, Christian

    2017-07-01

    In this second symposium at the limits of experimental and numerical methods, recent research is presented on practically relevant problems. Presentations discuss experimental investigation as well as numerical methods with a strong focus on application. In addition, problems are identified which require a hybrid experimental-numerical approach. Topics include fast explicit diffusion applied to a geothermal energy storage tank, noise in experimental measurements of electrical quantities, thermal fluid structure interaction, tensegrity structures, experimental and numerical methods for Chladni figures, optimized construction of hydroelectric power stations, experimental and numerical limits in the investigation of rain-wind induced vibrations as well as the application of exponential integrators in a domain-based IMEX setting.

  19. Border Security: The Role of the U.S. Border Patrol

    DTIC Science & Technology

    2010-08-11

    officials have jointly administered this program to return at least 82,558 Mexican nationals from the Arizona- Sonora desert to the interior of Mexico ...international borders with Mexico and Canada and the coastal waters around Florida and Puerto Rico. However, there are significant geographic...political, and immigration-related differences between the northern border with Canada and the Southwest border with Mexico . Accordingly, the USBP deploys

  20. Asia-Pacific Center for Security Studies Annual Report 2010

    DTIC Science & Technology

    2010-01-01

    focused symposium in the Maldives on combating terrorism involving officials from five South Asia nations; • A series of discussion periods in China on U.S...priorities and best practices among high-level security officials from the Republic of the Philippines, Sri Lanka, the Maldives and Mongolia; • A...international security featured as prominently in 2010 in so wide a range of security-related discussions: whether traditional security ( sinking of the

  1. 77 FR 5521 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-03

    ... recommendations on how to proceed on those topics: The work of the Global Supply Chain Security Air Cargo..., 2011 meeting: The National Supply Chain Security Strategy. The CBP Initiatives of the Customs and Trade Partnership Against Terrorism (C-TPAT) program and Beyond the Border (BTB)--Report by the Global Supply Chain...

  2. Education Issues Raised by S.744: The Border Security, Economic Opportunity, and Immigration Modernization Act

    ERIC Educational Resources Information Center

    Murphy, Garrett

    2014-01-01

    This brief report summarizes the requirements for undocumented immigrants set forth by the Border Security, Economic Opportunity, and Immigration Modernization Act (S.744). Assuming that S.744 will move forward in Congress, the report also examines issues having to do with certain language, civics and government, and education/training provisions…

  3. 76 FR 64964 - Re-Accreditation and Re-Approval of SGS North America, Inc. as a Commercial Gauger and Laboratory

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-19

    ... DEPARTMENT OF HOMELAND SECURITY Bureau of Customs and Border Protection Re-Accreditation and Re... Border Protection, Department of Homeland Security. ACTION: Notice of re-approval of SGS North America..., pursuant to 19 CFR 151.13, SGS North America, Inc., Bayonne, New Jersey 07002, has been re-approved to...

  4. PREFACE: 2014 Joint IMEKO TC1-TC7-TC13 Symposium: Measurement Science Behind Safety and Security

    NASA Astrophysics Data System (ADS)

    Sousa, João A.; Ribeiro, Álvaro S.; Filipe, Eduarda

    2015-02-01

    The 2014 Joint IMEKO (International Measurement Confederation) TC1-TC7-TC13 Symposium was organized by RELACRE - Portuguese Association of Accredited Laboratories and the Portuguese Society for Metrology, on 3-5 September 2014. The work of this symposium is reported in this volume. The scope of the symposium includes the main topics covered by the above Technical Committees: - TC1 Education and Training in measurement and Instrumentation - TC7 Measurement Science - TC13 Measurements in Biology and Medicine The effort towards excellence of previous events, in this well established series, is maintained. There has been a special focus on measurement science behind safety and security, with the aim of highlighting the interdisciplinary character of measurement science and the importance of metrology in our daily lives. The discussion was introduced by keynote lectures on measurement challenges in biometrics, health monitoring and social sciences, to promote useful interactions with scientists from different disciplines. The Symposium was attended by experts working in these areas from 18 countries, including USA, Japan and China, and provided a useful forum for them to share and exchange their work and ideas. In total over fifty papers are included in the volume, organized according to the presentation sessions. Each paper was independently peer-reviewed by two reviewers from a distinguished international panel. The Symposium was held in Funchal, capital of Madeira Islands, known as the Atlantic Pearl. This wonderful Atlantic archipelago, formed by Madeira and Porto Santo islands, discovered in the 14th century, was chosen to host the 2014 IMEKO TC1-TC7-TC13 Joint Symposium ''Measurement Science behind Safety and Security''. It was the first territory discovered by the Portuguese sailors, when set out to discover a new world, in an epic journey where instrumentation and quality of measurement played a central role in the success of the enterprise, and gave an important technological edge to those men. A fortunate analogy to the advances sought by the research undertaken in the areas covered by this event. We would like to take this opportunity to thank the members of the Symposium Steering and International Programme Committees, many of whom acted as reviewers of the papers presented here under a very short timescale, as well as our partner, SPMet - Portuguese Society for Metrology. The editors hope that this volume will provide a useful contribution to enhancing the science, technology, education, and training in measurement and instrumentation. João A. Sousa, Álvaro S. Ribeiro and Eduarda Filipe Editors

  5. The Ninth National Space Symposium

    NASA Astrophysics Data System (ADS)

    Lipskin, Beth Ann; Patterson, Sara; Brescia, David A.; Burk, Donna; Flannery, Jack; St. John, Pat; Zimkas, Chuck

    Proceedings of the Ninth National Space Symposium held 13-16 April 1993 by the United States Space Foundation are presented. Presentations made at the symposium are included. Topics discussed include: Change, Challenge and Opportunity; Washington Insiders: National Space Policy and Budget Issues; Civil Space: a Vision for the Future; Space Power for an Expanded Vision; Unparalled Launch Vehicle Propulsion Capabilities; National Security Space Issues; Perspectives on the Air Force in Space; Future Technology: Space Propulsion, Earth Observation and International Cooperation; Achieving Efficient Space Transportation; the Future in Space Exploration; Kids, Parents and Teachers are into Space; and Public Congressional Forum on Space - International Space Issues.

  6. Border Security: The Role of the U.S. Border Patrol

    DTIC Science & Technology

    2010-07-30

    least 82,558 Mexican nationals from the Arizona- Sonora desert to the interior of Mexico .52 Program renewal for FY2010 has not yet been announced...international borders with Mexico and Canada and the coastal waters around Florida and Puerto Rico. However, there are significant geographic...political, and immigration-related differences between the northern border with Canada and the southwest border with Mexico . Accordingly, the USBP deploys a

  7. Proceedings of the Air Power Symposium on the Role of Airpower in Low Intensity Conflict (9th) Held at Maxwell AFB, Alabama on 11-13 March 1985. Appendix 3. Symposium Papers,

    DTIC Science & Technology

    1985-05-01

    and internal security problems which represent the comtemporary disease. Nicaragua, under Somoza, was one such example. The Somoza family...he was assigned to the Armament * Division, Eglin APB, Florida. He completed a Master’s Degree in Business * Administration in 1983 and then

  8. Baiting Inside Attackers using Decoy Documents

    DTIC Science & Technology

    2008-09-16

    viewed. Animated images allow the senders to monitor how long the message was displayed. The web bugs operate without alerting the user of the...Military Computer Security Policies”. IEEE Symposium on Security and Privacy, 1987. [5] Demers, A., Gehrke, J., Hong, M., Panda , B., Riedewald, M., Sharma

  9. Responding to Communicable Diseases in Internationally Mobile Populations at Points of Entry and along Porous Borders, Nigeria, Benin, and Togo

    PubMed Central

    Rogers, Kimberly; Ward, Sarah; Ojo, Olubumni; Kakaī, Clement Glele; Agbeko, Tamekloe Tsidi; Garba, Hassan; MacGurn, Amanda; Oppert, Marydale; Kone, Idrissa; Bamsa, Olutola; Schneider, Dana; Brown, Clive

    2017-01-01

    Recent multinational disease outbreaks demonstrate the risk of disease spreading globally before public health systems can respond to an event. To ensure global health security, countries need robust multisectoral systems to rapidly detect and respond to domestic or imported communicable diseases. The US Centers for Disease Control and Prevention International Border Team works with the governments of Nigeria, Togo, and Benin, along with Pro-Health International and the Abidjan-Lagos Corridor Organization, to build sustainable International Health Regulations capacities at points of entry (POEs) and along border regions. Together, we strengthen comprehensive national and regional border health systems by developing public health emergency response plans for POEs, conducting qualitative assessments of public health preparedness and response capacities at ground crossings, integrating internationally mobile populations into national health surveillance systems, and formalizing cross-border public health coordination. Achieving comprehensive national and regional border health capacity, which advances overall global health security, necessitates multisectoral dedication to the aforementioned components. PMID:29155668

  10. Responding to Communicable Diseases in Internationally Mobile Populations at Points of Entry and along Porous Borders, Nigeria, Benin, and Togo.

    PubMed

    Merrill, Rebecca D; Rogers, Kimberly; Ward, Sarah; Ojo, Olubumni; Kakaī, Clement Glele; Agbeko, Tamekloe Tsidi; Garba, Hassan; MacGurn, Amanda; Oppert, Marydale; Kone, Idrissa; Bamsa, Olutola; Schneider, Dana; Brown, Clive

    2017-12-01

    Recent multinational disease outbreaks demonstrate the risk of disease spreading globally before public health systems can respond to an event. To ensure global health security, countries need robust multisectoral systems to rapidly detect and respond to domestic or imported communicable diseases. The US Centers for Disease Control and Prevention International Border Team works with the governments of Nigeria, Togo, and Benin, along with Pro-Health International and the Abidjan-Lagos Corridor Organization, to build sustainable International Health Regulations capacities at points of entry (POEs) and along border regions. Together, we strengthen comprehensive national and regional border health systems by developing public health emergency response plans for POEs, conducting qualitative assessments of public health preparedness and response capacities at ground crossings, integrating internationally mobile populations into national health surveillance systems, and formalizing cross-border public health coordination. Achieving comprehensive national and regional border health capacity, which advances overall global health security, necessitates multisectoral dedication to the aforementioned components.

  11. Information Assurance and Cyber Defence (Assurance de l’information et cyberdefense)

    DTIC Science & Technology

    2010-11-01

    project is that knowledge exchange in a timely fashion is highly significant. Authentication and Authorisation of Users and Services in Federated...Detection, Protection and Countermeasures; • Security Models and Architectures; • Security Policies, Evaluation, Authorisation and Access Control; and...Evaluation, Authorisation and Access Control • Network and Information Security Awareness The topics for the symposium had been established

  12. People Crossing Borders: An Analysis of U.S. Border Protection Policies

    DTIC Science & Technology

    2010-05-13

    evaluate the policies that have been pursued in providing border protection, especially as these policies might impact other elements of the U.S. border...evaluate the impact of the current framework. Lastly, this report offers some policy options—both short-term and long-term—for addressing the...to account for the commercial consequences of ever-climbing levels of security at the U.S. border. In the end, balancing the economic impact of

  13. Proceedings of the NASA Aerospace Technology Symposium 2002

    NASA Technical Reports Server (NTRS)

    Bowen, Brent D. (Editor); Fink, Mary M. (Editor); Schaaf, Michaela M. (Editor)

    2002-01-01

    Reports are presented from the NASA Aerospace Technology Symposium 2002 on the following: Geo-Referenced Altitude Hold For Latex Ballons; NASA Spaceport Research: Opportunities For space Grant and EPSCoR Involvement; Numerical Simulation Of The Combustion Of Fuel Droplets: Applications, Aircraft/Spacecraft Flight Control, Guidance Navigation; Expertise In System Dynamics and Control, Control Theory and Aerospace Education Ooutreach Opportunities; and Technology For The Improvement Of General Aviation Security: A Needs Assessmemt.

  14. Emerging Agricultural Biotechnologies for Sustainable Agriculture and Food Security.

    PubMed

    Anderson, Jennifer A; Gipmans, Martijn; Hurst, Susan; Layton, Raymond; Nehra, Narender; Pickett, John; Shah, Dilip M; Souza, Thiago Lívio P O; Tripathi, Leena

    2016-01-20

    As global populations continue to increase, agricultural productivity will be challenged to keep pace without overtaxing important environmental resources. A dynamic and integrated approach will be required to solve global food insecurity and position agriculture on a trajectory toward sustainability. Genetically modified (GM) crops enhanced through modern biotechnology represent an important set of tools that can promote sustainable agriculture and improve food security. Several emerging biotechnology approaches were discussed in a recent symposium organized at the 13th IUPAC International Congress of Pesticide Chemistry meeting in San Francisco, CA, USA. This paper summarizes the innovative research and several of the new and emerging technologies within the field of agricultural biotechnology that were presented during the symposium. This discussion highlights how agricultural biotechnology fits within the context of sustainable agriculture and improved food security and can be used in support of further development and adoption of beneficial GM crops.

  15. The Value of Doctrine for a Developing Organization

    DTIC Science & Technology

    2009-12-01

    increasingly public topic since the events of September 11, 2001. Customs and Border Protection (CBP) is one of the Department of Homeland Security’s...CBP was created, the majority of the existing organization came from two legacy agencies, U.S. Customs and the Immigration and Naturalization Service...Collaboration, Merger, Trust, Customs And Border Protection, CBP 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY

  16. Border Security: A Journey Without a Destination

    DTIC Science & Technology

    2013-12-01

    states and the federal government are, to a significant extent, defined by the United States Constitution and relevant case law .”77 Historically...government can invoke the “supremacy clause” of the Constitution , which can preempt state law . The federal government cited the supremacy clause in their...local governments have all defined what constitutes a secure border differently, which makes the measurement of success or failure virtually

  17. Device-Enabled Authorization in the Grey System

    DTIC Science & Technology

    2005-02-01

    proof checker. Journal of Automated Reasoning 31(3-4):231–260, 2003. [7] D. Balfanz , D. Dean, and M. Spreitzer. A security infrastructure for...distributed Java applications. In Proceedings of the 21st IEEE Symposium on Security and Privacy, May 2002. [8] D. Balfanz and E. Felten. Hand-held computers

  18. 75 FR 15446 - Agency Information Collection Activities: United States-Caribbean Basin Trade Partnership Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-29

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs And Border Protection Agency Information Collection Activities: United States- Caribbean Basin Trade Partnership Act AGENCY: U.S. Customs and Border Protection... respondent burden, U.S. Customs and Border (CBP) invites the general public and other Federal agencies to...

  19. 75 FR 42115 - Agency Information Collection Activities: Passenger and Crew Manifest

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-20

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Passenger and Crew Manifest AGENCY: U.S. Customs and Border Protection, Department of Homeland....S. Customs and Border (CBP) invites the general public and other Federal agencies to comment on an...

  20. Worldwide Emerging Environmental Issues Affecting the U.S. Military. September 2008 Report

    DTIC Science & Technology

    2008-09-01

    Anticipation and Response System…………………………………………..1 Item 3. First EU-Central Asia Security Forum Included Environmental Security………….2 Item 4. Indonesian ...back seat at EU-Central Asia talks http://euobserver.com/9/26778/?rk=1 Item 4. Indonesian Navy to Tighten Security in Sea Border Areas The... Indonesian Navy announced that it will tighten security in its eastern and western sea border areas to support law enforcement efforts at sea for

  1. Border Security: Barriers Along the U.S. International Border

    DTIC Science & Technology

    2009-03-16

    1980). 120 Mexican Government Press Release, “Crecimiento con Calidad: El Presidente Vicente Fox encabezará la cena de gala de la XI Cumbre Anual...and Roads at Various Project Areas Located in California, Arizona, New Mexico , and Texas...Diego Border Primary Fence The USBP’s San Diego sector extends along the first 66 miles from the Pacific Ocean of the international border with Mexico

  2. Borders and Borderlands in the Americas

    DTIC Science & Technology

    2012-08-01

    were the risk of violence is high. Cases considered by the project included the Venezuela-Colombia border, the Ecuador -Colombia border, and the U.S...national border security responsibilities.31 For example, in the case of Ecuador , the army deliberately avoids confrontations with Colombian insurgents...that may be useful for explaining the current policies and practices we observe in the 2 Americas. The cases considered also look backwards in

  3. Speaker Verification Using SVM

    DTIC Science & Technology

    2010-11-01

    application the required resources are provided by the phone itself. Speaker recognition can be used in many areas, like: • homeland security: airport ... security , strengthening the national borders, in travel documents, visas; • enterprise-wide network security infrastructures; • secure electronic

  4. MCloud: Secure Provenance for Mobile Cloud Users

    DTIC Science & Technology

    2016-10-03

    Feasibility of Smartphone Clouds , 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid). 04-MAY- 15, Shenzhen, China...final decision. MCloud: Secure Provenance for Mobile Cloud Users Final Report Bogdan Carbunar Florida International University Computing and...Release; Distribution Unlimited UU UU UU UU 03-10-2016 31-May-2013 30-May-2016 Final Report: MCloud: Secure Provenance for Mobile Cloud Users The views

  5. Southern Border Security Act of 2010

    THOMAS, 111th Congress

    Rep. Kirkpatrick, Ann [D-AZ-1

    2010-05-11

    House - 05/13/2010 Referred to the Subcommittee on Border, Maritime, and Global Counterterrorism. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. Secure the Border Act of 2010

    THOMAS, 111th Congress

    Rep. Tiahrt, Todd [R-KS-4

    2010-04-28

    House - 05/05/2010 Referred to the Subcommittee on Border, Maritime, and Global Counterterrorism. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. Perceptions of self-drive tourists along the Alaska-Canada border toward the increased security requirements of the western hemisphere travel initiative

    Treesearch

    Nicholas Palso

    2009-01-01

    This study explores the attitudes and feelings of self-drive tourists who cross the Alaska-Canada border about the increased security requirements of the Western Hemisphere Travel Initiative (WHTI), and how such attitudes and feelings may impact the tourism industry in this region. Results of a 2007 survey suggest that implementation of passport requirements will have...

  8. Survey of Commercial Technologies for Face Recognition in Video

    DTIC Science & Technology

    2014-09-01

    by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety Canada. Led by Canada Border Services...Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2014 Science and Engineering Directorate Border...Objectives CO1 – Engage in rapid assessment, transition and deployment of innovative technologies for public safety and security practitioners to achieve

  9. Border Security Search Accountability Act of 2011

    THOMAS, 112th Congress

    Rep. Sanchez, Loretta [D-CA-47

    2011-01-07

    House - 01/31/2011 Referred to the Subcommittee on Border, Maritime, and Global Counterterrorism. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Border Security Fencing and Wildlife: The End of the Transboundary Paradigm in Eurasia?

    PubMed

    Linnell, John D C; Trouwborst, Arie; Boitani, Luigi; Kaczensky, Petra; Huber, Djuro; Reljic, Slaven; Kusak, Josip; Majic, Aleksandra; Skrbinsek, Tomaz; Potocnik, Hubert; Hayward, Matt W; Milner-Gulland, E J; Buuveibaatar, Bayarbaatar; Olson, Kirk A; Badamjav, Lkhagvasuren; Bischof, Richard; Zuther, Steffen; Breitenmoser, Urs

    2016-06-01

    The ongoing refugee crisis in Europe has seen many countries rush to construct border security fencing to divert or control the flow of people. This follows a trend of border fence construction across Eurasia during the post-9/11 era. This development has gone largely unnoticed by conservation biologists during an era in which, ironically, transboundary cooperation has emerged as a conservation paradigm. These fences represent a major threat to wildlife because they can cause mortality, obstruct access to seasonally important resources, and reduce effective population size. We summarise the extent of the issue and propose concrete mitigation measures.

  11. Border Security Fencing and Wildlife: The End of the Transboundary Paradigm in Eurasia?

    PubMed Central

    Linnell, John D. C.; Trouwborst, Arie; Boitani, Luigi; Kaczensky, Petra; Kusak, Josip; Skrbinsek, Tomaz; Buuveibaatar, Bayarbaatar; Bischof, Richard; Breitenmoser, Urs

    2016-01-01

    The ongoing refugee crisis in Europe has seen many countries rush to construct border security fencing to divert or control the flow of people. This follows a trend of border fence construction across Eurasia during the post-9/11 era. This development has gone largely unnoticed by conservation biologists during an era in which, ironically, transboundary cooperation has emerged as a conservation paradigm. These fences represent a major threat to wildlife because they can cause mortality, obstruct access to seasonally important resources, and reduce effective population size. We summarise the extent of the issue and propose concrete mitigation measures. PMID:27331878

  12. 78 FR 27416 - Notice of Availability of the Final Record of Decision for the Programmatic Environmental Impact...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-10

    ... improved personal radiation detectors (PRD), RIDs, and NII tools, such as high-energy container scanners... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Availability of the... Border Activities AGENCY: U.S. Customs and Border, Protection, DHS. ACTION: Notice of availability...

  13. United States Border Security and Reserve Component Forces

    DTIC Science & Technology

    2007-03-15

    and the thirteen mile border between San Diego and Tijuana , Mexico. The Border Patrol increased the number of agents from 3,389 in 1993 to 6,213 in...that assemble goods for exportation, known as the “ maquilas ,” to relocate to Mexico’s interior and southern regions.30 The infrastructure problems

  14. 19 CFR 122.182 - Security provisions.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Security provisions. 122.182 Section 122.182 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.182 Security provisions. (a...

  15. 19 CFR 122.182 - Security provisions.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Security provisions. 122.182 Section 122.182 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.182 Security provisions. (a...

  16. 19 CFR 122.182 - Security provisions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Security provisions. 122.182 Section 122.182 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.182 Security provisions. (a...

  17. Border Sovereignty and Protection Act

    THOMAS, 111th Congress

    Rep. Hunter, Duncan D. [R-CA-52

    2009-04-23

    House - 05/26/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. National Border and Homeland Security Act of 2010

    THOMAS, 111th Congress

    Rep. Franks, Trent [R-AZ-2

    2010-07-01

    House - 07/14/2010 Referred to the Subcommittee on Border, Maritime, and Global Counterterrorism. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Securing Emergency State Data in a Tactical Computing Environment

    DTIC Science & Technology

    2010-12-01

    in a Controlled Manner, 19th IEEE Symposium on Computer-Based Medical Systems (CBMS󈧊), 847–854. [38] K. Kifayat, D. Llewellyn - Jones , A. Arabo, O...Drew, M. Merabti, Q. Shi, A. Waller, R. Craddock, G. Jones , State-of-the-Art in System-of-Systems Security for Crisis Management, Fourth Annual

  20. 10k Run for the Border Act

    THOMAS, 111th Congress

    Rep. Myrick, Sue Wilkins [R-NC-9

    2009-01-15

    House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Unlocking User-Centered Design Methods for Building Cyber Security Visualizations

    DTIC Science & Technology

    2015-10-03

    a final, deployed tool. Goodall et al. interviewed analysts to derive requirements for a network security tool [14], while Stoll et al. explain the...4673-7599-3/15/$31.00 c©2015 IEEE 2015 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC) [14] J. R. Goodall , A. A. Ozok, W. G. Lutters, P...Visualization for Cyber Security, pages 91–98. IEEE, 2005. [19] A. Komlodi, P. Rheingans, U. Ayachit, J. Goodall , and A. Joshi. A user- centered look at

  2. Employing U.S. Army Special Forces to Defeat America’s Emerging Threats

    DTIC Science & Technology

    2013-04-01

    GPF operation which is primarily focused on improving allied and host nation security force capacity.36 In 2004, the El Salvadorian Ambassador to...forces to Haiti to conduct Stability Operations following their devastating earthquakes . Operation Unified Quest, led by LTG Ken Keen included personnel...U.S. Border Patrol (point of entry and border security operations), 95th Civil Affairs Brigade (Civil Affairs related activities), El Paso and Austin

  3. Infectious Disease Border Issues Conference: Meeting Synopsis

    DTIC Science & Technology

    2012-04-03

    methicillin - resistant Staphylococcus aureus (MRSA). Operation MECACAR 1998 was highlighted as a successful example of cross-border coordination...training courses, no joint public health investigation teams) and illegal animal transportation across borders were identified as some of the existing...Work (2007), including fostering global partnerships; strengthening public health security in travel and transport ; improving the WHO global alert

  4. Effort to test, evaluate and deploy technologies to automate the measurement of real-time border wait times at United States-Canada land border crossings.

    DOT National Transportation Integrated Search

    2011-09-01

    The United States and Canada share the largest bi-national trading relationship in the world. An efficient and cost-effective border crossing system for both freight and passenger vehicle traffic is thus vital to the economic well-being and security ...

  5. Border Security, Cooperation, and Act Now Drug War Prevention Act of 2011

    THOMAS, 112th Congress

    Rep. Jackson Lee, Sheila [D-TX-18

    2011-01-05

    House - 01/31/2011 Referred to the Subcommittee on Border, Maritime, and Global Counterterrorism. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. 78 FR 11671 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-19

    ... Term. 5. Discuss the Statement of Work and Next Steps regarding the Global Supply Chain Subcommittee... and Border Protection, Department of Homeland Security (DHS). ACTION: Committee Management; Notice of...

  7. Border Reinforcement and Violence Reduction Act of 2009

    THOMAS, 111th Congress

    Rep. Rodriguez, Ciro D. [D-TX-23

    2009-03-11

    House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. 2016 Emerging Technology Domains Risk Survey

    DTIC Science & Technology

    2016-04-05

    2016 Emerging Technology Domains Risk Survey Christopher King Dan Klinedinst Todd Lewellen Garret Wassermann April 2016 TECHNICAL REPORT...Unlimited [Checkoway 2011] Checkoway, Stephen; McCoy, Damon; Kantor, Brian; Anderson, Danny; Shacham, Hovav; Savage, Stefan. Comprehensive Experimental ...Koscher 2010] Koscher, Karl et al. “ Experimental Security Analysis of a Modern Automobile,” 447-462. IEEE Symposium on Security and Privacy

  9. Securing the Borders: Creation of the Border Patrol Auxiliary

    DTIC Science & Technology

    2007-05-05

    auxiliary members will be the elite members of the BPA who will attend training at the Border Patrol Academy to gain the knowledge and skills required to...recruits and greatly reducing start-up costs for the Border Patrol. It would appeal directly to ideal candidates for the elite tier-two service: new...program, which is a small, elite , and highly selective service. Tier-two members will have to be recruited from specific target populations. Based on the

  10. Crisis in Mexico: Assessing the Merida Initiative and its Impact on Us-Mexican Security

    DTIC Science & Technology

    2009-04-01

    s poor economic conditions to extort large amounts of cash from individuals wishing to cross the US-Mexican border in search of a job and a better...people crossed the US-Mexican border illegally in 2001. 31 The US State Department‟s Trafficking in Persons Report classifies Mexico as a Tier 2 in...southern borders. 33 Mexico estimates that approximately 400,000 illegal immigrants cross the Mexican-Guatemalan border each year. President

  11. 49 CFR 1572.203 - Transportation of explosives from Canada to the United States via railroad carrier.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Transportation of... determines is not known or is a threat to security. (e) At the border. (1) Train crew members who are not U.S...

  12. 19 CFR 19.47 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Security. 19.47 Section 19.47 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.47 Security. The...

  13. 19 CFR 19.47 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Security. 19.47 Section 19.47 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.47 Security. The...

  14. 19 CFR 19.47 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Security. 19.47 Section 19.47 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.47 Security. The...

  15. 19 CFR 19.47 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Security. 19.47 Section 19.47 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.47 Security. The...

  16. 19 CFR 19.47 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Security. 19.47 Section 19.47 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.47 Security. The...

  17. 46 CFR 7.150 - Canadian (BC) and United States (AK) Borders to Cape Spencer, AK.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 1 2013-10-01 2013-10-01 false Canadian (BC) and United States (AK) Borders to Cape Spencer, AK. 7.150 Section 7.150 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC BOUNDARY LINES Alaska § 7.150 Canadian (BC) and United States (AK) Borders to Cape...

  18. 46 CFR 7.150 - Canadian (BC) and United States (AK) Borders to Cape Spencer, AK.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Canadian (BC) and United States (AK) Borders to Cape Spencer, AK. 7.150 Section 7.150 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC BOUNDARY LINES Alaska § 7.150 Canadian (BC) and United States (AK) Borders to Cape...

  19. 46 CFR 7.150 - Canadian (BC) and United States (AK) Borders to Cape Spencer, AK.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 1 2014-10-01 2014-10-01 false Canadian (BC) and United States (AK) Borders to Cape Spencer, AK. 7.150 Section 7.150 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC BOUNDARY LINES Alaska § 7.150 Canadian (BC) and United States (AK) Borders to Cape...

  20. 46 CFR 7.150 - Canadian (BC) and United States (AK) Borders to Cape Spencer, AK.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Canadian (BC) and United States (AK) Borders to Cape Spencer, AK. 7.150 Section 7.150 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC BOUNDARY LINES Alaska § 7.150 Canadian (BC) and United States (AK) Borders to Cape...

  1. 46 CFR 7.150 - Canadian (BC) and United States (AK) Borders to Cape Spencer, AK.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 1 2012-10-01 2012-10-01 false Canadian (BC) and United States (AK) Borders to Cape Spencer, AK. 7.150 Section 7.150 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC BOUNDARY LINES Alaska § 7.150 Canadian (BC) and United States (AK) Borders to Cape...

  2. Third annual symposium on Frontiers of Engineering: Reports on leading edge engineering from the 1997 NAE symposium

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hunziker, Janet

    1998-06-01

    This book is the third publication highlighting the presentations of the National Academy of Engineering's (NAE) symposium series, Frontiers of Engineering. The Third Annual NAE Symposium on Frontiers of Engineering was held September 18-20, 1997, at the Beckman Center in Irvine, California. The 101 emerging engineering leaders from industry, academia, and federal laboratories who attended the meeting heard presentations and discussed pioneering research and technical work in a variety of engineering fields. Symposium speakers were asked to prepare extended abstracts of their presentations, and those papers are contained herein. Fifteen papers are organized under the following five headings: biomechanics, sensorsmore » and control for manufacturing processes, safety and security issues, decision-making tools for design and manufacturing, and intelligent transportation systems. Talks focused on such topics as implant design and technology, design and application of optical fiber sensors, quadrupole resonance explosive detection systems, multicriteria evaluation of manufacturing performance, and automated highway systems. The after-dinner speech, which focused on today's rapid pace of change, is also included.« less

  3. Improving food security empowerment in Indonesia- Timor Leste border

    NASA Astrophysics Data System (ADS)

    Dewi, G. D. P.; Yustikaningrum, R. V.

    2018-03-01

    Post Referendum 1999, Indonesia and Timor Leste have a strategic challenge to provide food consistently around the border. This research intended to discover an appropriate strategy to tackle fragility of food security in the land border of Indonesia-Timor Leste, to improve collaborative actions between parties, as well as, opportunity to actualize food cross-border trading between local farmers and factories. For the result, there are two approaches will be applied. First, the empowerment term refers to the strategy of empowerment in strengthening the capability and capacity of human capital as one of the determinant factors of the resilience and self-sufficiency achievement. Second, the gender approach looks at the women and men build confidence, resilience, and independence which one of them through an educational intervention that enable the local people to manage food chain. Atambua is a region count as relatively as high poverty, poor human capital, weak quality and competitiveness of agriculture products, livestock and fishery, SMEs, and infrastructure. Thus, field study research is applied to find the actual and strategic effort aim to lead the achievement of food security and to engage Atambua over food trade to Timor Leste.

  4. Where to Donate Blood

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Find ... Correspondence Regulatory and Public Meetings Stop the Bleed Professional Development Education Annual Meeting International Cord Blood Symposium ...

  5. 17 CFR 230.801 - Exemption in connection with a rights offering.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exemption in connection with a rights offering. 230.801 Section 230.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Exemptions for Cross-Border Rights Offerings...

  6. 19 CFR 122.181 - Definition of Customs security area.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...

  7. 19 CFR 122.181 - Definition of Customs security area.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...

  8. 19 CFR 122.181 - Definition of Customs security area.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...

  9. 19 CFR 122.181 - Definition of Customs security area.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...

  10. Baseline Measurements of Shoulder Surfing Analysis and Comparability for Smartphone Unlock Authentication

    DTIC Science & Technology

    2017-05-22

    Proceedings of the International Conference on Security and Management (SAM 󈧇) In Proceedings of the 2014 ACM SIGSAC Conference on Computer and...Communications Security (CCS ’14) In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’10) In Proceedings of the 3rd Symposium...on Usable Privacy and Security (SOUPS ’07) In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’12) In Proceedings of

  11. 78 FR 30967 - Cross-Border Security-Based Swap Activities; Re-Proposal of Regulation SBSR and Certain Rules and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-23

    ... context of the security-based swap dealer definition, for affiliated groups with a registered security... for Affiliated Groups with Registered Security-Based Swap Dealers); Rule 3a71-5 (Substituted... 13n-12 (Exemption from Requirements Governing Security-Based Swap Data Repositories for Certain Non-U...

  12. Deaths in the Desert: The Human Rights Crisis on the U.S.--Mexico Border

    ERIC Educational Resources Information Center

    Androff, David K.; Tavassoli, Kyoko Y.

    2012-01-01

    Many would acknowledge that immigration is a major issue in the United States and that immigration reform should be a priority. However, there is little attention to the human rights crisis on the U.S.-Mexican border. As a result of tightened border security since 1994, it is estimated that over 5,000 migrants have died in the Sonoran desert. The…

  13. Secure Visas Act

    THOMAS, 111th Congress

    Rep. Smith, Lamar [R-TX-21

    2010-03-04

    House - 04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. Border and Transportation Security: Possible New Directions and Policy Options

    DTIC Science & Technology

    2005-03-29

    Security: Overview of Issues. See also “ JFK Airport to Receive Walk-Through Explosives Detection Portal,” Homeland Security Monitor, Oct. 26, 2004. In...of integrated security design can be seen at Terminal six at the JFK airport in New York City. Since many airports were originally designed in the

  15. Summary of Independent Assessment of the Afghan National Security Forces

    DTIC Science & Technology

    2014-02-01

    Afghan National Police (ANP), which are the Afghan Border Police ( ABP ), Afghan National Civil Order Police (ANCOP), Afghan Uniform Police (AUP...intentionally left blank 43 Acronyms AACP Afghan Anti-Crime Police AAF Afghan Air Force ABP Afghan Border Police ALP Afghan

  16. Biosecurity and Yield Improvement Technologies Are Strategic Complements in the Fight against Food Insecurity

    PubMed Central

    Cook, David C.; Fraser, Rob W.; Paini, Dean R.; Warden, Andrew C.; Lonsdale, W. Mark; De Barro, Paul J.

    2011-01-01

    The delivery of food security via continued crop yield improvement alone is not an effective food security strategy, and must be supported by pre- and post-border biosecurity policies to guard against perverse outcomes. In the wake of the green revolution, yield gains have been in steady decline, while post-harvest crop losses have increased as a result of insufficiently resourced and uncoordinated efforts to control spoilage throughout global transport and storage networks. This paper focuses on the role that biosecurity is set to play in future food security by preventing both pre- and post-harvest losses, thereby protecting crop yield. We model biosecurity as a food security technology that may complement conventional yield improvement policies if the gains in global farm profits are sufficient to offset the costs of implementation and maintenance. Using phytosanitary measures that slow global spread of the Ug99 strain of wheat stem rust as an example of pre-border biosecurity risk mitigation and combining it with post-border surveillance and invasive alien species control efforts, we estimate global farm profitability may be improved by over US$4.5 billion per annum. PMID:22022517

  17. Border Security: Barriers Along the U.S. International Border

    DTIC Science & Technology

    2006-09-21

    Mexican Government Press Release, “Crecimiento con Calidad: El Presidente Vicente Fox encabezará la cena de gala de la XI Cumbre Anual Hemispheria San...international border with Mexico , and covers approximately 7,000 square miles of territory. Located north of Tijuana and Tecate, Mexican cities with a...The study concluded that aliens attempting to enter the United States from Mexico had shown remarkable resiliency in bypassing or destroying obstacles

  18. Traveling the Terror Highway: Infiltration of Terror Operatives across the U.S.-Mexico Border

    DTIC Science & Technology

    2011-12-01

    this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government . IRB...Immigration Advisory Program SWI Southwest Border Initiative FY Fiscal Year GAO Government Accounting Office BEST Border Enforcement Security...for Ecuador . Hassan avoided flying into Venezuela, worried about its heavy focus from the international law enforcement community. Ecuador was

  19. Student Visa Security Improvement Act

    THOMAS, 111th Congress

    Rep. Bilirakis, Gus M. [R-FL-9

    2010-05-05

    House - 06/15/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Specification and Verification of Secure Concurrent and Distributed Software Systems

    DTIC Science & Technology

    1992-02-01

    primitive search strategies work for operating systems that contain relatively few operations . As the number of operations increases, so does the the...others have granted him access to, etc . The burden of security falls on the operating system , although appropriate hardware support can minimize the...Guttag, J. Horning, and R. Levin. Synchronization primitives for a multiprocessor: a formal specification. Symposium on Operating System Principles

  1. 2005 22nd International Symposium on Ballistics. Volume 1 - Tuesday

    DTIC Science & Technology

    2005-11-18

    Electric Power in Active Armour Applications, Martin van de Voorde, R. Boeschoten, TNO Defence, Security and Safety Prevention of Sympathetic Detonation...and Kevlar®/Steel Armor - Experimental Data and Hydrocode Modeling with Eulerian and Lagrangian Methods, Dale S. Preece, Vanessa S. Berg, and Loyd R...Applications, Martin van de Voorde, R. Boeschoten, TNO Defence, Security and Safety Prevention of Sympathetic Detonation Between Reactive Armor Sandwiches

  2. Mariposa port of entry bottleneck study : facilitating efficient, secure and economical cross-border transportation movements.

    DOT National Transportation Integrated Search

    2008-10-01

    The Arizona-Sonora border has become increasingly important to both states economy : due to increased trade between the regions following the 1994 passage of the North American : Free Trade Agreement (NAFTA) and the establishment of maquiladora in...

  3. 75 FR 70680 - Agency Information Collection Activities: Request for Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-18

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Request for Information AGENCY: U.S. Customs and Border Protection, Department of Homeland... information: 1651-0023. SUMMARY: As part of its continuing effort to reduce paperwork and respondent burden...

  4. Tracking illegal small arms traffic across U.S. borders through the implementation of firearm microstamping to small arms and small arms exports

    NASA Astrophysics Data System (ADS)

    Lizotte, Todd E.; Ohar, Orest P.

    2009-05-01

    At a border security conference in August 2008, Michael Sullivan, acting director of Bureau of Alcohol, Tobacco, Firearms and Explosives stated that, "Nearly all illegal firearms (90% to 95%) seized in Mexico come from the United States"[1]. When firearms are recovered at a crime scene, the firearms can be traced providing specific details on illegal firearm dealers or straw purchasers within the United States. Criminals or narco terrorist groups target US dealers to source firearms for drug cartels in Mexico and South America. Joint law enforcement programs between the US and Mexico law enforcement have been effective, however, in most cases the firearms that are seized are only a small fraction of the firearms trafficked across the United States border. A technology called Microstamping, when applied to newly manufactured firearms will provide further opportunities for tracing illegal firearms for law enforcement in the United States and across the globe. Microstamping is a patented technology and trace solution where intentional tooling marks are formed or micromachined onto firearms interior surfaces that come into contact or impact the surfaces of cartridge casings. The intentional tooling marks can take the form of alphanumeric codes or encoded geometric codes, such as a barcode. As the firearm is discharged the intentional tooling marks transfer a code to the cartridge casing before it is ejected out of the firearm. When recovered at the scene of an incident, the Microstamped cartridge can indentify a specific firearm, without the need to recover that firearm. Microstamping provides critical intelligence for use in border security operations and cross border violent drug related crime investigations. This paper will explain the key attributes of microstamping technology; including its potential benefits in border security operations and how data gathered from the technique can be used in geospatial information systems to identify illicit firearm sources, trafficking routes, as well as spatial and temporal mapping of narco-terrorist movements on either side of the border.

  5. U.S.-Canadian Border Security: Lessons Learned from Denmarks Experience with the Schengen Convention

    DTIC Science & Technology

    2014-03-01

    January 1, 1994, binding the North American continent with similar economic interests and pursuits.10 NAFTA does not deal with security and laws in the...SC). The Department of Homeland Security coordinates U.S. security with representatives from law enforcement, military and civilian entities. Public...European Schengen Convention (SC). The Department of Homeland Security coordinates U.S. security with representatives from law enforcement, military

  6. Border Security Results Act of 2013

    THOMAS, 113th Congress

    Sen. Cornyn, John [R-TX

    2013-04-09

    Senate - 04/09/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. Textile Enforcement and Security Act of 2010

    THOMAS, 111th Congress

    Rep. Kissell, Larry [D-NC-8

    2010-05-25

    House - 09/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Border Security Enforcement Act of 2010

    THOMAS, 111th Congress

    Sen. McCain, John [R-AZ

    2010-05-07

    Senate - 05/07/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Border Security Enforcement Act of 2011

    THOMAS, 112th Congress

    Sen. McCain, John [R-AZ

    2011-04-13

    Senate - 04/13/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Optical benchmarking of security document readers for automated border control

    NASA Astrophysics Data System (ADS)

    Valentín, Kristián.; Wild, Peter; Å tolc, Svorad; Daubner, Franz; Clabian, Markus

    2016-10-01

    Authentication and optical verification of travel documents upon crossing borders is of utmost importance for national security. Understanding the workflow and different approaches to ICAO 9303 travel document scanning in passport readers, as well as highlighting normalization issues and designing new methods to achieve better harmonization across inspection devices are key steps for the development of more effective and efficient next- generation passport inspection. This paper presents a survey of state-of-the-art document inspection systems, showcasing results of a document reader challenge investigating 9 devices with regards to optical characteristics.

  11. U.S. Maritime Security: Sustainability Challenges

    DTIC Science & Technology

    2011-09-01

    Security Council ICE Immigration and Customs Enforcement IOC Interagency Operation Center JHOC Joint Harbor Operation Center JIATF-S Joint...maritime threats into nation threats, transnational criminal and piracy threats, environmental destruction, and illegal seaborne immigration (U.S...safe and secure borders, welcome lawful immigrants and visitors and promote the free-flow of commerce (U.S. Department of Homeland Security, 2011

  12. 19 CFR Appendix D to Part 113 - Importer Security Filing Bond

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Importer Security Filing Bond D Appendix D to Part 113 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS Pt. 113, App. D Appendix D to Part 113—Importer Security Filing Bond This...

  13. Emerging issues in transportation information infrastructure security

    DOT National Transportation Integrated Search

    1996-07-31

    On October 26-27, 1995, over two hundred transportation leaders and decision-makers from around the nation convened in Cambridge, Massachusetts to participate in a two day symposium on "Challenges and Opportunities for Global Transportation in the 21...

  14. 77 FR 59206 - U.S. Customs and Border Protection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-26

    ... collection techniques or the use of other forms of information technology; and (e) the annual cost burden to... Schedule of the United States (HTSUS). This declaration includes information such as the quantity, value... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection...

  15. 78 FR 75576 - Agency Information Collection Activities: Request for Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-12

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Request for Information AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland... information: 1651-0023. SUMMARY: As part of its continuing effort to reduce paperwork and respondent burden...

  16. 78 FR 53466 - Modification of Two National Customs Automation Program (NCAP) Tests Concerning Automated...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-29

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Modification of Two National Customs Automation Program (NCAP) Tests Concerning Automated Commercial Environment (ACE) Document Image System (DIS) and Simplified Entry (SE); Correction AGENCY: U.S. Customs and Border Protection, Department...

  17. Engaging in cross-border power exchange and trade via the Arab Gulf states power grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fraser, Hamish; Al-Asaad, Hassan K.

    2008-12-15

    When construction is complete in 2010, an interconnector established among the Gulf states will enhance their electricity infrastructure while increasing reliability and security of power supply. The interconnector will also foster exchanges of energy and facilitate cross-border trade. (author)

  18. Border Security: Barriers Along the U.S. International Border

    DTIC Science & Technology

    2006-10-30

    Crecimiento con Calidad: El Presidente Vicente Fox encabezará la cena de gala de la XI Cumbre Anual Hemispheria San Pedro 2005: Rubén Aguilar, Vocero de ...Pacific Ocean of the international border with Mexico , and covers approximately 7,000 square miles of territory. Located north of Tijuana and Tecate...had entered the country illegally.15 The study concluded that aliens attempting to enter the United States from Mexico had shown remarkable

  19. 19 CFR 111.34 - Undue influence upon Department of Homeland Security employees.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Undue influence upon Department of Homeland Security employees. 111.34 Section 111.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BROKERS Duties and Responsibilities of Customs...

  20. 19 CFR 111.34 - Undue influence upon Department of Homeland Security employees.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Undue influence upon Department of Homeland Security employees. 111.34 Section 111.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BROKERS Duties and Responsibilities of Customs...

  1. 19 CFR 111.34 - Undue influence upon Department of Homeland Security employees.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Undue influence upon Department of Homeland Security employees. 111.34 Section 111.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BROKERS Duties and Responsibilities of Customs...

  2. 19 CFR 111.34 - Undue influence upon Department of Homeland Security employees.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Undue influence upon Department of Homeland Security employees. 111.34 Section 111.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BROKERS Duties and Responsibilities of Customs...

  3. 19 CFR 111.34 - Undue influence upon Department of Homeland Security employees.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Undue influence upon Department of Homeland Security employees. 111.34 Section 111.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BROKERS Duties and Responsibilities of Customs...

  4. 19 CFR 113.37 - Corporate sureties.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... on the bond. (d) Social security number of agent or attorney on the bond. In the appropriate place on... place his/her social security number, as it appears on the corporate surety power of attorney. (e...

  5. 19 CFR 113.37 - Corporate sureties.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... on the bond. (d) Social security number of agent or attorney on the bond. In the appropriate place on... place his/her social security number, as it appears on the corporate surety power of attorney. (e...

  6. 19 CFR 113.37 - Corporate sureties.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... on the bond. (d) Social security number of agent or attorney on the bond. In the appropriate place on... place his/her social security number, as it appears on the corporate surety power of attorney. (e...

  7. 19 CFR 113.37 - Corporate sureties.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... on the bond. (d) Social security number of agent or attorney on the bond. In the appropriate place on... place his/her social security number, as it appears on the corporate surety power of attorney. (e...

  8. 19 CFR 113.37 - Corporate sureties.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... on the bond. (d) Social security number of agent or attorney on the bond. In the appropriate place on... place his/her social security number, as it appears on the corporate surety power of attorney. (e...

  9. Microsensors for border patrol applications

    NASA Astrophysics Data System (ADS)

    Falkofske, Dwight; Krantz, Brian; Shimazu, Ron; Berglund, Victor

    2005-05-01

    A top concern in homeland security efforts is the lack of ability to monitor the thousands of miles of open border with our neighbors. It is not currently feasible to continually monitor the borders for illegal intrusions. The MicroSensor System (MSS) seeks to achieve a low-cost monitoring solution that can be efficiently deployed for border patrol applications. The modifications and issues regarding the unique requirements of this application will be discussed and presented. The MicroSensor System was developed by the Defense Microelectronics Activity (DMEA) for military applications, but border patrol applications, with their unique sensor requirements, demand careful adaptation and modification from the military application. Adaptation of the existing sensor design for border applications has been initiated. Coverage issues, communications needs, and other requirements need to be explored for the border patrol application. Currently, border patrol has a number of deficiencies that can be addressed with a microsensor network. First, a distributed networked sensor field could mitigate the porous border intruder detection problem. Second, a unified database needs to be available to identify aliens attempting to cross into the United States. This database needs to take unique characteristics (e.g. biometrics, fingerprints) recovered from a specialized field unit to reliably identify intruders. Finally, this sensor network needs to provide a communication ability to allow border patrol officers to have quick access to intrusion information as well as equipment tracking and voice communication. MSS already addresses the sensing portion of the solution, including detection of acoustic, infrared, magnetic, and seismic events. MSS also includes a low-power networking protocol to lengthen the battery life. In addition to current military requirements, MSS needs a solar panel solution to extend its battery life to 5 years, and an additional backbone communication link. Expanding the capabilities of MSS will go a long way to improving the security of the nation's porous borders.

  10. Social Security Number Fraud and Identity Theft Prevention Act

    THOMAS, 111th Congress

    Rep. Coffman, Mike [R-CO-6

    2009-05-19

    House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. 76 FR 17143 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-28

    ... Data System 5. Enhancing Air Cargo Security 6. National Strategy Global Supply Chain Security and the...: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Advisory Committee on...

  12. Security through Termination Of Proliferation Act of 2009

    THOMAS, 111th Congress

    Rep. Ros-Lehtinen, Ileana [R-FL-18

    2009-01-13

    House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. Security and Fairness Enhancement for America Act of 2009

    THOMAS, 111th Congress

    Rep. Goodlatte, Bob [R-VA-6

    2009-05-07

    House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. Devices and dressings to secure peripheral venous catheters to prevent complications.

    PubMed

    Marsh, Nicole; Webster, Joan; Mihala, Gabor; Rickard, Claire M

    2015-06-12

    A peripheral venous catheter (PVC) is typically used for short-term delivery of intravascular fluids and medications. It is an essential element of modern medicine and the most frequent invasive procedure performed in hospitals. However, PVCs often fail before intravenous treatment is completed: this can occur because the device is not adequately attached to the skin, allowing the PVC to fall out, leading to complications such as phlebitis (irritation or inflammation to the vein wall), infiltration (fluid leaking into surrounding tissues) or occlusion (blockage). An inadequately secured PVC also increases the risk of catheter-related bloodstream infection (CRBSI), as the pistoning action (moving back and forth in the vein) of the catheter can allow migration of organisms along the catheter and into the bloodstream. Despite the many dressings and securement devices available, the impact of different securement techniques for increasing PVC dwell time is still unclear; there is a need to provide guidance for clinicians by reviewing current studies systematically. To assess the effects of PVC dressings and securement devices on the incidence of PVC failure. We searched the following electronic databases to identify reports of relevant randomised controlled trials (RCTs): the Cochrane Wounds Group Register (searched 08 April 2015): The Cochrane Central Register of Controlled Trials (CENTRAL; 2015, Issue 3), Ovid MEDLINE (1946 to March 7 2015); Ovid MEDLINE (In-Process & Other Non-Indexed Citations, March 7 2015); Ovid EMBASE (1974 to March 7 2015); and EBSCO CINAHL (1982 to March 8 2015). RCTs or cluster RCTs comparing different dressings or securement devices for the stabilisation of PVCs. Cross-over trials were ineligible for inclusion, unless data for the first treatment period could be obtained. Two review authors independently selected studies, assessed trial quality and extracted data. We contacted study authors for missing information. We used standard methodological procedures expected by Cochrane. We included six RCTs (1539 participants) in this review. Trial sizes ranged from 50 to 703 participants. These six trials made four comparisons, namely: transparent dressings versus gauze; bordered transparent dressings versus a securement device; bordered transparent dressings versus tape; and transparent dressing versus sticking plaster. There is very low quality evidence of fewer catheter dislodgements or accidental removals with transparent dressings compared with gauze (two studies, 278 participants, RR 0.40; 95% CI 0.17 to 0.92, P = 0.03%). The relative effects of transparent dressings and gauze on phlebitis (RR 0.89; 95% CI 0.47 to 1.68) and infiltration (RR 0.80; 95% CI 0.48 to 1.33) are unclear. The relative effects on PVC failure of a bordered transparent dressing and a securement device have been assessed in only one small study and these were unclear. There was very low quality evidence from the same single study of less frequent dislodgement or accidental catheter removal with bordered transparent dressings than securement devices (RR 0.14, 95% CI 0.03 to 0.63) but more phlebitis with bordered dressings (RR 8.11, 95% CI 1.03 to 64.02) (very low quality evidence). A small single study compared bordered transparent dressings with tape and found very low quality evidence of more PVC failure with the bordered dressing (RR 1.84, 95% CI 1.08 to 3.11) but the relative effects on dislodgement were not clear (very low quality evidence). The relative effects of transparent dressings and a sticking plaster have only been compared in one small study and are unclear. More high quality RCTs are required to determine the relative effects of alternative PVC dressings and securement devices. It is not clear if any one dressing or securement device is better than any other in securing peripheral venous catheters. There is a need for further, independent high quality trials to evaluate the many traditional as well as the newer, high use products. Given the large cost differences between some different dressings and securement devices, future trials should include a robust cost-effectiveness analysis.

  15. 75 FR 12445 - Name Change of Two DHS Components

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-16

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection U.S. Immigration and Customs... Components AGENCY: U.S. Customs and Border Protection, DHS; U.S. Immigration and Customs Enforcement, DHS; Department of the Treasury. ACTION: Final rule. SUMMARY: On March 31, 2007, the name of the Bureau of Customs...

  16. 75 FR 55811 - Testing Method of Pressed and Toughened (Specially Tempered) Glassware

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-14

    .... 10-31] Testing Method of Pressed and Toughened (Specially Tempered) Glassware AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of method CBP uses to test... document adopts modifications to the test method currently applied by U.S. Customs and Border Protection...

  17. Nonstate Actors and the Open Border Policy: The Border Security Case Study of Nepal and India

    DTIC Science & Technology

    2014-12-01

    Washington headquarters Services, Directorate for Information Operations and Reports. 1215 Jefferson Davis Highway, Suite 1204. Arlington, VA 22202-4302... remuneration .”276 This massive migration of young and eager workers allowed Germany to take advantage of booming industries and markets. The impact on

  18. Intelligence-Driven Border Security: A Promethean View of U.S. Border Patrol Intelligence Operations

    DTIC Science & Technology

    2015-12-01

    USBP agent, intelligence ( BPA -I), information sharing, capability gap analysis process (CGAP), Tucson Sector Red Team 15. NUMBER OF PAGES 109 16...27 2. BPA -I .............................................................................................28 3. BPA -I Requirements...71 APPENDIX A. PROFESSIONAL INTELLIGENCE ASSOCIATIONS— ADDITIONAL OPPORTUNITIES FOR BPA -IS

  19. Virtual sea border

    NASA Astrophysics Data System (ADS)

    Ferriere, D.; Rucinski, A.; Jankowski, T.

    2007-04-01

    Establishing a Virtual Sea Border by performing a real-time, satellite-accessible Internet-based bio-metric supported threat assessment of arriving foreign-flagged cargo ships, their management and ownership, their arrival terminal operator and owner, and rewarding proven legitimate operators with an economic incentive for their transparency will simultaneously improve port security and maritime transportation efficiencies.

  20. 75 FR 70937 - U.S. Customs and Border Protection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-19

    ... Robinson International (USA) Inc., as a Commercial Gauger and Laboratory AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of Robinson... to 19 CFR 151.12 and 19 CFR 151.13, Robinson International (USA) Inc., 4400 S. Wayside Drive, Suite...

  1. 78 FR 15962 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection-DHS/CBP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-13

    ... recognized by Customs and Border Protection, through a mutual recognition arrangement or comparable... been recognized by CBP, through a mutual recognition arrangement or comparable arrangement, as being... or through Mutual Recognition Arrangements (MRA) or memoranda of understanding relating to...

  2. Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ

    DTIC Science & Technology

    2015-04-01

    anonymous credentials. In CSF’14: 27th Computer Security Foundations Symposium. IEEE Computer Society, 2014. To appear. [22] David Chaum . Untraceable...electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84–88, 1981. [23] David Chaum . Secret-ballot receipts...True voter-verifiable elections. IEEE Security and Privacy, 2(1):38–47, 2004. [24] David Chaum , Richard Carback, Jeremy Clark, Aleksander Essex, Stefan

  3. 2010 Homeland Security Symposium and Exhibition Held in Arlington, Virginia on September 28-29, 2010

    DTIC Science & Technology

    2010-09-29

    Natural gas pipelines • Oil terminals; Pump stations • Electric substations • Water facilities • Wastewater facilities • Airports • Roads • Railroads... Gas /Crude Oil  Telecommunications  Water  Healthcare/Public Health Critical Infrastructure Interdependencies BUILDING STRONG® DSES-10 Regional...Preparedness Policy, Office on Resilience, National Security Council, The White House • Mr. Paul Molitor, Senior Industry Director, Smart Grid and

  4. Sequestration Coating Performance Requirements for ...

    EPA Pesticide Factsheets

    symposium paper The EPA’s National Homeland Security Research Center (NHSRC), in collaboration with ASTM International, developed performance standards for materials which could be applied to exterior surfaces contaminated by an RDD to mitigate the spread and migration of radioactive contamination.

  5. Investigative Operations: Use of Covert Testing to Identify Security Vulnerabilities and Fraud, Waste, and Abuse

    DTIC Science & Technology

    2007-11-14

    including evaluations of controls over radioactive materials and security at America’s borders, airport security , sales of sensitive and surplus...officers. The details of this March 2006 report are classified; however, TSA has authorized this limited discussion. Airport Security Testing Sale of...of covert security vulnerability testing of numerous airports across the country. During these covert tests, our investigators passed through airport

  6. Chemical Sniffing Instrumentation for Security Applications.

    PubMed

    Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; Marshall, Alan; Verbeck, Guido F

    2016-07-27

    Border control for homeland security faces major challenges worldwide due to chemical threats from national and/or international terrorism as well as organized crime. A wide range of technologies and systems with threat detection and monitoring capabilities has emerged to identify the chemical footprint associated with these illegal activities. This review paper investigates artificial sniffing technologies used as chemical sensors for point-of-use chemical analysis, especially during border security applications. This article presents an overview of (a) the existing available technologies reported in the scientific literature for threat screening, (b) commercially available, portable (hand-held and stand-off) chemical detection systems, and (c) their underlying functional and operational principles. Emphasis is given to technologies that have been developed for in-field security operations, but laboratory developed techniques are also summarized as emerging technologies. The chemical analytes of interest in this review are (a) volatile organic compounds (VOCs) associated with security applications (e.g., illegal, hazardous, and terrorist events), (b) chemical "signatures" associated with human presence, and (c) threat compounds (drugs, explosives, and chemical warfare agents).

  7. Secure Border Act of 2012

    THOMAS, 112th Congress

    Rep. Miller, Candice S. [R-MI-10

    2011-03-31

    Senate - 06/04/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  8. Counterterrorism Enhancement and Department of Homeland Security Authorization Act of 2010

    THOMAS, 111th Congress

    Rep. King, Peter T. [R-NY-3

    2010-06-24

    House - 07/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. The Hammer and the Anvil: The Need for A Comprehensive Southwest Border Security Strategy

    DTIC Science & Technology

    2010-06-02

    ublic figures voiced concern about the “war on drugs,” the right level and kind of immigration, problems along the southwest border, migration , crises...thesis, Naval Postgraduate School, 2006), 1. 27 K. Larry Stores, Mexico-U.S. Dialogue on Migration and Border Issues 2001-2005, (Washington, DC...13 Seven organized crime families operate the drug trade in and from Mexico. The Sinaloa Federation is a cocaine smuggling organization headed by

  10. The Securitization of Migration: An Analysis of United States Border Security and Migration Policy Toward Mexico

    DTIC Science & Technology

    2013-03-01

    constituted officer of the law , or to prevent the commission of a felony.109 On 27 February 1925, the U.S. Congress passed Public Law 502 (PL502), which...INS Immigration and Naturalization Service IRCA Immigration Reform and Control Act MOU Memorandum of Understanding NAFTA North American Free...major border communities, law enforcement officials conduct patrols behind massive fences while floodlights illuminate the border at night in an

  11. The Intersection of National Security and Climate Change

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hund, Gretchen; Fankhauser, Jana G.; Kurzrok, Andrew J.

    On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.

  12. Recent advances to address European Union Health Security from cross border chemical health threats.

    PubMed

    Duarte-Davidson, R; Orford, R; Wyke, S; Griffiths, M; Amlôt, R; Chilcott, R

    2014-11-01

    The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10 years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development. Crown Copyright © 2014. Published by Elsevier Ltd. All rights reserved.

  13. 17 CFR 230.702(T)-230.703(T) - [Reserved

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false [Reserved] 230.702(T)-230.703(T) Section 230.702(T)-230.703(T) Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Small Business Investment Companies §§ 230.702(T)-230.703(T) [Reserved] Exemptions for Cross-Border...

  14. 77 FR 77162 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-31

    ... globalization of securities markets, cross-border coordination of trading and quotation halts is important to... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68526; File No. SR-FINRA-2012-010] Self... Change To Amend FINRA Rule 6440 (Trading and Quotation Halt in OTC Equity Securities) December 21, 2012...

  15. 2009 Homeland Security Symposium and Exhibition

    DTIC Science & Technology

    2009-09-10

    electronified check, ACH or Draft • Opportunity for Merchant and Merchant employee collusion • Remote Deposit Collection (RDC) • eCommerce – a world of new...police _$; _ Units US Coast Guard _$; _ Units Urban Search & Rescue _$; _ Units Rural Search & Rescue _$; _ Units Public/ University hospitals

  16. Volpe engineers use biometrics to help ease border crush

    DOT National Transportation Integrated Search

    1997-01-01

    Using technology previously reserved for military and other high security applications, engineers from the Safety and Security Systems Division of the Volpe Center have developed a number of automated biometric systems to speed the processing of freq...

  17. Analyzing the homeland security of the U.S.-Mexico border.

    PubMed

    Wein, Lawrence M; Liu, Yifan; Motskin, Arik

    2009-05-01

    We develop a mathematical optimization model at the intersection of homeland security and immigration, that chooses various immigration enforcement decision variables to minimize the probability that a terrorist can successfully enter the United States across the U.S.-Mexico border. Included are a discrete choice model for the probability that a potential alien crosser will attempt to cross the U.S.-Mexico border in terms of the likelihood of success and the U.S. wage for illegal workers, a spatial model that calculates the apprehension probability as a function of the number of crossers, the number of border patrol agents, and the amount of surveillance technology on the border, a queueing model that determines the probability that an apprehended alien will be detained and removed as a function of the number of detention beds, and an equilibrium model for the illegal wage that balances the supply and demand for work and incorporates the impact of worksite enforcement. Our main result is that detention beds are the current system bottleneck (even after the large reduction in detention residence times recently achieved by expedited removal), and increases in border patrol staffing or surveillance technology would not provide any improvements without a large increase in detention capacity. Our model also predicts that surveillance technology is more cost effective than border patrol agents, which in turn are more cost effective than worksite inspectors, but these results are not robust due to the difficulty of predicting human behavior from existing data. Overall, the probability that a terrorist can successfully enter the United States is very high, and it would be extremely costly and difficult to significantly reduce it. We also investigate the alternative objective function of minimizing the flow of illegal aliens across the U.S.-Mexico border, and obtain qualitatively similar results.

  18. Secure Borders and Open Doors: Preserving Our Welcome to the World in an Age of Terrorism

    DTIC Science & Technology

    2008-01-01

    maura harty, have made efforts to leverage america’s vast academic assets for public diplomacy. however, the president’s commitment to strike the...robert gluck, walt disney parks and resorts; John hamilton, electronic data Systems corporation; matthew howe, Border trade alliance; Kelly hunt, u.S

  19. 78 FR 77140 - Customs Brokers User Fee Payment for 2014

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-20

    ... Payment for 2014 AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION..., association, or corporation, is due by February 21, 2014. U.S. Customs and Border Protection announces this date of payment for 2014 in accordance with the Tax Reform Act of 1986. DATES: Payment of the 2014...

  20. 76 FR 8294 - Technical Correction: Completion of Entry and Entry Summary-Declaration of Value; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-14

    ... DEPARTMENT OF HOMELAND SECURITY U. S. Customs and Border Protection 19 CFR Part 141 [USCBP-2008-0062; CBP Dec. 10-34] RIN 1515-AD61 (Formerly 1505-AB96) Technical Correction: Completion of Entry and Entry Summary-- Declaration of Value; Correction AGENCY: Customs and Border Protection, Department of...

  1. Who Is Guarding Serbia’s Borders? An Assessment of Serbia’s Progress in Border Security Development and Reform

    DTIC Science & Technology

    2011-06-01

    For example, in 2009 the British embassies in Zagreb and Belgrade funded a project to have the International Organization for Migration (IOM) utilize...Embassy Zagreb , UK in Croatia, “UK-backed Croatia-Serbia border police project successfully completed,” (3 May 2010), accessed May 17, 2010, http...cocaine seizure was made and two people arrested at Zagreb airport bound for Serbia. Also in November 2009, Serbian police arrested four people in

  2. Assessment of U.S. Government and Coalition Efforts to Train, Equip, and Advise the Afghan Border Police

    DTIC Science & Technology

    2013-05-24

    abuse of materiel. In zones that were under-resourced, zone commanders do not have the resources to meet their operational needs. Funding for Canine ...Program – Coalition forces and German Police Training Teams worked with the Border Police to develop a canine program to search for explosives and...airports and major border crossings did not know if their canine teams would be available post-2014, which prevented planning for effective security

  3. Iraqi Refugee and Internally Displaced Persons Humanitarian Assistance, Resettlement, and Security Act of 2009

    THOMAS, 111th Congress

    Rep. Hastings, Alcee L. [D-FL-23

    2009-01-15

    House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Modeling and Simulation Environment for Critical Infrastructure Protection

    DTIC Science & Technology

    2006-06-20

    address at the triennial International Symposium on Mathematical Programming, held in Copenhagen, Denmark in August 2003. Finally, in very recent work... Teleworking - The human and organizational issues of computer and information security. Paper presented at the 11th Annual Conference on Human

  5. Proof Search in an Authorization Logic

    DTIC Science & Technology

    2009-04-14

    and Itay Neeman. DKAL: Distributed-knowledge authorization language. In Proceedings of the 21st IEEE Symposium on Computer Security Foundations (CSF...21), 2008. [33] Yuri Gurevich and Itay Neeman. The logic of infons. Technical report, Microsoft Research, 2009. [34] Joshua S. Hodas and Dale Miller

  6. The impact of Border policy effect on cross-border ethnic areas

    NASA Astrophysics Data System (ADS)

    Bie, Q. L.; Zhou, S. Y.; Li, C. S.

    2013-11-01

    Boundary effect analysis is related to border policy making in the cross-border ethnic area. The border effect literatures show that geographic boundaries have obvious impacts on economic, social and cultural relations in both sides of a nation border. Particularly in cross-border ethnic areas, each ethnic group has strong internal spatial structure relevance, and the boundary effect is more obvious. However, most of China's border areas are cross-border ethnic areas, each of border issues is unique. Under this perspective, we analyze the border effects of various boundaries can provide basis for formulating border management policies. For small scale of cross-border ethnic minority areas, how to formulate the boundary management policy is a good question to explore. This paper is demonstrated by a study of the impact of border management policies in Dehong Dai and Jingpo Autonomous Prefecture in Yunnan Province at the border area to Burma. The comparative method is used to analysis the border management policies in past 50 decades for the border area of Yunnan Province .This research aims to define trends within border policy and its influences to national security. This paper also examines Wendy Brown's liberal theory of border management policy. We found that it is not suitable for Sino-Burma border area. The conclusion is that the changes or instability of international economic and political situation has more influence to this cross-border ethnic area, and only innovative policy will be effective in cross-border ethnic area. So the border management policies should reflect the change of international context.

  7. An enhanced MMW and SMMW/THz imaging system performance prediction and analysis tool for concealed weapon detection and pilotage obstacle avoidance

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Jacobs, Eddie L.; Franck, Charmaine C.; Petkie, Douglas T.; De Lucia, Frank C.

    2015-10-01

    The U.S. Army Research Laboratory (ARL) has continued to develop and enhance a millimeter-wave (MMW) and submillimeter- wave (SMMW)/terahertz (THz)-band imaging system performance prediction and analysis tool for both the detection and identification of concealed weaponry, and for pilotage obstacle avoidance. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security and Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). Further development of this tool that includes a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures was reported on at the 2011 SPIE Europe Security and Defence Symposium (Prague). This paper provides a comprehensive review of a newly enhanced MMW and SMMW/THz imaging system analysis and design tool that now includes an improved noise sub-model for more accurate and reliable performance predictions, the capability to account for postcapture image contrast enhancement, and the capability to account for concealment material backscatter with active-illumination- based systems. Present plans for additional expansion of the model's predictive capabilities are also outlined.

  8. Border and Transportation Security: Overview of Congressional Issues

    DTIC Science & Technology

    2004-12-17

    railways, airways, and waterways. While in the immediate aftermath of 9/11 efforts primarily concentrated on an expanded federal role in aviation ... security (in particular on the heightened screening of passengers and baggage), increasingly attention is being turned towards other modes of transportation.

  9. 78 FR 52958 - Announcement of Test Concerning Manifesting and Entry of Residue Found in Instruments of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-27

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Announcement of Test Concerning... announces U.S. Customs and Border Protection's (CBP's) plan to conduct a test concerning the manifesting and... test announced in this document begins. In HQ Ruling H026715, CBP held that in order to ensure the...

  10. 75 FR 11899 - Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-12

    ... DEPARTMENT OF HOMELAND SECURITY Customs and Border Protection Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder AGENCY: U.S. Customs and Border Protection, U.S... broker licenses and any and all permits have been cancelled due to the death of the broker: License Name...

  11. 76 FR 22912 - Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-25

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder AGENCY: U.S. Customs and Border Protection, DHS... have been cancelled due to the death of the broker: Name License No. Port name Leandro U. Guevarra...

  12. 75 FR 40864 - Notice of Fiscal Year 2010 Border Grant Funding and Solicitation for Applications

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-14

    ... Federal Grant Web site, http://www.grants.gov . Eligible projects for funding with BEG are identified in... applications for BEG funding at the Federal Grant Web site, http://www.grants.gov . FOR FURTHER INFORMATION... the MOE explanation, http://www.fmcsa.dot.gov/safety-security/grants/beg/moe.aspx . The Border...

  13. Threats and Challenges in Reconfigurable Hardware Security

    DTIC Science & Technology

    2008-07-01

    Same as Report (SAR) 18. NUMBER OF PAGES 12 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b . ABSTRACT unclassified c. THIS PAGE...g e F P G A MemoryMemory Codec A/DD/A F P G A B o a rd System Developers Avnet, Digilent, NuHorizons Application Development Stage Deployment...Rohatgi, and B . Sunar. Trojan detection using IC fingerprinting. In Proceedings of IEEE Symposium on Security and Privacy, 2007. [3] K. Austin. Data

  14. Making the National Security Council Better In the Bahamas to Resolve Illegal Migration

    DTIC Science & Technology

    2015-12-01

    ABSTRACT (maximum 200 words) The Bahamas’ economy depends primarily on tourism . Unchecked crime and cross-border threats jeopardize the country’s economic... tourism , opportunistic maritime criminality, national security strategy, national insecurity, U.S.-Bahamian relations, Haitian migration, transnational...of National Security Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT The Bahamas’ economy depends primarily on tourism . Unchecked

  15. Improving the security of international ISO container traffic by centralizing the archival of inspection results

    NASA Astrophysics Data System (ADS)

    Chalmers, Alex

    2004-09-01

    To increase the security and throughput of ISO traffic through international terminals more technology must be applied to the problem. A transnational central archive of inspection records is discussed that can be accessed by national agencies as ISO containers approach their borders. The intent is to improve the throughput and security of the cargo inspection process. A review of currently available digital media archiving technologies is presented and their possible application to the tracking of international ISO container shipments. Specific image formats employed by current x-ray inspection systems are discussed. Sample x-ray data from systems in use today are shown that could be entered into such a system. Data from other inspection technologies are shown to be easily integrated, as well as the creation of database records suitable for interfacing with other computer systems. Overall system performance requirements are discussed in terms of security, response time and capacity. Suggestions for pilot projects based on existing border inspection processes are made also.

  16. Sovereign Challenge Conference (6th). Borders & Security: Similarities, Differences and Shared Affinities. Held in El Paso, Texas on November 7-10, 2010

    DTIC Science & Technology

    2010-11-01

    protection and to isolate threats in order to survive and develop. The cell model implies osmosis , allowing flows to take place across the borders and the...relationships to new levels, much as cell phone technology replaces the laying of copper wire for traditional telephone service. Whole-of-Government/Whole...in urban, rural, and remote environments. This practical experience with the men and women of the U.S. Border Patrol animated many of the concepts

  17. Testing Integrity Symposium: Issues and Recommendations for Best Practice

    ERIC Educational Resources Information Center

    National Center for Education Statistics, 2013

    2013-01-01

    Educators, parents, and the public depend on accurate, valid, reliable, and timely information about student academic performance. Testing irregularities--breaches of test security or improper administration of academic testing--undermine efforts to use those data to improve student achievement. Unfortunately, there have been high-profile and…

  18. 76 FR 37136 - Post-Summary Corrections to Entry Summaries Filed in ACE Pursuant to the ESAR IV Test

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-24

    ... Phased Out for Entry Summaries Filed in ACE The Post-Entry Amendment (PEA) test allows importers to amend... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Post-Summary Corrections to Entry Summaries Filed in ACE Pursuant to the ESAR IV Test AGENCY: U.S. Customs and Border Protection...

  19. 77 FR 16249 - Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-20

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder AGENCY: U.S. Customs and Border Protection, U.S... broker licenses and any and all permits have been cancelled due to the death of the broker: Name License...

  20. 77 FR 45648 - Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-01

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder AGENCY: U.S. Customs and Border Protection, U.S... broker licenses and any and all permits have been cancelled due to the death of the broker: Name License...

  1. 76 FR 44033 - Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-22

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder AGENCY: U.S. Customs and Border Protection, U.S... broker licenses and any and all permits have been cancelled due to the death of the broker: License Name...

  2. 76 FR 2918 - Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-18

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder AGENCY: U.S. Customs and Border Protection, U.S... broker license and any and all permits have been cancelled due to the death of the broker: Name License...

  3. Threats to cross-border wildlife linkages in the Sky Islands Wildlands Network

    Treesearch

    Kim Vacariu

    2005-01-01

    One of the greatest challenges facing conservationists in the Sky Islands region is finding a realistic means to maintain historic travel routes for wide-ranging species crossing the United States-Mexico border. This challenge is made difficult due to the ongoing efforts by the Federal government to install additional security infrastructure to stem the flood of...

  4. Saudi Arabia’s Counterterrorism Methods: A Case Study on Homeland Security

    DTIC Science & Technology

    2017-06-01

    laws to safeguard the homeland and its borders, Saudi Arabia has enacted laws that impose stiff penalties aimed at money laundering and other illicit...safeguard the homeland and its borders, Saudi Arabia has enacted laws that impose stiff penalties aimed at money laundering and other illicit activities...34 1. Combating Financing Terrorist Organizations ............... 34 2. Combating Money Laundering by

  5. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    .... (3) Date and place of birth. (4) Social security number (submission is voluntary, although failure to provide it may delay or prevent completion of the threat assessment). (5) Gender. (6) Country of... Border Protection. (i) If asserting completion of a comparable threat assessment listed in paragraph (h...

  6. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    .... (3) Date and place of birth. (4) Social security number (submission is voluntary, although failure to provide it may delay or prevent completion of the threat assessment). (5) Gender. (6) Country of... Border Protection. (i) If asserting completion of a comparable threat assessment listed in paragraph (h...

  7. To require the Secretary of Homeland Security to establish a United States Citizenship and Immigration Services field office in Kodiak, Alaska.

    THOMAS, 111th Congress

    Rep. Young, Don [R-AK-At Large

    2010-03-19

    House - 04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Optimising the use of linked administrative data for infectious diseases research in Australia.

    PubMed

    Moore, Hannah C; Blyth, Christopher C

    2018-06-14

    Infectious diseases remain a major cause of morbidity in Australia. A wealth of data exists in administrative datasets, which are linked through established data-linkage infrastructure in most Australian states and territories. These linkages can support robust studies to investigate the burden of disease, the relative contribution of various aetiological agents to disease, and the effectiveness of population-based prevention policies - research that is critical to the success of current and future vaccination programs. At a recent symposium in Perth, epidemiologists, clinicians and policy makers in the infectious diseases field discussed the various benefits of, and barriers to, data-linkage research, with a focus on respiratory infection research. A number of issues and recommendations emerged. The demand for data-linkage projects is starting to outweigh the capabilities of exisiting data-linkage infrastructure. There is a need to further streamline processes relating to data access, increase data sharing and conduct nationally collaborative projects. Concerns about data security and sharing across jurisdictional borders can be addressed through multiple safe data solutions. Researchers need to do more to ensure that the benefits of linking datasets to answer policy-relevant questions are being realised for the benefit of community groups, government authorities, funding bodies and policy makers. Increased collaboration and engagement across all sectors can optimise the use of linked data to help reduce the burden of infectious diseases.

  9. 19 CFR 103.31a - Advance electronic information for air, truck, and rail cargo; Importer Security Filing...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Advance electronic information for air, truck, and rail cargo; Importer Security Filing information for vessel cargo. 103.31a Section 103.31a Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AVAILABILITY OF INFORMATION Other Information...

  10. Directing the Secretary of Homeland Security to transmit to the House of Representatives all information in the possession of the Department of Homeland Security relating to the immigration status of any detainees and foreign persons suspected of terrorism.

    THOMAS, 111th Congress

    Rep. Rogers, Mike J. [R-MI-8

    2009-06-19

    House - 07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. U.S. - UK - Canada Trilateral Symposium

    DTIC Science & Technology

    2009-10-02

    e . 4. Procedures for intra-community arms transfers simplified. 5 Retransfer controls disco raged b t m st be. u u u complied with. Li d...IRIS – T • Airbus A310 refueller 10 FUTURE OF TRANSATLANTIC ARMAMENTS COOPERATION 1996 VISION – “I believe that national security – ours and that

  12. Holistic Network Defense: Fusing Host and Network Features for Attack Classification

    DTIC Science & Technology

    2011-03-01

    Measures for Anomaly Detection," IEEE Symposium on Security and Privacy, Oakland, CA, (May 2001). 33. Mahoney , Matthew V, and Phillip K. Chan...University of London, August 2005. 44. Newman , Daniel, Kristina M. Manalo, and Ed Tittel. "Intrusion Detection Overview," InformIT, (June 2004). 20 Feb

  13. Roadmap to MaRIE May 2015

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barnes, Cris William

    Los Alamos National Laboratory (LANL) hosted the Stewardship Science Academic Programs Symposium, which is designed to foster relationships among young scientists, sponsors and the National Nuclear Security Administration national laboratories. The event highlights much of the work done by prominent scientists and allows attendees to view the multiple on site facilities at LANL.

  14. Integrated water resources management and infrastructure planning for water security in Southern Africa

    NASA Astrophysics Data System (ADS)

    Mapani, Benjamin; Magole, Lapologang; Makurira, Hodson; Meck, Maideyi; Mkandawire, Theresa; Mul, Marloes; Ngongondo, Cosmo

    2017-08-01

    This volume has brought together papers that are peer reviewed emanating from the WaterNet/WARFSA/GWP-SA 16th Symposium. The papers cover the following themes: Hydrology, Water and Environment, Water and Land, Water and Society, Water Supply and Sanitation and Water Resources Management.

  15. Developing a Qualia-Based Multi-Agent Architecture for Use in Malware Detection

    DTIC Science & Technology

    2010-03-01

    executables were correctly classified with a 6% false positive rate [7]. Kolter and Maloof expand Schultz’s work by analyzing different...Proceedings of the 2001 IEEE Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 2001. [8] J. Z. Kolter and M. A. Maloof

  16. Advanced Cyber Attack Modeling Analysis and Visualization

    DTIC Science & Technology

    2010-03-01

    Graph Analysis Network Web Logs Netflow Data TCP Dump Data System Logs Detect Protect Security Management What-If Figure 8. TVA attack graphs for...Clustered Graphs,” in Proceedings of the Symposium on Graph Drawing, September 1996. [25] K. Lakkaraju, W. Yurcik, A. Lee, “NVisionIP: NetFlow

  17. Securitization, alterity, and the state Human (in)security on an Amazonian frontier

    PubMed Central

    Brightman, Marc; Grotti, Vanessa

    2016-01-01

    Focusing on the region surrounding the Maroni River, which forms the border between Suriname and French Guiana, we examine how relations between different state and non-state social groups are articulated in terms of security. The region is characterised by multiple “borders” and frontiers of various kinds, the state boundary having the features of an interface or contact zone. Several key collectivities meet in this border zone: native Amazonians, tribal Maroon peoples, migrant Brazilian gold prospectors, and metropolitan French state functionaries. We explore the relationships between these different sets of actors and describe how their mutual encounters center on discourses of human and state security, thus challenging the commonly held view of the region as a stateless zone and showing that the “human security” of citizens from the perspective of the state may compete with locally salient ideas or experiences of well-being. PMID:27996063

  18. 19 CFR 122.187 - Revocation or suspension of access.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Revocation or suspension of access. 122.187 Section 122.187 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.187 Revocation or...

  19. 19 CFR 122.187 - Revocation or suspension of access.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Revocation or suspension of access. 122.187 Section 122.187 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.187 Revocation or...

  20. 19 CFR 122.187 - Revocation or suspension of access.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Revocation or suspension of access. 122.187 Section 122.187 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.187 Revocation or...

  1. 19 CFR 122.187 - Revocation or suspension of access.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Revocation or suspension of access. 122.187 Section 122.187 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.187 Revocation or...

  2. Efficient Security Mechanisms for the Border Gateway Routing Protocol

    DTIC Science & Technology

    1997-08-22

    Finding Algorithm for Loop- Free Routing. IEEE/ACM Transactions on Networking, 5(1):148{160, Feb. 1997. [7] International Standards Organization. ISO/IEC...Jersey 07974, Feb. 1985. ftp://netlib.att.com/netlib/att/cs/ cstr /117.ps.Z. [16] S. L. Murphy. Presentation in Panel on \\Security Architecture for the

  3. 77 FR 26564 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-04

    ... National Strategy for Global Supply Chain Security. The work of the Trade Facilitation Subcommittee... Strategy for Global Supply Chain Security as it relates to the Committee's effort to solicit, consolidate... chain management project. The Anti-Dumping/Countervailing Duties Subcommittee work on educational...

  4. 77 FR 12867 - Accreditation of ALTOL Chemical and Environmental Lab Inc., as a Commercial Laboratory

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-02

    ... accredited to test petroleum, petroleum products, organic chemicals and vegetable oils for customs purposes... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation of ALTOL Chemical..., Department of Homeland Security. ACTION: Notice of accreditation of Altol Chemical and Environmental Lab Inc...

  5. 77 FR 2308 - Approval of Altol Petroleum Product Service, as a Commercial Gauger

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Approval of Altol Petroleum... Security. ACTION: Notice of approval of Altol Petroleum Product Service, as a commercial gauger. SUMMARY: Notice is hereby given that, pursuant to 19 CFR 151.13, Altol Petroleum Product Service, Calle Gregorio...

  6. 19 CFR 149.3 - Data elements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 2 2011-04-01 2011-04-01 false Data elements. 149.3 Section 149.3 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) IMPORTER SECURITY FILING § 149.3 Data elements. (a) Shipments intended to be entered into the...

  7. 19 CFR 149.3 - Data elements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Data elements. 149.3 Section 149.3 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) IMPORTER SECURITY FILING § 149.3 Data elements. (a) Shipments intended to be entered into the...

  8. The household food insecurity and health outcomes of U.S.-Mexico border migrant and seasonal farmworkers.

    PubMed

    Weigel, M Margaret; Armijos, Rodrigo X; Hall, Yolanda Posada; Ramirez, Yolanda; Orozco, Rubi

    2007-07-01

    Emerging evidence suggests chronic household food insecurity has an adverse effect on health. This study examined the prevalence, predictors and health outcomes associated with food insecurity in 100 migrant and seasonal farmworker (MSFW) households living on the U.S.-Mexico border. Data were collected using the U.S. Food Security Scale, California Agricultural Worker's Health Survey, and objective anthropometric, clinical and biochemical indicators. Food insecurity affected 82% of households; 49% also had hunger. Household food insecurity was predicted by the presence of minor children in the home and low maternal education. Food insecure households were more likely to have at least one member affected by symptoms of depression (deprimido), nervios (an ethnospecific condition), learning disorders, and symptoms suggestive of gastrointestinal infection. Although not directly associated with food insecurity, adult obesity, central body adiposity, elevated blood pressure, and blood lipid and glucose disturbances were common. These findings highlight the significant food security and health challenges faced by border area MSFW families.

  9. The Uzbekistan Kyrgyzstan Border: Institutional Legitimacy and Regional Stability

    DTIC Science & Technology

    2017-06-01

    Advisor: David Yost THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev...this thesis analyzes the subjective forms of border legitimacy and obedience in relation to local perceptions and social behavior. While scholarly

  10. Securing the Northern Maritime Border Through Maritime Domain Awareness

    DTIC Science & Technology

    2010-09-01

    is handled through 1) aircraft overflights (Coast Guard and Coast Guard Auxiliary aircraft, U.S. Air Force, Customs and Border Patrol, Canadian...caliber machine gun, or like automatic weapons. Bruce Levy, Director, U.S. Transboundary Division conveyed to Nancy Mason, Director, Office of...1 NORAD, the North American Aerospace Defense Command, is a binational military command focused on the air defense of North America and located

  11. Multinational Integration Newsletter, Number 10-51, July 2010

    DTIC Science & Technology

    2010-07-01

    Ecuador . Colombia alerted other governments about FARC activities on their soils: Argentina four times, Bolivia twice, Brazil seven, Peru four, and...Correa government attempted to respond to the vulnerability of the northern border. Its Plan Ecuador is intended to improve border security by... Government Fernando Bustamante declared at Washington’s Inter-American Dialogue on March 18 that Ecuador has an impressive record against narcotics and the

  12. Summary and conclusions of the 2001 Stockholm Water Symposium.

    PubMed

    Falkenmark, M

    2002-01-01

    Earlier Symposia stressed the importance of both a radical shift in thinking and of a radically improved governance. This is not possible without cross-sectoral bridge building through dialogue--the theme of this year's Symposium. The ongoing globalization is strong and complex with three main categories of country responses: integration into the world economy, marginalization, or a mix of both. Since water is a key element to achieve poverty eradication, health, nutrition and ecological service protection, i.e. for socioeconomic development, it is imperative that water be entered into the political agenda and given adequate status in society and among politicians. The particular danger of the water pollution crisis already in progress, clearly illustrated from both India and China, was further visualized by a dynamic world model experiment, showing devastating consequences in the 2040s that would influence both food production and population. The Symposium dialogue indicated however that there are options for actions. It is time to move on and make sure that water security becomes a reality for our children and grandchildren.

  13. Public/Private Partnerships with Hazardous Material Motor Carriers: Creating Incentives to Increase Security through Assessed Risk (STAR)

    DTIC Science & Technology

    2008-12-01

    Program,” http://www.cbp.gov/xp/cgov/trade/cargo_security/ ctpat /fast/ (accessed October 14, 2008). 73 U.S. Customs and Border Protection, “What Is...Customs-Trade Partnership against Terrorism (C- TPAT)?” http://www.cbp.gov/xp/cgov/trade/cargo_security/ ctpat /what_ctpat/ (accessed October 14, 2008...cgov/trade/cargo_security/ ctpat / (accessed September 12, 2008). 69 1. National Park Service Historic Preservation Tax Incentives The U.S. government

  14. Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

    DTIC Science & Technology

    2016-12-01

    as a Fulbright Scholar at Durham University’s Institute of Advanced Study . Dr. Manjikian’s publications in- clude Apocalypse and Post -Politics: The...concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S

  15. Globalization of the International Arms Industry: A Step Towards ABCA and NATO Interoperability?

    DTIC Science & Technology

    2009-04-01

    adversely affect national security. In the words of Bitzinger the challenge will be to: “distinguish between ‘good’ globalization and ‘ bad ...accurately captured the dilemma when he stated that: “We’re not just making toothpaste ; we’re in the business of national security. National borders do

  16. 77 FR 47767 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-10

    ... Protection, DHS/CBP--017 Analytical Framework for Intelligence (AFI) System of Records AGENCY: Privacy Office... Homeland Security/U.S. Customs and Border Protection, DHS/CBP--017 Analytical Framework for Intelligence... Analytical Framework for Intelligence (AFI) System of Records'' from one or more provisions of the Privacy...

  17. 19 CFR 122.188 - Issuance of temporary Customs access seal.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Issuance of temporary Customs access seal. 122.188 Section 122.188 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.188 Issuance of...

  18. 19 CFR 122.188 - Issuance of temporary Customs access seal.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Issuance of temporary Customs access seal. 122.188 Section 122.188 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.188 Issuance of...

  19. 19 CFR 122.188 - Issuance of temporary Customs access seal.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Issuance of temporary Customs access seal. 122.188 Section 122.188 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.188 Issuance of...

  20. 76 FR 29257 - Accreditation of Intertek USA, Inc., as a Commercial Laboratory

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-20

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation of Intertek USA... Security. ACTION: Notice of accreditation of Intertek USA, Inc., as a commercial laboratory. SUMMARY: Notice is hereby given that, pursuant to 19 CFR 151.12, Intertek USA, Inc., 8500 West Bay Road MS 37...

  1. 76 FR 76981 - Request for Public Comments Concerning U.S.-Canada Action Plan for Perimeter Security and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-09

    ..., DHS. ACTION: Notice. SUMMARY: The United States and Canada are staunch allies, vital economic partners... in which the United States and Canada share responsibility for the security and resilience of our..., while working together to facilitate the flows of legitimate travel and trade. Beyond the Border...

  2. 76 FR 55082 - Re-Accreditation and Re-Approval of SGS North America, Inc. as a Commercial Gauger

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-06

    ... DEPARTMENT OF HOMELAND SECURITY Bureau of Customs and Border Protection Re-Accreditation and Re..., Department of Homeland Security. ACTION: Notice of re-approval of SGS North America, Inc., Baytown, Texas, as... America, Inc., Baytown, Texas 78408, has been re-approved to gauge petroleum and petroleum products...

  3. 76 FR 64966 - Re-Accreditation and Re-Approval of Intertek Caleb Brett as a Commercial Gauger

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-19

    ....gov/xp/cgov/import/operations_support/labs_scientific_svcs/org_and_operations.xml . DATES: The re... DEPARTMENT OF HOMELAND SECURITY Bureau of Customs and Border Protection Re-Accreditation and Re..., Department of Homeland Security. ACTION: Notice of re-approval of Intertek Caleb Brett, Ponce, Puerto Rico...

  4. TeraSCREEN: multi-frequency multi-mode Terahertz screening for border checks

    NASA Astrophysics Data System (ADS)

    Alexander, Naomi E.; Alderman, Byron; Allona, Fernando; Frijlink, Peter; Gonzalo, Ramón; Hägelen, Manfred; Ibáñez, Asier; Krozer, Viktor; Langford, Marian L.; Limiti, Ernesto; Platt, Duncan; Schikora, Marek; Wang, Hui; Weber, Marc Andree

    2014-06-01

    The challenge for any security screening system is to identify potentially harmful objects such as weapons and explosives concealed under clothing. Classical border and security checkpoints are no longer capable of fulfilling the demands of today's ever growing security requirements, especially with respect to the high throughput generally required which entails a high detection rate of threat material and a low false alarm rate. TeraSCREEN proposes to develop an innovative concept of multi-frequency multi-mode Terahertz and millimeter-wave detection with new automatic detection and classification functionalities. The system developed will demonstrate, at a live control point, the safe automatic detection and classification of objects concealed under clothing, whilst respecting privacy and increasing current throughput rates. This innovative screening system will combine multi-frequency, multi-mode images taken by passive and active subsystems which will scan the subjects and obtain complementary spatial and spectral information, thus allowing for automatic threat recognition. The TeraSCREEN project, which will run from 2013 to 2016, has received funding from the European Union's Seventh Framework Programme under the Security Call. This paper will describe the project objectives and approach.

  5. [Health on the borders: access to and demands on the Brazilian National Health System by foreigners and non-resident Brazilians in cities along the border with MERCOSUR countries from the perspective of municipal health secretaries].

    PubMed

    Giovanella, Ligia; Guimarães, Luisa; Nogueira, Vera Maria Ribeiro; Lobato, Lenaura de Vasconcelos Costa; Damacena, Giseli Nogueira

    2007-01-01

    In the context of forming common markets, border areas require special attention, since they anticipate the effects of integration processes. Along borders, different political, monetary, security, and social systems coexist; the intensification of flows resulting from integration raises challenges for the health systems, requiring specific policies focused on guaranteeing the right to health. This article presents the results of a study on the conditions for access to (and demands for) health services in the MERCOSUR border cities. A survey was performed with municipal health secretaries in the 69 Brazilian cities in the States of Rio Grande do Sul, Santa Catarina, Paraná, and Mato Grosso do Sul that border on the other MERCOSUR countries. The study attempted to identify the services demanded by the border population, mechanisms used for access, flows between services and systems, response strategies, and local agreements. Initiatives for cooperation between Brazilian and foreign local administrators were identified in nearly half of the municipalities and can orient the formulation of guidelines for border situations, allowing improvement in comprehensive access to health care.

  6. Metallic Material Image Segmentation by using 3D Grain Structure Consistency and Intra/Inter-Grain Model Information

    DTIC Science & Technology

    2015-01-05

    Wang. KinWrite: Handwriting -Based Authentication Using Kinect, Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, 2013 21...the large varia- tion of different handwriting styles, neighboring characters within a word are usually connected, and we may need to segment a word

  7. The Case for Kids. Community Strategies for Children and Families: Promoting Positive Outcomes.

    ERIC Educational Resources Information Center

    Florida State Mental Health Inst., Tampa.

    Why, despite society's common understanding of the problems of children, have individuals failed to act decisively and powerfully to bring them security and hope? This report, which includes articles excerpted and adapted from presentations and discussions at a 1996 symposium, addresses this question. After an introduction by Rosalynn Carter, the…

  8. NORAD: A Model to Address Gaps in US-Mexico Security Coordination

    DTIC Science & Technology

    2016-05-26

    37 slow economic recovery throughout the 1930s by creating a national investment bank , accelerating land reforms, and nationalizing the...population formed in northern Mexico, with unemployment rates rising as high as fifty percent in border cities such as Ciudad Juárez, Tijuana, and...Mexicali.178 To address unemployment in the historically volatile border region, the Mexican government instituted a series of economic development

  9. Countering Violence Along the United States - Mexico Border: Thinking Strategically

    DTIC Science & Technology

    2011-06-01

    control more of the wholesale distribution of heroin, methamphetamine , and marijuana distribution than other major drug trafficking organizations in the...intrusive inspection equipment—enhancing border security by expanding CBP capabilities to scan commercial traffic for contraband through the use of X ... ray and other imaging technologies. 8 The use of commercial aircraft as a way to smuggle drugs into the U.S. from Mexico is not a method used

  10. Borders, Corridors, and Economics: The Keys to Stopping Cross Border Violence

    DTIC Science & Technology

    2013-04-22

    control in the United States. The Tijuana Cartel, Federation Cartel, Gulf Cartel, Juarez Cartel, Sinaloa Cartel, Knights Templar Cartel, and Los Zetas...defeated rule of law and legitimate commerce migrated toward security. The lack of rule of law transmitted violence across Peru and was perpetuated by...million people live in poverty in Mexico. Deeply impoverished and unemployed people in Mexico have three options for survival: migration , tenuous and

  11. The DISAM Journal of International Security Assistance Management. Volume 29, Number 4, December 2007. Building Partnership Capacity

    DTIC Science & Technology

    2007-12-01

    Media Issues in Combating Terrorism • International Approaches • Ethics and Combating Terrorism • Restructuring the Security Sector for...Terrorism • Organized Crime and Terrorism • Civil-Military Cooperation and Terrorism • Ethics and Combating Terrorism • Border Control • Consequence...Simon. “Confl ict, Ecology and the Politics of Envrionmental Security.” Global Environmental Politics 2, No. 4 (November 2002): pp 25-130. 28

  12. On the Southern Border of the United States: Threats and Opportunities in an Economy of Force Theater

    DTIC Science & Technology

    2007-05-10

    U.S. Naval War College, National Security Decision Making handout dated 19 April 2006, page 2. 15 Geoffrey Crawford, The Posse Comitatus Act...2. 20 Shawn Burns, Homeland Security Considerations, U.S. Naval War College, National Security Decision Making handout dated 19 April 2006, page 3...States.42 The routes that make free-flowing ports of entry so attractive for 40 Ibid. Vallone

  13. 6th Institute for Systems Biology International Symposium: Systems Biology and the Environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Galitski, Timothy P.

    2007-04-23

    Systems biology recognizes the complex multi-scale organization of biological systems, from molecules to ecosystems. The International Symposium on Systems Biology is an annual two-day event gathering the most influential researchers transforming biology into an integrative discipline investigating complex systems. In recognition of the fundamental similarity between the scientific problems addressed in environmental science and systems biology studies at the molecular, cellular, and organismal levels, the 2007 Symposium featured global leaders in “Systems Biology and the Environment.” The objective of the 2007 “Systems Biology and the Environment” International Symposium was to stimulate interdisciplinary thinking and research that spans systems biology andmore » environmental science. This Symposium was well aligned with the DOE’s Genomics: GTL program efforts to achieve scientific objectives for each of the three DOE missions: Develop biofuels as a major secure energy source for this century; Develop biological solutions for intractable environmental problems; Understand biosystems’ climate impacts and assess sequestration strategies. Our scientific program highlighted world-class research exemplifying these priorities. The Symposium featured 45 minute lectures from 12 researchers including: Penny/Sallie Chisholm of MIT gave the keynote address “Tiny Cells, Global Impact: What Prochlorococcus Can Teach Us About Systems Biology”, plus Jim Fredrickson of PNNL, Nitin Baliga of ISB, Steve Briggs of UCSD, David Cox of Perlegen Sciences, Antoine Danchin of Institut Pasteur, John Delaney of the U of Washington, John Groopman of Johns Hopkins, Ben Kerr of the U of Washington, Steve Koonin of BP, Elliott Meyerowitz of Caltech, and Ed Rubin of LBNL. The 2007 Symposium promoted DOE’s three mission areas among scientists from multiple disciplines representing academia, non-profit research institutions, and the private sector. As in all previous Symposia, we had excellent attendance of participants representing 20-30 academic or research-oriented facilities along with 25-30 private corporations from 5-10 countries. To broaden the audience for the Symposium and ensure the continued accessibility of the presentations, we made the presentation videos available afterward on the ISB’s website.« less

  14. Space Commerce 1994 Forum: The 10th National Space Symposium. Proceedings report

    NASA Astrophysics Data System (ADS)

    Lipskin, Beth Ann; Patterson, Sara; Aragon, Larry; Brescia, David A.; Flannery, Jack; Mossey, Roberty; Regan, Christopher; Steeby, Kurt; Suhr, Stacy; Zimkas, Chuck

    1994-04-01

    The theme of the 10th National Space Symposium was 'New Windows of Opportunity'. These proceedings cover the following: Business Trends in High Tech Commercialization; How to Succeed in Space Technology Business -- Making Dollars and Sense; Obstacles and Opportunities to Success in Technology Commercialization NASA's Commercial Technology Mission -- a New Way of Doing Business: Policy and Practices; Field Center Practices; Practices in Action -- A New Way: Implementation and Business Opportunities; Space Commerce Review; Windows of Opportunity; the International Space Station; Space Support Forum; Spacelift Update; Competitive Launch Capabilities; Supporting Life on Planet Earth; National Security Space Issues; NASA in the Balance; Earth and Space Observations -- Did We Have Cousins on Mars?; NASA: A New Vision for Science; and Space Technology Hall of Fame.

  15. Space Commerce 1994 Forum: The 10th National Space Symposium. Proceedings report

    NASA Technical Reports Server (NTRS)

    Lipskin, Beth Ann (Editor); Patterson, Sara (Editor); Aragon, Larry (Editor); Brescia, David A. (Editor); Flannery, Jack (Editor); Mossey, Roberty (Editor); Regan, Christopher (Editor); Steeby, Kurt (Editor); Suhr, Stacy (Editor); Zimkas, Chuck (Editor)

    1994-01-01

    The theme of the 10th National Space Symposium was 'New Windows of Opportunity'. These proceedings cover the following: Business Trends in High Tech Commercialization; How to Succeed in Space Technology Business -- Making Dollars and Sense; Obstacles and Opportunities to Success in Technology Commercialization NASA's Commercial Technology Mission -- a New Way of Doing Business: Policy and Practices; Field Center Practices; Practices in Action -- A New Way: Implementation and Business Opportunities; Space Commerce Review; Windows of Opportunity; the International Space Station; Space Support Forum; Spacelift Update; Competitive Launch Capabilities; Supporting Life on Planet Earth; National Security Space Issues; NASA in the Balance; Earth and Space Observations -- Did We Have Cousins on Mars?; NASA: A New Vision for Science; and Space Technology Hall of Fame.

  16. 77 FR 33753 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection, DHS/CBP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-07

    ... users in the field in preventing the illegal entry of people and goods, or identifying other violations....g., Employer Identification Number (EIN) or Social Security Number (SSN), where available). f... entry of people and goods, or identifying other violations of law; (2) Allow analysts to conduct...

  17. National Center for Border Security and Immigration

    Science.gov Websites

    Research Contributing to the Development of "Smart Machines" August 21, 2014 Research Opportunity with DARPA August 21, 2014 Internship Opportunity with the White House Liaison's Office at the Department of Homeland Security August 21, 2014 Pages 1 2 3 4 5 6 7 8 next › last » Recent Newsletter

  18. To amend the Immigration and Nationality Act to extend the authority of the Secretary of Homeland Security to waive certain requirements under the visa waiver program for an additional 2 years.

    THOMAS, 111th Congress

    Rep. Quigley, Mike [D-IL-5

    2009-06-18

    House - 07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. 75 FR 36663 - Notice of Meeting of the Advisory Committee on Commercial Operations of Customs and Border...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ... teleconference. The meeting is limited to one topic, the 2010 National Strategy for Global Supply Chain Security... COAC will meet to discuss its views on the development of the 2010 National Strategy for Global Supply Chain Security. Public Participation: This meeting is open to the public; however, participation in COAC...

  20. To amend the Immigration and Nationality Act with respect to a country that denies or unreasonably delays accepting the country's nationals upon the request of the Secretary of Homeland Security.

    THOMAS, 111th Congress

    Rep. Castle, Michael N. [R-DE-At Large

    2010-07-30

    House - 09/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Homeland Security: Budget-in-Brief FY 2006

    DTIC Science & Technology

    2005-01-11

    nearly 11,000 undocumented migrants attempting to enter the country illegally by sea. • USCG saved the lives of nearly 5,500 mariners in distress and...well as more than 1,368 arrests and 895 indictments for money laundering and other financial crimes. ICE agents also conducted more than 2,500...than merely across the border. This program improves control of the border and save lives by returning Mexican migrants into the interior of Mexico

  2. The Gap in Operation and Maintenance of the Afghan National Security Forces Infrastructure

    DTIC Science & Technology

    2013-05-22

    organizations. They include the Afghan Border Police ( ABP ), the Afghan Uniform Police (AUP), the Afghan Highway Police (AHP), and the Criminal...other elements under the ANP include the Afghan Border Police ( ABP ), the Afghan Uniformed Police (AUP), the Afghan Highway Police (AHP) and the...delineates the authorized personnel and equipment for the army. The ANP tashkil delineates the authorized personnel and equipment for the AUP, ABP , AHP, and

  3. U.S.-MEXICO TECHNOLOGY TRANSFER; BILATERAL TECHNICAL EXCHANGES FOR SUSTAINABLE ECONOMIC GROWTH IN THE BORDER REGION

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jimenez, Richard, D., Dr.

    2007-10-01

    The U.S. Department of Energy (DOE) maintains a strong commitment to transfer the results of its science and technology programs to the private sector. The intent is to apply innovative and sometimes advanced technologies to address needs while simultaneously stimulating new commercial business opportunities. Such focused “technology transfer” was evident in the late 1990s as the results of DOE investments in environmental management technology development led to new tools for characterizing and remediating contaminated sites as well as handling and minimizing the generation of hazardous wastes. The Department’s Office of Environmental Management was attempting to reduce the cost, accelerate themore » schedule, and improve the efficacy of clean-up efforts in the nuclear weapons complex. It recognized that resulting technologies had broader world market applications and that their commercialization would further reduce costs and facilitate deployment of improved technology at DOE sites. DOE’s Albuquerque Operations Office (now part of the National Nuclear Security Administration) began in 1995 to build the foundation for a technology exchange program with Mexico. Initial sponsorship for this work was provided by the Department’s Office of Environmental Management. As part of this effort, Applied Sciences Laboratory, Inc. (ASL) was contracted by the DOE Albuquerque office to identify Mexico’s priority environmental management needs, identify and evaluate DOE-sponsored technologies as potential solutions for those needs, and coordinate these opportunities with decision makers from Mexico’s federal government. That work led to an improved understanding of many key environmental challenges that Mexico faces and the many opportunities to apply DOE’s technologies to help resolve them. The above results constituted, in large part, the foundation for an initial DOE-funded program to apply the Department’s technology base to help address some of Mexico’s challenging environmental issues. The results also brought focus to the potential contributions that DOE’s science and technology could make for solving the many difficult, multi-generational problems faced by hundreds of bi-national communities along the 2,000-mile shared border of the United States and Mexico. Efforts to address these U.S.-Mexico border issues were initially sponsored by the DOE’s Albuquerque and Carlsbad offices. In subsequent years, the U.S. Congress directed appropriations to DOE’s Carlsbad office to address public health, safety and security issues prevalent within U.S.-Mexico border communities. With ASL’s assistance, DOE’s Albuquerque office developed contacts and formed partnerships with interested U.S and Mexican government, academic, and commercial organizations. Border industries, industrial effluents, and public health conditions were evaluated and documented. Relevant technologies were then matched to environmental problem sets along the border. Several technologies that were identified and subsequently supported by this effort are now operational in a number of U.S.-Mexico border communities, several communities within Mexico’s interior states, and in other parts of Latin America. As a result, some serious public health threats within these communities caused by exposure to toxic airborne pollutants have been reduced. During this time, DOE’s Carlsbad office hosted a bilateral conference to establish a cross-border consensus on what should be done on the basis of these earlier investigative efforts. Participating border region stakeholders set an agenda for technical collaborations. This agenda was supported by several Members of Congress who provided appropriations and directed DOE’s Carlsbad office to initiate technology demonstration projects. During the following two years, more than 12 private-sector and DOE-sponsored technologies were demonstrated in partnership with numerous border community stakeholders. All technologies were well received and their effectiveness at addressing health, safety and security issues was successfully demonstrated. Several of these technologies, including those noted above and demonstrated under this effort, are now operational. Furthermore, a number of public and national security issues unique to the U.S.-Mexico border were brought to the attention of the federal government and are now being addressed, largely through the efforts of the U.S. Department of Homeland Security. Program results demonstrated the value and effectiveness of the program’s process for technology exchanges. Opportunities now exist to transition the program from its successful initial stage to one where it can more effectively address a broader spectrum of multi-disciplinary problems that impact millions of U.S. and Mexican citizens. Substantial benefits would accrue to both sides of the U.S.-Mexico border were the two countries to continue this collaboration.« less

  4. Cross-border Portfolio Investment Networks and Indicators for Financial Crises

    PubMed Central

    Joseph, Andreas C.; Joseph, Stephan E.; Chen, Guanrong

    2014-01-01

    Cross-border equity and long-term debt securities portfolio investment networks are analysed from 2002 to 2012, covering the 2008 global financial crisis. They serve as network-proxies for measuring the robustness of the global financial system and the interdependence of financial markets, respectively. Two early-warning indicators for financial crises are identified: First, the algebraic connectivity of the equity securities network, as a measure for structural robustness, drops close to zero already in 2005, while there is an over-representation of high-degree off-shore financial centres among the countries most-related to this observation, suggesting an investigation of such nodes with respect to the structural stability of the global financial system. Second, using a phenomenological model, the edge density of the debt securities network is found to describe, and even forecast, the proliferation of several over-the-counter-traded financial derivatives, most prominently credit default swaps, enabling one to detect potentially dangerous levels of market interdependence and systemic risk. PMID:24510060

  5. Optical techniques: using coarse and detailed scans for the preventive acquisition of fingerprints with chromatic white-light sensors

    NASA Astrophysics Data System (ADS)

    Hildebrandt, Mario; Dittmann, Jana; Vielhauer, Claus; Leich, Marcus

    2011-11-01

    The preventive application of automated latent fingerprint acquisition devices can enhance the Homeland Defence, e.g. by improving the border security. Here, contact-less optical acquisition techniques for the capture of traces are subject to research; chromatic white light sensors allow for multi-mode operation using coarse or detailed scans. The presence of potential fingerprints could be detected using fast coarse scans. Those Regions-of- Interest can be acquired afterwards with high-resolution detailed scans to allow for a verification or identification of individuals. An acquisition and analysis of fingerprint traces on different objects that are imported or pass borders might be a great enhancement for security. Additionally, if suspicious objects require a further investigation, an initial securing of potential fingerprints could be very useful. In this paper we show current research results for the coarse detection of fingerprints to prepare the detailed acquisition from various surface materials that are relevant for preventive applications.

  6. Cross-border Portfolio Investment Networks and Indicators for Financial Crises

    NASA Astrophysics Data System (ADS)

    Joseph, Andreas C.; Joseph, Stephan E.; Chen, Guanrong

    2014-02-01

    Cross-border equity and long-term debt securities portfolio investment networks are analysed from 2002 to 2012, covering the 2008 global financial crisis. They serve as network-proxies for measuring the robustness of the global financial system and the interdependence of financial markets, respectively. Two early-warning indicators for financial crises are identified: First, the algebraic connectivity of the equity securities network, as a measure for structural robustness, drops close to zero already in 2005, while there is an over-representation of high-degree off-shore financial centres among the countries most-related to this observation, suggesting an investigation of such nodes with respect to the structural stability of the global financial system. Second, using a phenomenological model, the edge density of the debt securities network is found to describe, and even forecast, the proliferation of several over-the-counter-traded financial derivatives, most prominently credit default swaps, enabling one to detect potentially dangerous levels of market interdependence and systemic risk.

  7. Cross-border portfolio investment networks and indicators for financial crises.

    PubMed

    Joseph, Andreas C; Joseph, Stephan E; Chen, Guanrong

    2014-02-10

    Cross-border equity and long-term debt securities portfolio investment networks are analysed from 2002 to 2012, covering the 2008 global financial crisis. They serve as network-proxies for measuring the robustness of the global financial system and the interdependence of financial markets, respectively. Two early-warning indicators for financial crises are identified: First, the algebraic connectivity of the equity securities network, as a measure for structural robustness, drops close to zero already in 2005, while there is an over-representation of high-degree off-shore financial centres among the countries most-related to this observation, suggesting an investigation of such nodes with respect to the structural stability of the global financial system. Second, using a phenomenological model, the edge density of the debt securities network is found to describe, and even forecast, the proliferation of several over-the-counter-traded financial derivatives, most prominently credit default swaps, enabling one to detect potentially dangerous levels of market interdependence and systemic risk.

  8. Security Sector Reform’s Utility in Conflict Prevention

    DTIC Science & Technology

    2013-12-10

    Publications, 1994), 18. 40 Many of these countries in Africa are states in name only due to ill defined borders, fiscal limitations, nomadic ...Security Watch, 12 OCT 2009), Online at http://www.isn.ethz.ch/isn/ Digital -Library/Articles/Detail/?lng= en&id= 108451[accessed on 27 May 2013]. 85...ISN Security Watch, 12 OCT 2009. Online at http://www.isn.ethz.ch/isn/ Digital -Library/Articles/Detail/?lng= en&id= 108451[accessed on 27 May 2013

  9. Evaluation of Different Features for Face Recognition in Video

    DTIC Science & Technology

    2014-09-01

    and Security Program (CSSP) which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public ...Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2014...deployment of innovative technologies for public safety and security practitioners to achieve specific objectives; 4. Threats/Hazards F – Major trans-border

  10. 36th International Symposium on Combustion (ISOC2016)

    DTIC Science & Technology

    2016-12-01

    GREENHOUSE GASES / IC ENGINE COMBUSTION I GAS TURBINE COMBUSTION I NOVEL COMBUSTION CONCEPTS, TECHNOLOGIES AND SYSTEMS 15. SUBJECT TERMS Reaction...pollutants and greenhouse gases; IC engine combustion; Gas turbine combustion; Novel combustion concepts, technologies and systems 16. SECURITY...PLENARY LECTURE TRANSFER (15 min) am Turbulent Flames IC Engines Laminar Flames Reaction Kinetics Gas Turbines Soot Solid Fuels/Pollutants

  11. Fermilab | Science | Questions for the Universe | Einstein's Dream of

    Science.gov Websites

    Toggle Search Search Home About Science Jobs Contact Phone Book Newsroom Newsroom News and features Press process For the media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Office of Science Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at

  12. Fermilab | Science | Inquiring Minds | The science of matter, space and

    Science.gov Websites

    Contact Phone Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and process For the media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at Work For Industry

  13. SPACE: Enhancing Life on Earth. Proceedings Report

    NASA Technical Reports Server (NTRS)

    Hobden, Alan (Editor); Hobden, Beverly (Editor); Bagley, Larry E. (Editor); Bolton, Ed (Editor); Campaigne, Len O. (Editor); Cole, Ron (Editor); France, Marty (Editor); Hand, Rich (Editor); McKinley, Cynthia (Editor); Zimkas, Chuck (Editor)

    1996-01-01

    The proceedings of the 12th National Space Symposium on Enhancing Life on Earth is presented. Technological areas discussed include: Space applications and cooperation; Earth sensing, communication, and navigation applications; Global security interests in space; and International space station and space launch capabilities. An appendices that include featured speakers, program participants, and abbreviation & acronyms glossary is also attached.

  14. MEMS and MOEMS for national security applications

    NASA Astrophysics Data System (ADS)

    Scott, Marion W.

    2003-01-01

    Major opportunities for microsystem insertion into commercial applications, such as telecommunications and medical prosthesis, are well known. Less well known are applications that ensure the security of our nation, the protection of its armed forces, and the safety of its citizens. Microsystems enable entirely new possibilities to meet National Security needs, which can be classed along three lines: anticipating security needs and threats, deterring the efficacy of identified threats, and defending against the application of these threats. In each of these areas, specific products that are enabled by MEMS and MOEMS are discussed. In the area of anticipating needs and threats, sensored microsystems designed for chem/bio/nuclear threats, and sensors for border and asset protection can significantly secure our borders, ports, and transportation systems. Key features for these applications include adaptive optics and spectroscopic capabilities. Microsystems to monitor soil and water quality can be used to secure critical infrastructure, food safety can be improved by in-situ identification of pathogens, and sensored buildings can ensure the architectural safety of our homes and workplaces. A challenge to commercializing these opportunities, and thus making them available for National Security needs, is developing predictable markets and predictable technology roadmaps. The integrated circuit manufacturing industry provides an example of predictable technology maturation and market insertion, primarily due to the existence of a "unit cell" that allows volume manufacturing. It is not clear that microsystems can follow an analogous path. The possible paths to affordable low-volume production, as well as the prospects of a microsystems unit cell, are discussed.

  15. 75 FR 69639 - Procurement List; Proposed Addition

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... Graeber Street, March ARB, CA. NPA: ARC Riverside, Riverside, CA Contracting Activity: DEPT OF HOMELAND SECURITY, BUREAU OF CUSTOMS AND BORDER PROTECTION, WASHINGTON, DC. Barry S. Lineback, Director, Business...

  16. FACE Act

    THOMAS, 111th Congress

    Rep. Watson, Diane E. [D-CA-33

    2009-06-26

    House - 08/19/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. JOLT Act

    THOMAS, 112th Congress

    Sen. Schumer, Charles E. [D-NY

    2012-03-26

    Senate - 03/27/2012 Committee on the Judiciary Subcommittee on Immigration, Refugees and Border Security . Hearings held. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. STAPLE Act

    THOMAS, 111th Congress

    Rep. Flake, Jeff [R-AZ-6

    2009-03-30

    House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Biometric Borders and Counterterrorism

    DTIC Science & Technology

    2010-12-01

    105 Gildas Avoine, Kassem Kalach and Jean-Jaques Quisquater, "EPassport: Securing International Contacts...2006): 336. Ashbourn, Julian. Practical Biometrics: From Aspiration to Implementation. London; New York: Springer, 2004. Avoine, Gildas, Kassem

  20. Exploring culture in the world of international nutrition and nutrition sciences.

    PubMed

    Centrone Stefani, Monique; Humphries, Debbie L

    2013-09-01

    This symposium was organized to bring insights from the social sciences into the awareness of nutrition scientists committed to developing and implementing effective nutrition interventions internationally. The symposium explored three different areas in the field where a more precise analysis of culture could enhance the effectiveness of nutrition science: 1) in the implementation of nutrition science research in the field; 2) in the collaboration of multiple stakeholders working to enhance nutrition in a national setting; and 3) in the language and discussions used to frame proposed changes in large scale food and nutrition security policy transnationally. Three social scientists, Monique Centrone Stefani, Lucy Jarosz, and David Pelletier were invited to share insights from their respective disciplines and respondents from within the field of nutrition provided initial reflections to better understand such perspectives. The symposium's interdisciplinary nature was designed to illustrate the challenge of multiple perspectives and methodologies and to advance understanding that could derive from such an exchange for those in the field of international nutrition seeking to decrease global hunger and malnutrition.

  1. The Evolution of the Security Order in Europe: Importance of Multinational Forces

    DTIC Science & Technology

    1992-02-25

    facto-- prevented the economic self - sufficiency of the republics.1 Therefore, it would have been necessary to agree some form of common market and...Defense Identity", Survival (July/August 1991), 336. 32 Douglas T. Stuart, "Can NATO Trascend Its Europeans Borders? NATO Out of Area Disputes", Strategic...Overaio (Novembre 1990): 1-18. Stuart, Douglas T. "Can NATO Trascend Its European Borders?." Strateoic Studies Institute (USAWC): 1-21. 48 Taylor

  2. Automated Border Control Systems as Part of e-border Crossing Process

    DTIC Science & Technology

    2015-01-01

    which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety Canada. The project was led...Canada, as represented by the Minister of National Defence, 2015 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de...FAST US,EU (2013): AVATAR kiosks Examples: US, Canada: Deployed in Vancouver, Montreal, Toronto, and Chicago International Airports

  3. Bordering on Failure: Mexican Instability, Drug Wars, and the Threat to U.S. Security

    DTIC Science & Technology

    2012-04-19

    NAFTA was that Mexico had to demonstrate it was not a one party political system; thus, the PRI began to loosen its suppression of opposition...events of 9/11, e.g., the employment of physical barriers, heightened technology, and increased law enforcement efforts along the U.S.-Mexico border...promises as he initially addressed Mexico as its president was to increase the budgets of the military, intelligence agencies, and law enforcement

  4. Optimizing Distributed Sensor Placement for Border Patrol Interdiction Using Microsoft Excel

    DTIC Science & Technology

    2007-04-01

    weather conditions and they can be evaded by using techniques which minimize heat signatures use of lasers and other technologies day or night (26:8...technologies which can be used for border security. Maier [2004] developed a seismic intrusion sensor technology which uses fiber optic cables, lasers , and...needed to create the is used as the base map for the network. program originally developed by Keyhole by Google Inc. It provides satellite images of

  5. Autonomous robot for detecting subsurface voids and tunnels using microgravity

    NASA Astrophysics Data System (ADS)

    Wilson, Stacy S.; Crawford, Nicholas C.; Croft, Leigh Ann; Howard, Michael; Miller, Stephen; Rippy, Thomas

    2006-05-01

    Tunnels have been used to evade security of defensive positions both during times of war and peace for hundreds of years. Tunnels are presently being built under the Mexican Border by drug smugglers and possibly terrorists. Several have been discovered at the border crossing at Nogales near Tucson, Arizona, along with others at other border towns. During this war on terror, tunnels under the Mexican Border pose a significant threat for the security of the United States. It is also possible that terrorists will attempt to tunnel under strategic buildings and possibly discharge explosives. The Center for Cave and Karst Study (CCKS) at Western Kentucky University has a long and successful history of determining the location of caves and subsurface voids using microgravity technology. Currently, the CCKS is developing a remotely controlled robot which will be used to locate voids underground. The robot will be a remotely controlled vehicle that will use microgravity and GPS to accurately detect and measure voids below the surface. It is hoped that this robot will also be used in military applications to locate other types of voids underground such as tunnels and bunkers. It is anticipated that the robot will be able to function up to a mile from the operator. This paper will describe the construction of the robot and the use of microgravity technology to locate subsurface voids with the robot.

  6. Safe and Secure Border Infrastructure Act

    THOMAS, 113th Congress

    Rep. Peters, Scott H. [D-CA-52

    2013-09-25

    House - 09/26/2013 Referred to the Subcommittee on Railroads, Pipelines, and Hazardous Materials. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. Reuniting Families Act

    THOMAS, 111th Congress

    Rep. Honda, Michael M. [D-CA-15

    2009-06-04

    House - 08/19/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. One Strike Act

    THOMAS, 111th Congress

    Rep. Brown-Waite, Ginny [R-FL-5

    2009-03-26

    House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Scott Gardner Act

    THOMAS, 111th Congress

    Rep. Myrick, Sue Wilkins [R-NC-9

    2009-02-25

    House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Terrorist Expatriation Act

    THOMAS, 111th Congress

    Rep. Altmire, Jason [D-PA-4

    2010-05-06

    House - 06/15/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Employment Benefit Act

    THOMAS, 111th Congress

    Rep. Polis, Jared [D-CO-2

    2009-12-10

    House - 03/01/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Baseball Diplomacy Act

    THOMAS, 111th Congress

    Rep. Serrano, Jose E. [D-NY-16

    2009-01-06

    House - 02/09/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. Border Security and Responsibility Act 2009

    THOMAS, 111th Congress

    Rep. Grijalva, Raul M. [D-AZ-7

    2009-04-23

    House - 05/15/2009 Referred to the Subcommittee on Terrorism, Unconventional Threats and Capabilities. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. In Pursuit of the American Degree: Internationalization, National Security, and the Making of South Asian Foreign Students

    ERIC Educational Resources Information Center

    Thomas, Susan

    2013-01-01

    My dissertation examines how global neoliberal forces intersect with racialized state security practices to shape the transnational subjectivities of South Asian overseas students studying in the U.S. in the post-9/11 moment. These students' movement across national borders to pursue higher education in the United States positions them as ideal…

  15. A Compton Gamma Imager for Criminal and National Security Investigation

    DTIC Science & Technology

    2014-05-01

    which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety Canada. Partners in the...project include National Research Council, McGill University, Royal Canadian Mounted Police, Public Safety Canada, Toronto Police, and Canada Border...16  6.2.1  Follow-on Research ...................................................................................... 16  6.2.2  Follow-on

  16. Assessing Water Security in the Amu Darya River Basin, Afghanistan

    DTIC Science & Technology

    2006-06-16

    Television 11/20/04 Turkmenistan, Uzbekistan 3 Turkmenistan and Uzbekistan sign friendship accord. Cooperation Dushanbe Tajik Avesta (WWW...center for bilateral cooperation to support counter- narcotics efforts. Security Dushanbe Avesta WWW 10/8/05 Tajikistan, Uzbekistan -1...Tajikistanis demand compensation for injury from antipersonnel mines on the Tajik-Uzbek border. Cooperation Dushanbe Avesta WWW 116 10/13/05

  17. To require the Secretary of Homeland Security to conduct a program in the maritime environment for the mobile biometric identification of suspected individuals, including terrorists, to enhance border security.

    THOMAS, 111th Congress

    Rep. Bilirakis, Gus M. [R-FL-9

    2009-02-24

    House - 09/22/2009 Provisions of measure incorporated into Title XI, Section 1107 of H.R. 3619, as reported by the Committee on Transportation. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  18. 3D Face Generation Tool Candide for Better Face Matching in Surveillance Video

    DTIC Science & Technology

    2014-07-01

    Safety and Security Program (CSSP) which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public ...by the Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale... public safety and security practitioners to achieve specific objectives; 4. Threats/Hazards F – Major trans-border criminal activity – e.g. smuggling

  19. Radiation Control on Uzbekistan Borders - Results and Perspectives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Petrenko, Vitaliy; Yuldashev, Bekhzod; Ismailov, Ulughbek

    2009-12-02

    The measures and actions on prevention, detection and response to criminal or unauthorized acts involving radioactive materials in Uzbekistan are presented. In frames of program of radiation monitoring to prevent illicit trafficking of nuclear and radioactive materials main customs border checkpoints were equipped with commercial radiation portal monitors. Special radiation monitors elaborated and manufactured in INP AS RU are installed in INP(main gates, research reactor and laboratory building) to provide nuclear security of Institute facilities. The experience of Uzbekistan in establishing radiation monitoring systems on its borders, their operation and maintenance would be useful for realization of proposed plan ofmore » strengthening measures to prevent illicit trafficking in Republics of Central Asia region.« less

  20. Land border monitoring with remote sensing technologies

    NASA Astrophysics Data System (ADS)

    Malinowski, Radoslaw

    2010-09-01

    The remote sensing technology has many practical applications in different fields of science and industry. There is also a need to examine its usefulness for the purpose of land border surveillance. This research started with analysis of potential direct use of Earth Observation technology for monitoring migrations of people and preventing smuggling. The research, however, proved that there are still many fields within which the EO technology needs to be improved. From that point the analysis focused on improving Border Permeability Index which utilizes EO techniques as a source of information. The result of BPI analysis with use of high resolution data provides new kind of information which can support and make more effective work of authorities from security domain.

  1. Drug Court Reauthorization Act

    THOMAS, 111th Congress

    Rep. Jackson Lee, Sheila [D-TX-18

    2010-08-10

    House - 09/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. DREAM Act of 2010

    THOMAS, 111th Congress

    Rep. Berman, Howard L. [D-CA-28

    2010-12-07

    House - 12/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. Access to Justice Act

    THOMAS, 111th Congress

    Rep. Moran, James P. [D-VA-8

    2009-03-19

    House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Criminal Alien Accountability Act

    THOMAS, 111th Congress

    Rep. Issa, Darrell E. [R-CA-49

    2009-06-11

    House - 07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. SAFER Act of 2010

    THOMAS, 111th Congress

    Rep. Maloney, Carolyn B. [D-NY-14

    2010-08-10

    House - 09/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. Nuclear Family Priority Act

    THOMAS, 111th Congress

    Rep. Gingrey, Phil [R-GA-11

    2009-02-04

    House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. 19 CFR 122.64 - Other aircraft.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... the port of entry (regardless of whether it is an international airport) nearest the final departure airport. ...

  8. 19 CFR 122.64 - Other aircraft.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... the port of entry (regardless of whether it is an international airport) nearest the final departure airport. ...

  9. 19 CFR 122.64 - Other aircraft.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... the port of entry (regardless of whether it is an international airport) nearest the final departure airport. ...

  10. 19 CFR 122.64 - Other aircraft.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... the port of entry (regardless of whether it is an international airport) nearest the final departure airport. ...

  11. 19 CFR 122.64 - Other aircraft.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... the port of entry (regardless of whether it is an international airport) nearest the final departure airport. ...

  12. DREAM Act of 2011

    THOMAS, 112th Congress

    Sen. Durbin, Richard J. [D-IL

    2011-05-11

    Senate - 06/28/2011 Committee on the Judiciary Subcommittee on Immigration, Refugees and Border Security . Hearings held. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. National Security Issues 1981 Symposium. Strategic Nuclear Policies, Weapons, and the C3 Connection, October 13-14, 1981,

    DTIC Science & Technology

    1981-01-01

    of prob- being an attack assessment. From there it goes to lems due to the atmosphere and due to solar the National Command Authority who acts on the...19-4-19"-8). MITRE/Bedford Panel Member for Institute for (omputer ’Kiences and 1959 Technology Evaluation Panal for the National Bureau of

  14. Super-Penetrant Androgen Receptor: Overcoming Enzalutamide Sensitivity in Castration-Resistant Prostate Cancer

    DTIC Science & Technology

    2016-07-01

    Prostate Cancer Research Symposium- Prostate Cancer Epigenetic Reprogramming of the Androgen Receptor in Castration Resistant Prostate Cancer , May19... cancer cells rely critically on the androgen receptor (AR) for initiation, growth and progression to castration resistant prostate cancer (CRPC...Androgen receptor, castration resistant prostate cancer , Enzalutamide , kinases. 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER

  15. Iran Human Rights Sanctions Act

    THOMAS, 111th Congress

    Rep. McMahon, Michael E. [D-NY-13

    2010-02-23

    House - 04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. CIR ASAP Act of 2009

    THOMAS, 111th Congress

    Rep. Ortiz, Solomon P. [D-TX-27

    2009-12-15

    House - 03/01/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. Vietnam Human Rights Sanctions Act

    THOMAS, 111th Congress

    Rep. Cao, Anh "Joseph" [R-LA-2

    2010-11-18

    House - 12/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. AgJOBS Act of 2009

    THOMAS, 111th Congress

    Rep. Berman, Howard L. [D-CA-28

    2009-05-14

    House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Birthright Citizenship Act of 2009

    THOMAS, 111th Congress

    Rep. Deal, Nathan [R-GA-9

    2009-04-02

    House - 05/26/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Fairness for American Students Act

    THOMAS, 111th Congress

    Rep. Tiahrt, Todd [R-KS-4

    2010-01-27

    House - 04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. EEOICPA Amendment Act of 2010

    THOMAS, 111th Congress

    Rep. Whitfield, Ed [R-KY-1

    2010-09-22

    House - 12/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Family Reunification Act of 2010

    THOMAS, 111th Congress

    Rep. Djou, Charles K. [R-HI-1

    2010-07-27

    House - 09/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. Identification Integrity Act of 2009

    THOMAS, 111th Congress

    Rep. Gallegly, Elton [R-CA-24

    2009-01-06

    House - 02/09/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Nursing Relief Act of 2009

    THOMAS, 111th Congress

    Rep. Shadegg, John B. [R-AZ-3

    2009-02-11

    House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Emergency Nursing Supply Relief Act

    THOMAS, 111th Congress

    Rep. Wexler, Robert [D-FL-19

    2009-05-20

    House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. International Megan's Law of 2009

    THOMAS, 111th Congress

    Rep. Smith, Christopher H. [R-NJ-4

    2009-03-19

    House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. Travel Promotion Act of 2009

    THOMAS, 111th Congress

    Rep. Delahunt, Bill [D-MA-10

    2009-06-18

    House - 07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Haitian Protection Act of 2009

    THOMAS, 111th Congress

    Rep. Hastings, Alcee L. [D-FL-23

    2009-01-06

    House - 02/09/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Immigration Oversight and Fairness Act

    THOMAS, 111th Congress

    Rep. Roybal-Allard, Lucille [D-CA-34

    2009-02-26

    House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Syria Accountability and Liberation Act

    THOMAS, 111th Congress

    Rep. Ros-Lehtinen, Ileana [R-FL-18

    2009-02-26

    House - 07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Senior Citizenship Act of 2009

    THOMAS, 111th Congress

    Rep. Nadler, Jerrold [D-NY-8

    2009-09-17

    House - 10/19/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. HRIFA Improvement Act of 2009

    THOMAS, 111th Congress

    Rep. Meek, Kendrick B. [D-FL-17

    2009-03-17

    House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. Filipino Veterans Family Reunification Act

    THOMAS, 111th Congress

    Rep. Hirono, Mazie K. [D-HI-2

    2009-05-14

    House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. No Sanctuary for Illegals Act

    THOMAS, 111th Congress

    Rep. Burton, Dan [R-IN-5

    2010-04-13

    House - 06/15/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Narco-Crime in Mexico: Indication of State Failure or Symptoms of an Emerging Democracy

    DTIC Science & Technology

    2010-05-21

    Estudios sobre la Inseguridad a.c. (IESCI) or The Citizen’s Institute for Insecurity states in Olson’s article, “In terms of security, we are like those...losses have virtually rendered 30 Center for Latin American and Border Studies, “The Mexican Military’s Role in Crime Ridden Border Areas,” ( Las Cruces...executive, these criminal organizations have no interest in national or federal level governance inclusive of the spectrum of essential services required

  16. The Impact of Land Border Security on Terrorism Financing: Turkey’s Southeast Land Border and the PKK

    DTIC Science & Technology

    2013-12-01

    kg cocaine, 337.412 synthetic drugs and amphetamines, 26.190 Lt acetic anhydride and two drug laboratories.80 This statistic shows how deeply... synthetics like acetic anhydride at these laboratories.81 Heroin produced in Afghanistan moves to the international market through various routes: • To...smuggling of marijuana and cigarettes are other issues. Because of all these reasons, after 9/11, protecting the northern border—like the one in the

  17. Using the Smooth Receiver Operating Curve (ROC) Method for Evaluation and Decision Making in Biometric Systems

    DTIC Science & Technology

    2014-07-01

    partnership with Public Safety Canada. Led by Canada Border Services Agency partners included : Royal Canadian Mounted Police, Defence Research...Canada, as represented by the Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la...innovative technologies for public safety and security practitioners to achieve specific objectives; 4. Threats/Hazards F – Major trans-border criminal

  18. For the relief of Hotaru Nakama Ferschke.

    THOMAS, 111th Congress

    Rep. Duncan, John J., Jr. [R-TN-2

    2009-07-10

    House - 07/20/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Sanctuary City Prevention Act of 2010

    THOMAS, 111th Congress

    Rep. Hunter, Duncan D. [R-CA-52

    2010-07-22

    House - 09/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. International Child Abduction Prevention Act of 2009

    THOMAS, 111th Congress

    Rep. Smith, Christopher H. [R-NJ-4

    2009-07-16

    House - 09/14/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Haitian Emergency Life Protection Act of 2010

    THOMAS, 111th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2010-02-05

    House - 04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. For the relief of Lilly M. Ledbetter.

    THOMAS, 111th Congress

    Rep. Woolsey, Lynn C. [D-CA-6

    2009-06-08

    House - 06/15/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. Deep Ocean Energy Resources Act of 2009

    THOMAS, 111th Congress

    Rep. Myrick, Sue Wilkins [R-NC-9

    2009-04-27

    House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. American Energy Production and Price Reduction Act

    THOMAS, 111th Congress

    Rep. Miller, Gary G. [R-CA-42

    2009-07-31

    House - 09/14/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. For the relief of Allan Bolar Kelley.

    THOMAS, 111th Congress

    Rep. Waxman, Henry A. [D-CA-30

    2010-05-24

    House - 06/03/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. Radiation Exposure Compensation Act Amendments of 2010

    THOMAS, 111th Congress

    Rep. Lujan, Ben Ray [D-NM-3

    2010-04-22

    House - 06/15/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. Keeping Families Together Act of 2009

    THOMAS, 111th Congress

    Rep. Filner, Bob [D-CA-51

    2009-02-10

    House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Restoring Protection to Victims of Persecution Act

    THOMAS, 111th Congress

    Rep. Stark, Fortney Pete [D-CA-13

    2010-03-10

    House - 04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Proud to Be an American Citizen Act

    THOMAS, 111th Congress

    Rep. Farr, Sam [D-CA-17

    2009-05-12

    House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. International Child Protection Act of 2010

    THOMAS, 111th Congress

    Rep. Childers, Travis [D-MS-1

    2010-09-29

    House - 12/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. StartUp Visa Act of 2010

    THOMAS, 111th Congress

    Rep. Maloney, Carolyn B. [D-NY-14

    2010-04-29

    House - 06/15/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Criminal Alien Removal Act of 2010

    THOMAS, 111th Congress

    Rep. Rooney, Thomas J. [R-FL-16

    2010-07-30

    House - 09/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. Citizenship and Service Act of 2010

    THOMAS, 111th Congress

    Rep. Djou, Charles K. [R-HI-1

    2010-09-29

    House - 12/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. Arts Require Timely Service (ARTS) Act

    THOMAS, 111th Congress

    Rep. Berman, Howard L. [D-CA-28

    2009-03-30

    House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Fallen Heroes Family Act of 2009

    THOMAS, 111th Congress

    Rep. Issa, Darrell E. [R-CA-49

    2009-12-16

    House - 03/01/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. Stop the Drop Houses Act of 2010

    THOMAS, 111th Congress

    Rep. Mitchell, Harry E. [D-AZ-5

    2010-07-19

    House - 07/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. American Job and Seasonal Business Preservation Act

    THOMAS, 111th Congress

    Rep. Kratovil, Frank, Jr. [D-MD-1

    2009-04-02

    House - 05/26/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. For the relief of Vicente Beltran Luna.

    THOMAS, 111th Congress

    Rep. Gonzalez, Charles A. [D-TX-20

    2009-03-05

    House - 04/20/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Justice for the Newark College Students Act

    THOMAS, 111th Congress

    Rep. Dent, Charles W. [R-PA-15

    2009-03-23

    House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Iran Threat Reduction Act of 2009

    THOMAS, 111th Congress

    Rep. Ros-Lehtinen, Ileana [R-FL-18

    2009-02-26

    House - 07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Putting an End to Sanctuary Cities Act

    THOMAS, 111th Congress

    Rep. Burton, Dan [R-IN-5

    2010-07-20

    House - 07/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Justice for Sergei Magnitsky Act of 2010

    THOMAS, 111th Congress

    Rep. McGovern, James P. [D-MA-3

    2010-09-29

    House - 12/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. Respect for the Law Act of 2009

    THOMAS, 111th Congress

    Rep. Gallegly, Elton [R-CA-24

    2009-01-06

    House - 02/09/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. P.R.O.U.D. Act

    THOMAS, 111th Congress

    Rep. Baca, Joe [D-CA-43

    2009-06-03

    House - 08/19/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Border Health Security Act of 2013

    THOMAS, 113th Congress

    Sen. Udall, Tom [D-NM

    2014-04-29

    Senate - 04/29/2014 Read twice and referred to the Committee on Health, Education, Labor, and Pensions. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. Border Health Security Act of 2011

    THOMAS, 112th Congress

    Sen. Bingaman, Jeff [D-NM

    2011-06-22

    Senate - 06/22/2011 Read twice and referred to the Committee on Health, Education, Labor, and Pensions. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. Stop Terrorist Entry Program Act of 2010

    THOMAS, 111th Congress

    Rep. Barrett, J. Gresham [R-SC-3

    2010-01-13

    House - 03/01/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Save America Comprehensive Immigration Act of 2009

    THOMAS, 111th Congress

    Rep. Jackson-Lee, Sheila [D-TX-18

    2009-01-07

    House - 02/09/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Illegal Immigration Enforcement and Social Security Protection Act of 2011

    THOMAS, 112th Congress

    Rep. Dreier, David [R-CA-26

    2011-01-05

    House - 01/31/2011 Referred to the Subcommittee on Border, Maritime, and Global Counterterrorism. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Liberian Refugee Immigration Protection Act of 2009

    THOMAS, 111th Congress

    Rep. Kennedy, Patrick J. [D-RI-1

    2009-05-05

    House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. New Employee Verification Act of 2009

    THOMAS, 111th Congress

    Rep. Johnson, Sam [R-TX-3

    2009-04-22

    House - 05/26/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Tibetan Refugee Assistance Act of 2009

    THOMAS, 111th Congress

    Rep. Miller, George [D-CA-7

    2009-03-05

    House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. Keep Terrorists at Bay Act of 2010

    THOMAS, 111th Congress

    Rep. Smith, Lamar [R-TX-21

    2010-02-23

    House - 04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. Patient-Controlled Healthcare Protection Act of 2009

    THOMAS, 111th Congress

    Rep. Gohmert, Louie [R-TX-1

    2009-07-31

    House - 09/14/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. School Safety Enhancements Act of 2010

    THOMAS, 111th Congress

    Rep. Rothman, Steven R. [D-NJ-9

    2010-07-30

    House - 09/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. Cross-Border Trade Enhancement Act of 2013

    THOMAS, 113th Congress

    Sen. Cornyn, John [R-TX

    2013-01-30

    Senate - 01/30/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. Cross-Border Trade Enhancement Act of 2012

    THOMAS, 112th Congress

    Sen. Cornyn, John [R-TX

    2012-06-07

    Senate - 06/07/2012 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. Stand with the Iranian People Act

    THOMAS, 111th Congress

    Rep. Ellison, Keith [D-MN-5

    2009-12-14

    House - 03/01/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Iran Revolutionary Guard Corps Designation Implementation Act

    THOMAS, 111th Congress

    Rep. Sherman, Brad [D-CA-27

    2009-05-12

    House - 08/19/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Pakistani Temporary Protected Status Act of 2010

    THOMAS, 111th Congress

    Rep. Green, Al [D-TX-9

    2010-12-08

    House - 12/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. For the relief of Adrian Rodriguez.

    THOMAS, 111th Congress

    Rep. Filner, Bob [D-CA-51

    2009-02-03

    House - 02/20/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. For the relief of Charmaine Bieda.

    THOMAS, 111th Congress

    Rep. Kanjorski, Paul E. [D-PA-11

    2009-04-21

    House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. Uniting American Families Act of 2009

    THOMAS, 111th Congress

    Rep. Nadler, Jerrold [D-NY-8

    2009-02-12

    House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. International Parental Child Abduction Deterrence Act

    THOMAS, 111th Congress

    Rep. Holt, Rush [D-NJ-12

    2009-07-31

    House - 09/14/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. 40 CFR 267.14 - What are my security requirements?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... facility. (b) Your facility must have: (1) A 24-hour surveillance system (for example, television... example, facilities in counties bordering the Canadian province of Quebec must post signs in French, and...

  6. 40 CFR 267.14 - What are my security requirements?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... facility. (b) Your facility must have: (1) A 24-hour surveillance system (for example, television... example, facilities in counties bordering the Canadian province of Quebec must post signs in French, and...

  7. 40 CFR 267.14 - What are my security requirements?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... facility. (b) Your facility must have: (1) A 24-hour surveillance system (for example, television... example, facilities in counties bordering the Canadian province of Quebec must post signs in French, and...

  8. 40 CFR 267.14 - What are my security requirements?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... facility. (b) Your facility must have: (1) A 24-hour surveillance system (for example, television... example, facilities in counties bordering the Canadian province of Quebec must post signs in French, and...

  9. BTFS: The Border Trade Facilitation System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, L.R.

    The author demonstrates the Border Trade Facilitation System (BTFS), an agent-based bilingual e-commerce system built to expedite the regulation, control, and execution of commercial trans-border shipments during the delivery phase. The system was built to serve maquila industries at the US/Mexican border. The BTFS uses foundation technology developed here at Sandia Laboratories' Advanced Information Systems Lab (AISL), including a distributed object substrate, a general-purpose agent development framework, dynamically generated agent-human interaction via the World-Wide Web, and a collaborative agent architecture. This technology is also the substrate for the Multi-Agent Simulation Management System (MASMAS) proposed for demonstration at this conference. Themore » BTFS executes authenticated transactions among agents performing open trading over the Internet. With the BTFS in place, one could conduct secure international transactions from any site with an Internet connection and a web browser. The BTFS is currently being evaluated for commercialization.« less

  10. About machine-readable travel documents

    NASA Astrophysics Data System (ADS)

    Vaudenay, S.; Vuagnoux, M.

    2007-07-01

    Passports are documents that help immigration officers to identify people. In order to strongly authenticate their data and to automatically identify people, they are now equipped with RFID chips. These contain private information, biometrics, and a digital signature by issuing authorities. Although they substantially increase security at the border controls, they also come with new security and privacy issues. In this paper, we survey existing protocols and their weaknesses.

  11. To provide for insurance reform (including health insurance reform), amend title XVIII of the Social Security Act to reform Medicare Advantage and reduce disparities in the Medicare Program, regulate the importation of prescription drugs, and for other purposes.

    THOMAS, 111th Congress

    Rep. Berry, Marion [D-AR-1

    2010-03-10

    House - 04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Extending the Thin Blue Line: Constabulary Police Development in Phase Zero Operations

    DTIC Science & Technology

    2015-05-16

    procure intelligence and support from local nationals. This participatory community approach to policing promotes a lasting sense of security and safety...conflict by posturing the Germans to establish law and order and internal and border security.92 The participatory police partnership also resulted in...host nation police forces supported the expansion of democracy and promoted safe overseas economic transactions. Consequently, government officials

  13. To require the Secretary of Homeland Security to conduct a program in the maritime environment for the mobile biometric identification of suspected individuals, including terrorists, to enhance border security.

    THOMAS, 111th Congress

    Rep. Bilirakis, Gus M. [R-FL-9

    2009-01-28

    10/23/2009 For Further Action See H.R.3619. (All Actions) Notes: For further action, see H.R.3619, which became Public Law 111-281 on 10/15/2010. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. Second Line of Defense Spares Program Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.

    2012-11-20

    The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financialmore » and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.« less

  15. Conservation and Ecology of Marine Forage Fishes--Proceedings of a Research Symposium, September 2012

    USGS Publications Warehouse

    Liedtke, Theresa; Gibson, Caroline; Lowry, Dayv; Fagergren, Duane

    2013-01-01

    Locally and globally, there is growing recognition of the critical roles that herring, smelt, sand lance, eulachon, and other forage fishes play in marine ecosystems. Scientific and resource management entities throughout the Salish Sea, agree that extensive information gaps exist, both in basic biological knowledge and parameters critical to fishery management. Communication and collaboration among researchers also is inadequate. Building on the interest and enthusiasm generated by recent forage fish workshops and symposia around the region, the 2012 Research Symposium on the Conservation and Ecology of Marine Forage Fishes was designed to elucidate practical recommendations for science and policy needs and actions, and spur further collaboration in support for the precautionary management of forage fish. This dynamic and productive event was a joint venture of the Northwest Straits Commission Forage Fish Program, U.S. Geological Survey (USGS), Washington Department of Fish and Wildlife (WDFW), and The Puget Sound Partnership. The symposium was held on September 12–14, 2012, at the University of Washington, Friday Harbor Laboratories campus. Sixty scientists, graduate students, and fisheries policy experts convened; showcasing ongoing research, conservation, and management efforts targeting forage fish from regional and national perspectives. The primary objectives of this event were to: (1) review current research and management related to marine forage fish species; and (2) identify priority science and policy needs and actions for Washington, British Columbia, and the entire West Coast. Given the diversity of knowledge, interests, and disciplines surrounding forage fish on both sides of the international border, the organizing committee made a concerted effort to contact many additional experts who, although unable to attend, provided valuable insights and ideas to the symposium structure and discussions. The value of the symposium format was highlighted in the closing remarks delivered by Joseph Gaydos, SeaDoc Society and Chair of the Puget Sound Science Panel. Dr. Gaydos’ presentation referenced the 2011 paper by Murray Rudd in the journal Conservation Biology, “How research-prioritization exercises affect conservation policy.” The paper points out that policy makers and funding agencies are more likely to gain a full understanding of issues when they are presented with research findings from an aligned research program. That is, compared to unaligned research strategies, where work is not based on identified research priorities.

  16. For relief of Enrique Soriano and Areli Soriano.

    THOMAS, 111th Congress

    Rep. Green, Gene [D-TX-29

    2009-01-07

    House - 02/02/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. A bill for the relief of Shigeru Yamada.

    THOMAS, 111th Congress

    Sen. Feinstein, Dianne [D-CA

    2009-01-06

    House - 12/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:

  18. For the relief of Mikael Adrian Christopher Figueroa Alvarez.

    THOMAS, 111th Congress

    Rep. Lofgren, Zoe [D-CA-16

    2009-02-13

    House - 03/10/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. To authorize appropriations for Operation Stonegarden of the Department of Homeland Security.

    THOMAS, 111th Congress

    Rep. McCaul, Michael T. [R-TX-10

    2009-04-22

    House - 05/04/2009 Referred to the Subcommittee on Border, Maritime, and Global Counterterrorism. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. For the relief of Carlos Espinal Castillo-Reynolds.

    THOMAS, 111th Congress

    Rep. Wamp, Zach [R-TN-3

    2009-01-22

    House - 02/05/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Visitors Interested in Strengthening America (VISA) Act of 2009

    THOMAS, 111th Congress

    Rep. Filner, Bob [D-CA-51

    2009-02-10

    House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. For the relief of Simaya T. K. Eversley.

    THOMAS, 111th Congress

    Rep. Davis, Danny K. [D-IL-7

    2010-05-06

    House - 06/03/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. Stop Iran's Nuclear Weapons Program Act of 2010

    THOMAS, 111th Congress

    Rep. Sherman, Brad [D-CA-27

    2010-09-29

    House - 12/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Humane Enforcement and Legal Protections for Separated Children Act

    THOMAS, 111th Congress

    Rep. Woolsey, Lynn C. [D-CA-6

    2009-07-31

    House - 09/14/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. National Economic Competitiveness and Innovation Strategy Act of 2010

    THOMAS, 111th Congress

    Rep. Holt, Rush [D-NJ-12

    2010-04-26

    House - 07/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. Dairy and Sheep H-2A Visa Enhancement Act

    THOMAS, 111th Congress

    Rep. McHugh, John M. [R-NY-23

    2009-03-23

    House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. E-2 Nonimmigrant Investor Adjustment Act of 2009

    THOMAS, 111th Congress

    Rep. Putnam, Adam H. [R-FL-12

    2009-02-24

    House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Save Our Small and Seasonal Businesses Act of 2009

    THOMAS, 111th Congress

    Rep. Stupak, Bart [D-MI-1

    2009-02-23

    House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Legal Immigrant Children's Health Improvement Act of 2009

    THOMAS, 111th Congress

    Rep. Diaz-Balart, Lincoln [R-FL-21

    2009-01-08

    House - 02/09/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. H-2B Program Reform Act of 2009

    THOMAS, 111th Congress

    Rep. Lofgren, Zoe [D-CA-16

    2009-12-16

    House - 03/01/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Traffic Stops Along the Border Statistics Study Act of 2013

    THOMAS, 113th Congress

    Rep. Jackson Lee, Sheila [D-TX-18

    2013-01-03

    House - 01/25/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Defense.gov - Special Report: Travels with Gates

    Science.gov Websites

    learned in its crackdown against a leftist insurgency and drug-trafficking cartels, provides a model for Caribbean Basin Security Initiative aimed at curbing drug trafficking and other trans-border threats. Story

  13. United Arab Emirates Human Rights Accountability Act of 2010

    THOMAS, 111th Congress

    Rep. McGovern, James P. [D-MA-3

    2010-05-25

    House - 07/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. For the relief of Francisco Rivera and Alfonso Calderon.

    THOMAS, 111th Congress

    Rep. Filner, Bob [D-CA-51

    2009-02-03

    House - 02/20/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. 77 FR 31433 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-25

    ... to better audit the returns of U.S. corporations engaged in cross-border transactions with a related... violation of Income Tax Law. We need the taxpayer identification numbers, Social Security Number (SSN) or...

  16. Security Applications Of Computer Motion Detection

    NASA Astrophysics Data System (ADS)

    Bernat, Andrew P.; Nelan, Joseph; Riter, Stephen; Frankel, Harry

    1987-05-01

    An important area of application of computer vision is the detection of human motion in security systems. This paper describes the development of a computer vision system which can detect and track human movement across the international border between the United States and Mexico. Because of the wide range of environmental conditions, this application represents a stringent test of computer vision algorithms for motion detection and object identification. The desired output of this vision system is accurate, real-time locations for individual aliens and accurate statistical data as to the frequency of illegal border crossings. Because most detection and tracking routines assume rigid body motion, which is not characteristic of humans, new algorithms capable of reliable operation in our application are required. Furthermore, most current detection and tracking algorithms assume a uniform background against which motion is viewed - the urban environment along the US-Mexican border is anything but uniform. The system works in three stages: motion detection, object tracking and object identi-fication. We have implemented motion detection using simple frame differencing, maximum likelihood estimation, mean and median tests and are evaluating them for accuracy and computational efficiency. Due to the complex nature of the urban environment (background and foreground objects consisting of buildings, vegetation, vehicles, wind-blown debris, animals, etc.), motion detection alone is not sufficiently accurate. Object tracking and identification are handled by an expert system which takes shape, location and trajectory information as input and determines if the moving object is indeed representative of an illegal border crossing.

  17. 2007 National Security Space Policy and Architecture Symposium

    DTIC Science & Technology

    2007-02-02

    Tactical Satellite (TacSat)-2 Experiment Successful Launch, 16 Dec 06, Orbital Minotaur Ground Terminal – China Lake Capability: • Field tasking/data...AIRSS risk • Develop, build, and flight qualify wide- field -of-view, full-Earth staring sensor • FX-AIRSS flight experiment : investigate data...Demonstration Critical Field Experiments Government Industry Technology Knowledge Transfer (NLT this step) Managing Risks: • Program • Technical

  18. Laboratory Evaluation of Drop-in Solvent Alternatives to n-Propyl Bromide for Vapor Degreasing

    DTIC Science & Technology

    2012-05-01

    Center Nikki M. Lowrey Jacobs Technology, Inc. Environment, Energy Security, & Sustainability Symposium New Orleans, LA May 21-24, 2012 Report ...Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per...suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports , 1215 Jefferson Davis

  19. SPACE: Vision and Reality: Face to Face. Proceedings Report

    NASA Technical Reports Server (NTRS)

    1995-01-01

    The proceedings of the 11th National Space Symposium entitled 'Vision and Reality: Face to Face' is presented. Technological areas discussed include the following sections: Vision for the future; Positioning for the future; Remote sensing, the emerging era; space opportunities, Competitive vision with acquisition reality; National security requirements in space; The world is into space; and The outlook for space. An appendice is also attached.

  20. The National Shipbuilding Reseaerch Program, Proceedings of the IREAPS Technical Symposium, Paper No. 8: Modern Ship Repair Technology Applied to Naval Vessels (The National Shipbuilding Research Program)

    DTIC Science & Technology

    1982-09-01

    ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 20 19a. NAME OF RESPONSIBLE...progressed; and, on netowrks of a higher level. This feature enables the user to reschedule work as the situation changes. Moreover, impact of late

Top