DOE Office of Scientific and Technical Information (OSTI.GOV)
Qojas, M.
1999-03-01
This document is an analysis of options for unilateral and cooperative action to improve the security of Jordan's borders. Sections describe the current political, economic, and social interactions along Jordan's borders. Next, the document discusses border security strategy for cooperation among neighboring countries and the adoption of confidence-building measures. A practical cooperative monitoring system would consist of hardware for early warning, command and control, communications, and transportation. Technical solutions can expand opportunities for the detection and identification of intruders. Sensors (such as seismic, break-wire, pressure-sensing, etc.) can warn border security forces of intrusion and contribute to the identification of themore » intrusion and help formulate the response. This document describes conceptual options for cooperation, offering three scenarios that relate to three hypothetical levels (low, medium, and high) of cooperation. Potential cooperative efforts under a low cooperation scenario could include information exchanges on military equipment and schedules to prevent misunderstandings and the establishment of protocols for handling emergency situations or unusual circumstances. Measures under a medium cooperation scenario could include establishing joint monitoring groups for better communications, with hot lines and scheduled meetings. The high cooperation scenario describes coordinated responses, joint border patrols, and sharing border intrusion information. Finally, the document lists recommendations for organizational, technical, and operational initiatives that could be applicable to the current situation.« less
Border Security, Cooperation, and Act Now Drug War Prevention Act
Rep. Jackson-Lee, Sheila [D-TX-18
2009-04-02
House - 05/26/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-18
... research, development, engineering and production of border security-related systems; and (iii) to insert.... Patricia A. Brink, Director of Civil Enforcement, Antitrust Division. [FR Doc. 2012-14766 Filed 6-15-12; 8...
Assessing Water Security in the Amu Darya River Basin, Afghanistan
2006-06-16
Television 11/20/04 Turkmenistan, Uzbekistan 3 Turkmenistan and Uzbekistan sign friendship accord. Cooperation Dushanbe Tajik Avesta (WWW...center for bilateral cooperation to support counter- narcotics efforts. Security Dushanbe Avesta WWW 10/8/05 Tajikistan, Uzbekistan -1...Tajikistanis demand compensation for injury from antipersonnel mines on the Tajik-Uzbek border. Cooperation Dushanbe Avesta WWW 116 10/13/05
Border Security, Cooperation, and Act Now Drug War Prevention Act of 2011
Rep. Jackson Lee, Sheila [D-TX-18
2011-01-05
House - 01/31/2011 Referred to the Subcommittee on Border, Maritime, and Global Counterterrorism. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Border Security Fencing and Wildlife: The End of the Transboundary Paradigm in Eurasia?
Linnell, John D C; Trouwborst, Arie; Boitani, Luigi; Kaczensky, Petra; Huber, Djuro; Reljic, Slaven; Kusak, Josip; Majic, Aleksandra; Skrbinsek, Tomaz; Potocnik, Hubert; Hayward, Matt W; Milner-Gulland, E J; Buuveibaatar, Bayarbaatar; Olson, Kirk A; Badamjav, Lkhagvasuren; Bischof, Richard; Zuther, Steffen; Breitenmoser, Urs
2016-06-01
The ongoing refugee crisis in Europe has seen many countries rush to construct border security fencing to divert or control the flow of people. This follows a trend of border fence construction across Eurasia during the post-9/11 era. This development has gone largely unnoticed by conservation biologists during an era in which, ironically, transboundary cooperation has emerged as a conservation paradigm. These fences represent a major threat to wildlife because they can cause mortality, obstruct access to seasonally important resources, and reduce effective population size. We summarise the extent of the issue and propose concrete mitigation measures.
Border Security Fencing and Wildlife: The End of the Transboundary Paradigm in Eurasia?
Linnell, John D. C.; Trouwborst, Arie; Boitani, Luigi; Kaczensky, Petra; Kusak, Josip; Skrbinsek, Tomaz; Buuveibaatar, Bayarbaatar; Bischof, Richard; Breitenmoser, Urs
2016-01-01
The ongoing refugee crisis in Europe has seen many countries rush to construct border security fencing to divert or control the flow of people. This follows a trend of border fence construction across Eurasia during the post-9/11 era. This development has gone largely unnoticed by conservation biologists during an era in which, ironically, transboundary cooperation has emerged as a conservation paradigm. These fences represent a major threat to wildlife because they can cause mortality, obstruct access to seasonally important resources, and reduce effective population size. We summarise the extent of the issue and propose concrete mitigation measures. PMID:27331878
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-06
..., Scottsdale, AZ; General Robotics, Sherman Oaks, CA; Global Technical Systems, Virginia Beach, VA; Hurley IR..., TX; Liquid Robotics, Sunnyvale, CA; Lockheed Martin Corporation, Gaithersburg, MD; Morpho Detection...
2007-12-01
Media Issues in Combating Terrorism • International Approaches • Ethics and Combating Terrorism • Restructuring the Security Sector for...Terrorism • Organized Crime and Terrorism • Civil-Military Cooperation and Terrorism • Ethics and Combating Terrorism • Border Control • Consequence...Simon. “Confl ict, Ecology and the Politics of Envrionmental Security.” Global Environmental Politics 2, No. 4 (November 2002): pp 25-130. 28
Asia-Pacific Economic Cooperation Business Travel Cards Act of 2011
Rep. Brady, Kevin [R-TX-8
2011-11-02
House - 11/15/2011 Referred to the Subcommittee on Border and Maritime Security. (All Actions) Notes: For further action, see S.1487, which became Public Law 112-54 on 11/12/2011. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
The Quest for Military Cooperation in North Africa: Prospects and Challenges
2016-10-01
transi- tion for the new political regimes, but rather the op- posite. Despite the tremendous differences between their post -2011 revolution political...inability of its post -revo- lution governments to maintain order and control the country’s borders, has had an immense impact on re- gional security...as Libya’s de facto government was granted only after the death of Qadhafi. Algerian estimates of the security risks were vindi- cated by events
Second Line of Defense Spares Program Assessment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Henderson, Dale L.; Muller, George; Mercier, Theresa M.
2012-11-20
The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financialmore » and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.« less
Administrator Highlights U.S.-Georgian Nuclear Security Cooperation in Tbilisi
Thomas D'Agostino
2017-12-09
NNSA Administrator Thomas D'Agostino highlighted the strong U.S.-Georgian cooperation on nuclear security issues during a day-long visit to the Republic of Georgia in mid-June. He briefed the media at availability at the Tbilisi airport. In April 2009, President Obama outlined an ambitious agenda to secure vulnerable nuclear material around the world within four years, calling the danger of a terrorist acquiring nuclear weapons "the most immediate and extreme threat to global security." In this year's State of the Union, he called the threat of nuclear weapons, "the greatest danger to the American people." In order to meet that challenge, the President's FY2011 Budget Request includes close to $2.7 billion for the National Nuclear Security Administration's Defense Nuclear Nonproliferation program -- an increase of 25.7 percent over FY2010. Included in that request is NNSA's Second Line of Defense (SLD) program, which works around the world to strengthen the capability of foreign governments to deter, detect, and interdict illicit trafficking in nuclear and other radioactive materials across international borders and through the global maritime shipping system.
Administrator Highlights U.S.-Georgian Nuclear Security Cooperation in Tbilisi
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas D'Agostino
2010-07-16
NNSA Administrator Thomas D'Agostino highlighted the strong U.S.-Georgian cooperation on nuclear security issues during a day-long visit to the Republic of Georgia in mid-June. He briefed the media at availability at the Tbilisi airport. In April 2009, President Obama outlined an ambitious agenda to secure vulnerable nuclear material around the world within four years, calling the danger of a terrorist acquiring nuclear weapons "the most immediate and extreme threat to global security." In this year's State of the Union, he called the threat of nuclear weapons, "the greatest danger to the American people." In order to meet that challenge, themore » President's FY2011 Budget Request includes close to $2.7 billion for the National Nuclear Security Administration's Defense Nuclear Nonproliferation program -- an increase of 25.7 percent over FY2010. Included in that request is NNSA's Second Line of Defense (SLD) program, which works around the world to strengthen the capability of foreign governments to deter, detect, and interdict illicit trafficking in nuclear and other radioactive materials across international borders and through the global maritime shipping system.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Booker, Paul M.; Maple, Scott A.
2010-06-08
Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a causemore » add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance to smuggling activities after training or technology is deployed at a given location. This paper will present an approach to holistic border security information analysis.« less
Giovanella, Ligia; Guimarães, Luisa; Nogueira, Vera Maria Ribeiro; Lobato, Lenaura de Vasconcelos Costa; Damacena, Giseli Nogueira
2007-01-01
In the context of forming common markets, border areas require special attention, since they anticipate the effects of integration processes. Along borders, different political, monetary, security, and social systems coexist; the intensification of flows resulting from integration raises challenges for the health systems, requiring specific policies focused on guaranteeing the right to health. This article presents the results of a study on the conditions for access to (and demands for) health services in the MERCOSUR border cities. A survey was performed with municipal health secretaries in the 69 Brazilian cities in the States of Rio Grande do Sul, Santa Catarina, Paraná, and Mato Grosso do Sul that border on the other MERCOSUR countries. The study attempted to identify the services demanded by the border population, mechanisms used for access, flows between services and systems, response strategies, and local agreements. Initiatives for cooperation between Brazilian and foreign local administrators were identified in nearly half of the municipalities and can orient the formulation of guidelines for border situations, allowing improvement in comprehensive access to health care.
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
The conference reported on in this document focused on the profound changes taking place in the world, changes characterized by their international nature and requiring multinational cooperation. The security of national borders continues to be a concern, but internal threats to governments are the more common phenomenon. The combination of…
1997-03-01
extraregional sponsor of Alianza para el Desarrollo Sostenible (Sustainable Development Alliance - ALIDES), along with United States and Canada. ALIDES is...more stable the government the better the country will be able to solve its environmental problems. 42 Glossary ALIDES Alianza para el Desarrollo ... Sostenible (Sustainable Development Alliance) C Centigrade CFCs Chlorofluorocarbons BECC Border Environment Cooperation Commission BNC Binational
Decision Model for U.S.- Mexico Border Security Measures
2017-09-01
and money assigned to border security investments. 14. SUBJECT TERMS Department of Homeland Security (DHS), border security, U.S.–Mexico border...and money assigned to border security investments. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION...FAA Federal Aviation Administration FAMS Federal Air Marshals Service FAST Free and Secure Trade GSA General Services Administration HIR Human
Federal-Tribal Government Collaboration in Homeland Security
2007-09-01
the direct cooperation and collaboration that had long characterized their unique status. Many tribes, such as the Navajo Nation , cover areas in...values. The Navajo Rangers interoperable communications system was also cited as a model. The Navajo Rangers are part of the Navajo Nation Parks...through the tribal lands of the Tohono O’odham Nation , and more than twenty-five other tribes have land on or near the international borders or
Study on the Flexibility in Cross-Border Water Resources Cooperation Governance
NASA Astrophysics Data System (ADS)
Liu, Zongrui; Wang, Teng; Zhou, Li
2018-02-01
Flexible strategy is very important to cross-border cooperation in international rivers water resources, which may be employed to reconcile contradictions and ease conflicts. Flexible characters of cross-border cooperation in international rivers water resources could be analyzed and revealed, using flexible strategic management framework, by taking international cooperation protocols related to water from Transboundary Freshwater Disputes Database (TFDD) as samples from the number of cooperation issues, the amount of management layers and regulator agencies in cooperation organization and the categories of income (cost) distribution (allocation) mode. The research demonstrates that there are some flexible features of cross-border cooperation in international rivers water resources: Riparian countries would select relative diversification strategies related to water, tend to construct a flexible cooperation organization featured with moderate hierarchies from vertical perspective and simplified administrations from horizontal perspective, and adopt selective inducement modes to respect ‘joint and several liability’.
[Cross-border cooperation in Europe: what are Euregios?].
Wolf, U; Hollederer, A; Brand, H
2006-11-01
In cross-border cooperation, much importance has been attributed to the so-called "Euregios", synonymously also called "Euroregions". These are cross-border structures in which, above all, local and regional authorities have joined together across one or several national borders. As early as 1958, the first Euregio was established along the German-Dutch border. Meanwhile many other Euregios have been set up. Euregios provide the testing ground for pilot projects to examine practical solutions of cooperation. Euregios are therefore also called "laboratories of Europe" or "testing laboratories of European integration". Also in the health sector, several cross-border projects are being and have already been carried out. According to what has been found out so far, above all Euregios with long years of experience in cross-border cooperation seem to commit themselves to the health issue. A huge number of the projects is co-financed by the European Union. Compared to other thematic areas, in some border regions the health issue has, on the whole been, underrepresented in cross-border cooperation. In this respect, there is potential for development. Information on existing projects as well as their experiences can facilitate the successful implementation of health-relevant cross-border projects also in those regions which have up to now not carried out any or only a few projects of this kind. The EU-funded Euregio project, carried out by lögd NRW, is the first project in which a systematic inventory analysis of cross-border health care projects will be drawn up.
U.S. - Mexico Security Cooperation: The Time to Act Is Now
2011-01-06
laws will take considerable time and effort to achieve. It is worth the resources invested as it will provide the most benefit to all citizens if...limited number of border crossing checkpoints. Additional benefits of this construct would be to reduce the costs of goods, as transportation times and... benefits to society: billions of dollars in increased tax revenue, relief for overworked law enforcement, courts and prisons, and increased safety
Evolutionary Aspects for Technology Policy: the Case of Galileo Public-Private Partnership
NASA Astrophysics Data System (ADS)
Zervos, Vasilis
2002-01-01
This paper examines the impact of strategic interactions on Private-Public Partnerships (PPPs) in space. Though there is substantial business and economics literature on PPPs, it is traditionally focused on the relationships within the partnerships (low level) and the respective factors affecting its success. The contribution of this paper is that it examines the political economy of PPPs, analysing how `high-level' strategic interactions across public-private sectors in Europe and the US determine their behaviour and success. Within this context, the European case of Galileo and other national space projects, such as the US plans for a space-based anti- missile defence, are each based on different types of PPPs, confined within the geographical borders of the two areas. The security and commercial benefits of such programmes for the respective space industries and economies have a direct impact on the other area's industry and sense of security. The paper shows that trans- Atlantic cooperation at public policy level is essential to allow the respective industries to explore the benefits of cross-border strategic research partnerships (SRPs). This will reduce the costs of the respective programmes, addressing security concerns.
Indonesia, Malaysia, and the Philippines Security Cooperation in the Celebes Sea
2008-06-01
Soviet-Afghan conflict.34 Jemmah Islamiyah of Indonesia (founded by Abu Bakar Bashir, and Indonesian national of Yemeni heritage) dates to the 1970s...the suspects stated they were trained in the Ubaidiah and Abu Bakar camps before the latter was captured by the Philippine Army in 1999.43 In 2003...international trade. Ian Storey labeled the Celebes Sea’s triborder area as the “danger zone of Southeast Asia,” due to cross-border activities of the Abu
2017-06-09
THE PATRIOT WAR AND THE FENIAN RAIDS: CASE STUDIES IN BORDER SECURITY ON THE U.S.-CANADA BORDER IN THE NINETEENTH CENTURY...3. DATES COVERED (From - To) AUG 2016 – JUN 2017 4. TITLE AND SUBTITLE The Patriot War and the Fenian Raids: Case Studies in Border Security on ...nineteenth century. The Patriot War and Fenian Raids are examined as case studies on the same border occurring roughly thirty years apart. The
2014-01-01
Government of Kenya stakeholders with providing a framework for analysis by engaging with a wide range of border security experts from key donor states...holistic national border security action plan and gap analysis were necessary to simultaneously deal with the global WMD nonproliferation agenda and...efforts from a research and analysis vantage point. The underlying idea was that Kenya, through this border security action plan and gap analysis , would
Border Security: A Conceptual Model of Complexity
2013-12-01
maximum 200 words ) This research applies complexity and system dynamics theory to the idea of border security, culminating in the development of...alternative policy options. E. LIMITATIONS OF RESEARCH AND MODEL This research explores whether border security is a living system. In other words , whether...border inspections. Washington State, for example, experienced a 50% drop in tourism and lost over $100 million in local revenue because of the
Baird, Theodore
2017-06-01
This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.
Baird, Theodore
2017-01-01
This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices. PMID:29046601
Imagining and Imaging Borders: Understanding Borderlands for Global Sustainability
NASA Astrophysics Data System (ADS)
Konrad, V.
2013-11-01
Borders are increasingly complex human responses and social constructions in a world where globalizing forces confront basic human concerns for security and certainty. In an effort to provide a background to assess research directions for imaging borders, this paper explores what we know about borders, and what we do not know well about borders. Borders in globalization are the meeting points of globalizing forces of security, trade and migration flows with emerging technologies, self determination and regionalization around the world. We need to know more about how: self determination fuels secessions and new borders; borders result from complex rather than simple policy and governance issues; borders depend on the political clout of borderland communities; market and migration flows impact borders; and borders are always in motion. The paper shows how these organizing principles underlie the basic themes of border governance, flows, culture, history, security and sustainability. Finally, the paper offers two brief illustrations of border imaging to link this presentation to the following discussion of the workshop.
Prospects for the Cross-Border Cooperation between Russia and Poland in the Field of Tourism
ERIC Educational Resources Information Center
Zaitseva, Natalia A.; Korneevets, Valentin S.; Semenova, Lyudmila V.
2016-01-01
The relevance of the research topic is driven by the increasing role of cross-border cooperation for economic development of regions of the neighbouring countries located in the immediate vicinity to the border, as well as for the tourism development. The purpose of scientific research, the results of which are presented in the article, was the…
A model for international border management systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duggan, Ruth Ann
2008-09-01
To effectively manage the security or control of its borders, a country must understand its border management activities as a system. Using its systems engineering and security foundations as a Department of Energy National Security Laboratory, Sandia National Laboratories has developed such an approach to modeling and analyzing border management systems. This paper describes the basic model and its elements developed under Laboratory Directed Research and Development project 08-684.
77 FR 34055 - Agency Information Collection Activities: Certificate of Registration
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-08
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection.... SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of Homeland Security will be... addressed to the OMB Desk Officer for U.S. Customs and Border Protection, Department of Homeland Security...
German, Polish, and Czech School Cooperation in the Neisse-Nisa-Nysa EuroRegion
ERIC Educational Resources Information Center
Dubeck, Kirsti; Schulz, Dieter
2004-01-01
The Euroregions are a form of border and cross-border cooperation. The Euroregion Neisse (D)-Nisa (CZ)-Nysa (PL) is one of four Euroregions along the German-Polish border. It was established in 1991 by the Union of Polish Communities (ERN), The Union of German communities (ERN), and the Regional Community Union of the Cities and Communities of the…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Zone Activity Permit AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security...-0029. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of Homeland Security will be...
76 FR 65207 - U.S. Customs and Border Protection
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-20
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses AGENCY: U.S. Customs and Border Protection, U.S. Department of Homeland Security.... 1641) and the U.S. Customs and Border Protection regulations (19 CFR 111.51), the following Customs...
Towards the cyber security paradigm of ehealth: Resilience and design aspects
NASA Astrophysics Data System (ADS)
Rajamäki, Jyri; Pirinen, Rauno
2017-06-01
Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.
Secure and interoperable communication infrastructures for PPDR organisations
NASA Astrophysics Data System (ADS)
Müller, Wilmuth; Marques, Hugo; Pereira, Luis; Rodriguez, Jonathan; Brouwer, Frank; Bouwers, Bert; Politis, Ilias; Lykourgiotis, Asimakis; Ladas, Alexandros; Adigun, Olayinka; Jelenc, David
2016-05-01
The growing number of events affecting public safety and security (PS&S) on a regional scale with potential to grow up to large scale cross border disasters puts an increased pressure on agencies and organisation responsible for PS&S. In order to respond timely and in an adequate manner to such events, Public Protection and Disaster Relief (PPDR) organisations need to cooperate, align their procedures and activities, share the needed information and be interoperable. Existing PPDR/PMR technologies such as TETRA, TETRAPOL or P25, do not currently provide broadband capability nor is expected such technologies to be upgraded in the future. This presents a major limitation in supporting new services and information flows. Furthermore, there is no known standard that addresses interoperability of these technologies. In this contribution the design of a next generation communication infrastructure for PPDR organisations which fulfills the requirements of secure and seamless end-to-end communication and interoperable information exchange within the deployed communication networks is presented. Based on Enterprise Architecture of PPDR organisations, a next generation PPDR network that is backward compatible with legacy communication technologies is designed and implemented, capable of providing security, privacy, seamless mobility, QoS and reliability support for mission-critical Private Mobile Radio (PMR) voice and broadband data services. The designed solution provides a robust, reliable, and secure mobile broadband communications system for a wide variety of PMR applications and services on PPDR broadband networks, including the ability of inter-system, interagency and cross-border operations with emphasis on interoperability between users in PMR and LTE.
Nuclear Security in the 21^st Century
NASA Astrophysics Data System (ADS)
Archer, Daniel E.
2006-10-01
Nuclear security has been a priority for the United States, starting in the 1940s with the secret cities of the Manhattan Project. In the 1970s, the United States placed radiation monitoring equipment at nuclear facilities to detect nuclear material diversion. Following the breakup of the Soviet Union, cooperative Russian/U.S. programs were launched in Russia to secure the estimated 600+ metric tons of fissionable materials against diversion (Materials Protection, Control, and Accountability -- MPC&A). Furthermore, separate programs were initiated to detect nuclear materials at the country's borders in the event that these materials had been stolen (Second Line of Defense - SLD). In the 2000s, new programs have been put in place in the United States for radiation detection, and research is being funded for more advanced systems. This talk will briefly touch on the history of nuclear security and then focus on some recent research efforts in radiation detection. Specifically, a new breed of radiation monitors will be examined along with the concept of sensor networks.
2009-12-01
Police xii SBI Secure Border Initiative SES Senior Executive Service SSP Secretaria de Seguridad Publica TSA Transportation Security...also been involvement from the Mexican law enforcement agency, Secretaria de Seguridad Publica (SSP) on the southwest border (CBP, 2009; ICE, 2009, p. 5...The U.S. border is comprised of nearly 20,000 miles of a mix of coastline and rugged land borders with Mexico and Canada; this includes parts of
2006-03-01
Crime_Trends_2005.pdf (accessed August 3, 2005). Consejo de Seguridad Publica , “Programa de Mediano Plazo 2004 - 2009: Seguridad Publica ,” http...international Southwest border. The issue of illegal human smuggling is not new to the United States- Mexico border or to law enforcement agencies...Operation Gatekeeper; Operation Hold the Line; Operation Stonegarden; Tucson Sector; US Border Patrol; US- Mexico border. 16. PRICE CODE 17. SECURITY
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-02
... 1974; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP-003 Credit/Debit Card... Security/U.S Customs and Border Protection--003 Credit/Debit Card Data System of Records.'' This system... any credit and debit card transactions with it has with individuals. Additionally, the Department of...
Adaptation of interoperability standards for cross domain usage
NASA Astrophysics Data System (ADS)
Essendorfer, B.; Kerth, Christian; Zaschke, Christian
2017-05-01
As globalization affects most aspects of modern life, challenges of quick and flexible data sharing apply to many different domains. To protect a nation's security for example, one has to look well beyond borders and understand economical, ecological, cultural as well as historical influences. Most of the time information is produced and stored digitally and one of the biggest challenges is to receive relevant readable information applicable to a specific problem out of a large data stock at the right time. These challenges to enable data sharing across national, organizational and systems borders are known to other domains (e.g., ecology or medicine) as well. Solutions like specific standards have been worked on for the specific problems. The question is: what can the different domains learn from each other and do we have solutions when we need to interlink the information produced in these domains? A known problem is to make civil security data available to the military domain and vice versa in collaborative operations. But what happens if an environmental crisis leads to the need to quickly cooperate with civil or military security in order to save lives? How can we achieve interoperability in such complex scenarios? The paper introduces an approach to adapt standards from one domain to another and lines out problems that have to be overcome and limitations that may apply.
International interest in space assets under the Cape Town Convention
NASA Astrophysics Data System (ADS)
Ametova, Lutfiie
2013-12-01
Private human access to outer space is impossible without space equipment. Nowadays space equipment is increasingly being financed by private sector. Private sector financiers, naturally, seek to secure their interest in space equipment. At the same time, increasing international cooperation in space industry leads to some problems of legal character. Thus, space equipment involved in international cooperation programs crosses national borders and is subject to a certain jurisdiction in a given period of time. The problem is that when an interest is created in one jurisdiction, it may not necessarily be recognised in another one. In order to provide a unified approach to interests vested in space equipment an international legal instrument is necessary. The Cape Town Convention represents an international instrument designed to provide a unified approach to interests vested in mobile equipment, including space assets.
Confidence building measures at sea:opportunities for India and Pakistan.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vohra, Ravi Bhushan Rear Admiral; ); Ansari, Hasan Masood Rear Admiral
2003-12-01
The sea presents unique possibilities for implementing confidence building measures (CBMs) between India and Pakistan that are currently not available along the contentious land borders surrounding Jammu and Kashmir. This is due to the nature of maritime issues, the common military culture of naval forces, and a less contentious history of maritime interaction between the two nations. Maritime issues of mutual concern provide a strong foundation for more far-reaching future CBMs on land, while addressing pressing security, economic, and humanitarian needs at sea in the near-term. Although Indian and Pakistani maritime forces currently have stronger opportunities to cooperate with onemore » another than their counterparts on land, reliable mechanisms to alleviate tension or promote operational coordination remain non-existent. Therefore, possible maritime CBMs, as well as pragmatic mechanisms to initiate and sustain cooperation, require serious examination. This report reflects the unique joint research undertaking of two retired Senior Naval Officers from both India and Pakistan, sponsored by the Cooperative Monitoring Center of the International Security Center at Sandia National Laboratories. Research focuses on technology as a valuable tool to facilitate confidence building between states having a low level of initial trust. Technical CBMs not only increase transparency, but also provide standardized, scientific means of interacting on politically difficult problems. Admirals Vohra and Ansari introduce technology as a mechanism to facilitate consistent forms of cooperation and initiate discussion in the maritime realm. They present technical CBMs capable of being acted upon as well as high-level political recommendations regarding the following issues: (1) Delimitation of the maritime boundary between India and Pakistan and its relationship to the Sir Creek dispute; (2) Restoration of full shipping links and the security of ports and cargos; (3) Fishing within disputed areas and resolution of issues relating to arrest and repatriation of fishermen from both sides; and (4) Naval and maritime agency interaction and possibilities for cooperation.« less
77 FR 73038 - Agency Information Collection Activities: Foreign Assembler's Declaration
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-07
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Foreign Assembler's Declaration AGENCY: U.S. Customs and Border Protection, Department of... information. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of Homeland Security will be...
Border Cracks: Approaching Border Security From a Complexity Theory and Systems Perspective
2012-12-01
The judicial system ensures the laws passed, along with the enforcement, are legal and in accordance with the Constitution . Judicial rulings are...54 4. Prohibition: The Beginning of Border Security as a Law Enforcement Tool...64 5. Law Enforcement ...............................................................................65 6
Measuring the Effectiveness of Border Security Between Ports of Entry
2010-01-01
missions. Th is report describes the results of a short study on such measures. It should be of interest to analysts and leaders responsible for...32 6.2 Identifying and Exploiting Opportunities to Estimate Attempted Illegal Crossings . . . . . . . 33 6.3 Translating Studies of...ected discussions with DHS component agencies engaged in border-security eff orts, review of prior studies of border security, and fi eld visits to
[U.S.-Mexico cross-border cooperation in research on diabetes mellitus type 2].
Canela-Soler, Jaume; Frontini, María; Cerqueira, Maria Teresa; Ruiz-Holguín, Rosalba; Díaz-Apodaca, Beatriz A
2010-09-01
To describe and analyze, utilizing a case study approach, the U.S.- Mexico Border Diabetes Prevention and Control Project, a health research cooperation initiative incorporating the participation of federal, state, and local institutions of both countries. A model of equal representation, participation, consensus, and shared leadership was used, with the participation of more than 130 institutions. A sample of 4 020 people over 18 years of age was obtained by a random, multistage, stratified, clustered design. A questionnaire about diabetes mellitus type 2 (DM2) and health was applied. The statistical analysis took into account the design effect. The prevalence of diagnosed DM2 was 14.9% (95% confidence interval [95% CI]: 12.5-17.6) and the prevalence of diagnosed DM2 adjusted by age was 19.5% (95% CI: 16.8-22.6) on the Mexican side of the border and 16.1% (IC95%: 13.5-19.2) on the U.S. border side. There were differences between the DM2 prevalence and risk factors along the border. The U.S.-Mexico Border Diabetes Prevention and Control Project allowed the border zone between the two countries to be considered, for the first time ever, as a unit for epidemiological research. A shared understanding among all participating institutions and entities of sociopolitical structures and procedures is required for effective border health cooperation initiatives.
The Design Process of Physical Security as Applied to a U.S. Border Point of Entry
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wagner, G.G.
1998-10-26
This paper describes the design process of physical security as applied to a U.S. Border Port of Entry (PoE). Included in this paper are descriptions of the elements that compose U.S. border security. The physical security design will describe the various elements that make up the process as well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry and exit of illegal contraband will be emphasized.
77 FR 55486 - Agency Information Collection Activities: Importer ID Input Record
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-10
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Importer ID Input Record AGENCY: U.S. Customs and Border Protection, Department of Homeland... information. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of Homeland Security will be...
78 FR 48458 - Notice of Reinstatement of Customs Broker License
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-08
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Reinstatement of Customs Broker License AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION...) on December 6, 2012, U.S. Customs and Border Protection, pursuant to section 641 of the Tariff Act of...
77 FR 45647 - Notice of Cancellation of Customs Broker Licenses
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-01
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses AGENCY: U.S. Customs and Border Protection, U.S. Department of Homeland Security... 1641) and the U.S. Customs and Border Protection regulations (19 CFR 111.51), the following Customs...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-21
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs And Border Protection Agency Information Collection.... Customs and Border Protection, Department of Homeland Security. ACTION: 30-Day notice and request for comments; Extension of an existing information collection. SUMMARY: U.S. Customs and Border Protection (CBP...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-27
... Tuberculosis Consortium and Legal Issues Forum; Border Binational Obesity Prevention Summit; Border Health...; (4) Border Binational Obesity Prevention Summit; (5) Border Health Research Forum, Work Group and... health, including tuberculosis; obesity/diabetes; infectious disease and public health emergencies...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-03
...The Department of Homeland Security is issuing a final rule to amend its regulations to exempt portions of a Department of Homeland Security/U.S. Customs and Border Protection system of records entitled the, ``Department of Homeland Security/U.S. Customs and Border Protection--006 Automated Targeting System of Records'' from certain provisions of the Privacy Act. Specifically, the Department exempts portions of the Department of Homeland Security/U.S. Customs and Border Protection--006 Automated Targeting system of records from one or more provisions of the Privacy Act because of criminal, civil, and administrative enforcement requirements.
NASA Astrophysics Data System (ADS)
Subagiyo, A.; Dwiproborini, F.; Sari, N.
2017-06-01
The border of RI-PNG Muara Tami district is located on the eastern part of Jayapura city, which has agricultural potential. The past paradigm put the border as the backyard caused underdevelopment in border RI-PNG Muara Tami district, so that needed acceleration development through agropolitan concept. The purpose of the research is to define the aspect of physical, social, economic and border security to support agropolitan concept in border RI-PNG Muara Tami district. The analytical research method are border interactionan analysis, border security analysis, land capability analysis, land availability analysis, schallogram analysis, institutional analysis, leading comodity analysis (LQ and Growth Share), agribusiness linkage system analysis, accessibility analysis and A’WOT analysis. The result shown that mobilization from PNG to Muara Tami district could increase the economic opportunities with agricultural based. Border security of RI-PNG Muara Tami district is vulnerable, yet still condusive to mobilization. There is 12.977,94 Ha potensial land for agricultural (20,93%). There are six leading commodities to developed are rice, watermelon, banana, coconut, areca nut and cocoa. The border of RI-PNG Muara Tami district is ready enough to support agropolitan concept, but still have problems in social and economy aspect.
DefenseLink Special: Travels with Gates, February 2007
to address the 43rd Munich Conference on Security Policy, Feb. 10 and 11, in Munich, Germany. Feb. 12 , the secretary traveled to Pakistan to meet with Pakistan President Pervez Musharaff to discuss border security on the Pakistan-Afghanistan border. Islamabad, Pakistan Gates, Pakistani President Discuss Border
78 FR 26648 - Agency Information Collection Activities: Passenger List/Crew List (CBP Form I-418)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-07
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Passenger List/Crew List (CBP Form I-418) AGENCY: U.S. Customs and Border Protection (CBP... prescribed by the Department of Homeland Security, Customs and Border Protection (CBP), for use by masters...
Rubinstein, Gidi
2006-12-01
Several personality theories focusing on specific personality variables involved in career choice and job satisfaction are based on the assumption that individuals choose certain career choices because they believe that they may be able to meet their emotional needs (J. L. Holland, 1977). The author of this study investigated the personality traits of border police officers, career soldiers, and airport security guards in Israel. The participants were 160 men--40 border policemen, 40 career soldiers, 40 airport security guards, and 40 control participants--who filled out a demographic questionnaire and a Hebrew version of the right-wing authoritarianism (RWA) shortened scale (B. Altemeyer, personal communication, February 2000). The present hypothesis predicted that the RWA scores of border police officers would be the highest, followed by those of career soldiers, airport security guards, and control participants, in that order. Statistically significant differences in RWA scores occurred between these groups in the predicted order, with the exception of the career soldiers' RWA scores, which did not significantly differ from those of the airport security guards.
78 FR 77139 - Agency Information Collection Activities: Small Vessel Reporting System
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-20
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Security. ACTION: 30-Day notice and request for comments; Extension of an existing information collection: 1651-0137. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of Homeland Security...
ERIC Educational Resources Information Center
Talynev, V. E.
2007-01-01
The specific character of border troops' performance of their operational and service tasks at border security posts and "hot spots" makes it necessary to analyze in depth and study the problems of how to improve the training of graduates and how to motivate the cadets enrolled in higher educational institutions of Russia's Federal…
76 FR 82314 - Agency Information Collection Activities: Small Vessel Reporting System
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-30
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Security. ACTION: 30-Day notice and request for comments; Establishment of a new collection of information. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of Homeland Security will be...
NASA Astrophysics Data System (ADS)
Sanchez, Rosario; Lopez, Victoria; Eckstein, Gabriel
2016-04-01
The transboundary nature of water dividing Mexico and the United States (U.S.) transforms the entire border region into an instrument of cooperation, a source of conflict, a national security issue, and an environmental concern. Reasonable data collection and research analysis have been conducted for surface waters by joint governmental institutions and non-governmental bodies. However, with the exception of the U.S. Transboundary Assessment Act Program (TAAP) (focusing on the Hueco Bolson, Mesilla Bolson, San Pedro and Santa Cruz aquifers), there is no comparable research, institutional development, or assessment of transboundary groundwater issues on the frontier. Moreover, data collection and methodologies vary between the two countries, there is no broadly accepted definition of the transboundary nature of an aquifer, and available legal and policy frameworks are constrained by non-hydrological considerations. Hence, there is a conceptual and institutional void regarding transboundary groundwater resources between Mexico and the U.S. The purpose of this paper is to bridge this void and characterize transboundary aquifers on the Mexico-US border. It reviews existing international frameworks for identifying hydrological and social criteria that characterize an aquifer as transboundary. It then assesses data from both countries to propose where and which aquifers could be considered transboundary. Finally, the paper proposes an agenda for assessing Mexico-US transboundary aquifers as a means for improving groundwater management in the border region.
NorthAm Fest : fostering a North American continent approach to countering terrorism.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gerdes, Dick; Moore, Judy Hennessey; Whitley, John B.
2004-12-01
On September 14-16, 2004, the Advanced Concepts Group of Sandia National Laboratories in conjunction with the University of Texas at El Paso and the North American Institute hosted a workshop (fest) designed to explore the concept of a North American continental approach to countering terrorism. The fest began with the basic premise that the successful defense of North America against the threat of terrorism will require close collaboration among the North American allies--Canada, Mexico and the U.S.--as well as a powerful set of information collection and analysis tools and deterrence strategies. The NorthAm Fest recast the notion of ''homeland defense''more » as a tri-national effort to protect the North American continent against an evolving threat that respects no borders. This is a report of the event summarizing the ideas explored. The fest examined the uniqueness of dealing with terrorism from a tri-national North American viewpoint, the role and possible features of joint security systems, concepts for ideal continental security systems for North America, and the challenges and opportunities for such systems to become reality. The following issues were identified as most important for the advancement of this concept. (1) The three countries share a set of core values--democracy, prosperity and security--which form the basis for joint interactions and allow for the development of a culture of cooperation without affecting the sovereignty of the members. (2) The creation of a continental defensive strategy will require a set of strategic guidelines and that smart secure borders play a pivotal role. (3) Joint security systems will need to operate from a set of complementary but not identical policies and procedures. (4) There is a value in joint task forces for response and shared information systems for the prevention of attacks. (5) The private sector must play a critical role in cross-border interactions. Finally, participants envisioned a ''Tri-National Security Laboratory'' to develop and test new counter-terrorism technologies and processes. The fest was an important first step in developing a tri-national approach to continental security and very different approaches to countering terrorism were explored. Participants came to the conclusion that continental security would be easier to achieve if the focus were on broader security issues, such as transnational crime, with terrorism being only a part of the focus. A series of fledgling relationships were begun between individuals and organizations through which actions can occur. A first commitment is the publication by a set of participants representing the three countries of a joint paper outlining the elements of a Continental Security approach.« less
NASA Astrophysics Data System (ADS)
Alexandre Castanho, Rui; Ramírez, Beatriz; Loures, Luis; Fernández-Pozo, Luis; Cabezas, José
2017-04-01
Border interactions have reached unprecedented levels in recent decades, not only due to their potential for territorial integration but also considering their role in supranational processes, such as landscape reclamation, infrastructure development and land use planning on European territory. In this scenario, successful examples related to the redevelopment of degraded areas have been showing positive impacts at several levels, such as the social, economic, environmental and aesthetic ones which have ultimately related this process, positively, to sustainability issues. However, concerning to border areas, and due to their inherent legislative and bureaucratic conflicts, the intervention in these areas is more complex. Still, and taking into account previously developed projects and strategies of cross-border cooperation (CBC) in European territory it is possible to identified that the definition of common master plans and common objectives are critical issues to achieve the desired territorial success. Additionally, recent studies have put forward some noteworthy ideas highlighting that it is possible to establish a positive correlation between CBC processes and an increasing redevelopment of degraded border areas, with special focus on the reclamation of derelict landscapes fostering soil reuse and redevelopment. The present research, throughout case study analysis at the Mediterranean level - considering case studies from Portugal, Spain, Monaco and Italy - which presents specific data on border landscape redevelopment, enables us to conclude that CBC processes have a positive influence on the potential redevelopment of degraded border areas, considering not only urban but also rural land. Furthermore, this paper presents data obtained through a public participation process which highlights that these areas present a greater potential for landscape reclamation, fostering resource sustainability and sustainable growth. Keywords: Spatial planning; Land degradation; Redevelopment; Cross-border cooperation (CBC); Land use.
Securing our Borders and our Data Act of 2009
Rep. Engel, Eliot L. [D-NY-17
2009-01-07
House - 02/09/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Parcher, Jean W.; Page, William R.
2013-01-01
Historically, international borders were located far from the major political and economic capitals of their countries and rarely received adequate planning or infrastructure development. Today, as a result of global economics and increased movement of goods between nations, border regions play a much greater role in commerce, tourism, and transportation. For example, Mexico is the second largest destination for United States exports (Woodrow Wilson Center Mexico Institute, 2009). The rapid population and economic growth along the United States–Mexican border, undocumented human border crossings, and the unique natural diversity of resources in the Borderlands present challenges for border security and environmental protection. Assessing risks and implementing sustainable growth policies to protect the environment and quality of life greatly increase in complexity when the issues cross an international border, where social services, environmental regulations, lifestyles, and cultural beliefs are unique for each country. Shared airsheds, water and biological resources, national security issues, and disaster management needs require an integrated binational approach to assess risks and develop binational management strategies.
Nonimmigrant Overstays: Brief Synthesis of the Issue
2010-01-15
finger biometric system for immigration identification17 to the major identity management and screening... finger scans and digital photographs) to check identity. Enhanced Border Security and Visa Entry Reform Act of 2002 The Enhanced Border Security ...further provides: “A determination by the Secretary of Homeland Security that an alien who applied for authorization to travel to the United States
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-30
... 1974; Department of Homeland Security U.S. Customs and Border Protection-DHS/CBP-009 Electronic System for Travel Authorization (ESTA) System of Records AGENCY: Privacy Office, Department of Homeland Security. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of...
Border Security Agency Structure: A Hindrance to Demonstrating Border Security Success
2013-12-01
Barrett and Ronald E. Fry, the inquiry is about the honest desire “…to learn about something at its premise. It is not only about mobilizing human...Enforcement ( Skinner , 2005). That was followed by Detention and Removal of Illegal Aliens, U.S. Immigration and Customs Enforcement (ICE) ( Skinner , 2006...and DHS’ Progress in Addressing Coordination Challenges Between Customs and Border Protection and Immigration and Customs Enforcement ( Skinner
The Economic Impact of the Homeland Security Advisory System: The Cost of Heightened Border Security
2008-12-01
the United States. Secondary economic impacts of the HSAS such as the airline industry , lost tourism , and retail business from cross-border...Ontario and its businesses. The study is aimed at the trucking, automotive, and tourism industries ; and how they are impacted by border delays. The...19 A. DETROIT-WINDSOR AND THE AUTOMOTIVE INDUSTRY ............19 B. THE AMBASSADOR BRIDGE SYSTEM .................................................21
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-18
... forth in this system of records notice. AMOSS also has users from the Department of Defense (DOD... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0021] Privacy Act of 1974; Department of Homeland Security/U.S. Customs and Border Protection--019 Air and Marine Operations...
Cost and effectiveness analysis on unmanned aerial vehicle (UAV) use at border security
NASA Astrophysics Data System (ADS)
Yilmaz, Bahadır.
2013-06-01
Drones and Remotely Piloted Vehicles are types of Unmanned Aerial Vehicles. UAVs began to be used with the war of Vietnam, they had a great interest when Israel used them in Bekaa Valley Operations of 1982. UAVs have been used by different countries with different aims with the help of emerging technology and investments. In this article, in the context of areas of UAV usage in national security, benefits and disadvantages of UAVs are put forward. Particularly, it has been evaluated on the basis of cost-effectiveness by focusing the use of UAV in the border security. UAVs have been studied by taking cost analysis, procurement and operational costs into consideration. Analysis of effectiveness has been done with illegal passages of people and drugs from flight times of UAVs. Although the procurement cost of the medium-level UAVs is low, its operational costs are high. For this reason, the idea of less costly alternative systems have been revealed for the border security. As the costs are reduced to acceptable level involving national security and border security in future with high-technology products in their structure, it will continue to be used in an increasing proportion.
NASA Astrophysics Data System (ADS)
Clarke, David J.; Davis, Eric; Varco, Alan G.
2008-10-01
Surveillance Of Borders Coastlines And Harbours (SOBCAH ) is becoming increasingly challenging in Europe due to the expansion of new European borders coupled with the increased risks from the potential quantity and variety of terrorist activities. SOBCAH was an 18-month programme undertaken as a European Commission funded Preparatory Action in the field of Security Research (PASR) initiative to identify and demonstrate improvements in security; initially focusing on techniques to maximise the surveillance and detection effectiveness of existing sensor systems and technologies. This paper discusses the rationale in identifying the requirements, establishing a system architecture and the findings of building a security system demonstrator that underwent trials in the Port of Genoa, Italy in July 2007. It will provide an overview of the main drivers for a European-wide concept to standardise the development of enhanced border security systems. The paper will focus on techniques employed in the demonstrator to maximise the intelligence gathered from many disparate sensor sources without burdening the work load of the operators; providing enhanced situational awareness of the threat environment.
The Design Process of Physical Security as Applied to a U.S. Border Port of Entry
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wagner, G.G.
1999-02-22
This paper details the application of a standard physical security system design process to a US Border Port of Entry (PoE) for vehicle entry/exit. The physical security design methodology is described as well as the physical security similarities to facilities currently at a US Border PoE for vehicles. The physical security design process description includes the various elements that make up the methodologies well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry/exit of illegal contraband and personnel are described. The potential to enhance the functionsmore » of drug/contraband detection in the Pre-Primary Inspection area through the application of emerging technologies are also addressed.« less
Explaining weapons proliferation: Going beyond the security dilemma
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rattray, G.J.
1994-07-01
Most analyses addressing the subject of why states choose to proliferate focus on external motivations, particularly the security dilemma, facing a country`s leaders. This paper concludes that, other factors, such as prestige, regime type and stability, and economic status, can have impact in determining proliferation outcomes. In the case of Newly Independent States of the former Soviet Union (NIS), the domestic problems generated by internal conflicts, arms remaining from the Cold War, excess defense industrial capacity, economic difficulties and the breakdown of central authority resulting in a loss of border control and corruption have all made the NIS an extremelymore » fertile ground for weapons proliferation. A more positive `rollback` situation has emerged in Latin America where both Argentina and Brazil have seemingly decided to forgo the acquisition of nuclear weapons and ballistic missiles. The US must understand the `strategic personality` of each potential proliferation. Not all state behavior can be explained in terms of the security dilemma. One must also keep in mind the complexity of possible motivations. Economic and technological assistance and cooperative efforts at institution-building hold great potential to combating proliferation.« less
Defense Security Cooperation Agency Vision 2020. Update 1
2015-10-01
the feasibility and pros/ cons of developing a DoD- wide security cooperation workforce development and management program including training...Synchronizing Security Cooperation Activities ..................................................................................... 7 Meeting...Security Cooperation ............................. 15 6. Remaining a Provider of Choice for Our International Customers
76 FR 3649 - Agency Information Collection Activities: Request for Information
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-20
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Request for Information AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: 30-Day notice and request for comments; Extension of an existing information collection...
78 FR 26649 - Agency Information Collection Activities: Trusted Traveler Programs
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-07
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Trusted Traveler Programs AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security. ACTION: 60-Day Notice and request for comments; Extension of an existing collection of...
77 FR 40892 - Agency Information Collection Activities: Crew Member's Declaration
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-11
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Crew Member's Declaration AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security. ACTION: 60-Day Notice and request for comments; Extension of an existing collection of...
78 FR 48457 - Correction of Document Revoking Customs Broker Licenses
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-08
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Correction of Document Revoking Customs Broker Licenses AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Correction of document revoking certain customs broker licenses. SUMMARY: In a notice published...
78 FR 70065 - Agency Information Collection Activities: Customs Declaration
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-22
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Customs Declaration AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security ACTION: 60-Day notice and request for comments; Extension of an existing collection of information...
78 FR 48456 - Notice of Cancellation of Customs Broker Licenses
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-08
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Customs broker license cancellations. SUMMARY: Notice is hereby given that the customs broker...
77 FR 73038 - Agency Information Collection Activities: Application for Allowance in Duties
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-07
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Application for Allowance in Duties AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security. ACTION: 60-day notice and request for comments; Extension of an existing...
78 FR 64234 - Notice of Reinstatement of Customs Broker Licenses; Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-28
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Reinstatement of Customs Broker Licenses; Correction AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice; correction. SUMMARY: CBP published a notice in the Federal Register on August 8...
Immigration And Its Effects On The National Security Of Sri Lanka
2016-12-01
Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE December 2016 3...conflict, counter-terrorism, border security management , diaspora, census, ideologies, refugees, human smuggling, trafficking, trans-border... MANAGEMENT ................................................................71 1. Domestic Control Measures
Homeland Security Department: FY2009 Appropriations
2009-03-04
security fees 2,113 2,329 TWIC 64 9 Hazmat 18 18 TSA Registered Traveler 4 10 FEMA/EPR National Flood Insurance Fund 111 157 CBP Small airports 7...Border. f. Fees include TWIC, HAZMAT, Registered Traveler , and Alien Flight School Checks. Homeland Security Department: FY2009 Appropriations CRS...unauthorized travelers and immigrants; and enforcing more than 400 laws and regulations at the border on behalf of more than 60 government agencies
Measuring cross-border travel times for freight : Otay Mesa international border crossing.
DOT National Transportation Integrated Search
2010-09-01
Cross border movement of people and goods is a vital part of the North American economy. Accurate real-time data on travel times along the US-Mexico border can help generate a range of tangible benefits covering improved operations and security, lowe...
78 FR 35044 - U.S. Customs and Border Protection
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-11
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Visa Waiver Program Carrier Agreement (CBP Form I-775) AGENCY: U.S. Customs and Border Protection... information collection: 1651-0110. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-02
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection.... Customs and Border Protection (CBP), Department of Homeland Security. ACTION: 60-Day notice and request... November 1, 2011, to be assured of consideration. ADDRESSES: Direct all written comments to U.S. Customs...
77 FR 13348 - Approval of VIP Chemical, Inc., As a Commercial Gauger
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-06
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Approval of VIP Chemical, Inc., As a Commercial Gauger AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of approval of VIP Chemical, Inc., as a commercial gauger. SUMMARY: Notice is hereby given...
Border Enforcement Security Task Force Act of 2011
Rep. Cuellar, Henry [D-TX-28
2011-02-17
House - 02/24/2011 Referred to the Subcommittee on Border and Maritime Security. (All Actions) Notes: For further action, see H.R.915, which became Public Law 112-205 on 12/7/2012. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Re-Casting the U.S.-Mexico Border Security Net
2014-03-01
the best fence money can buy , and they counter us with a 2,500-year-old technology.214 The incident proved that these organizations are extremely...created a demand that has attracted illicit activity. DTOs have expanded their franchises to increase the size of their profits. Border security
76 FR 71994 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-21
... recommendations on how to proceed on those topics: Subcommittee: The Global Supply Chain Security Land Border... document for public release.--Report by the Global Supply Chain Security Air Cargo Subcommittee. Status... surveys (IPR Partnership Program Survey and IPR Distribution Chain Management survey). Subcommittee...
78 FR 76851 - Agency Information Collection Activities: BP Regulations Pertaining to Customs Brokers
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-19
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: BP Regulations Pertaining to Customs Brokers AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security. ACTION: 60-day notice and request for comments; extension of an existing...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-18
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Protection (CBP), Department of Homeland Security. ACTION: 60-Day Notice and request for comments; Extension... assured of consideration. ADDRESSES: Direct all written comments to U.S. Customs and Border Protection...
78 FR 48460 - Notice of Revocation of Customs Broker License
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-08
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Revocation of Customs Broker License AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of revocation of a customs broker license. SUMMARY: Notice is hereby given that a customs broker...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-11
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Protection, Department of Homeland Security. ACTION: 60-Day notice and request for comments; Extension of an...: Direct all written comments to U.S. Customs and Border Protection, Attn: Tracey Denning, Office of...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-15
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Protection, Department of Homeland Security. ACTION: 30-Day notice and request for comments; Extension of an existing information collection: 1651-0061. SUMMARY: U.S. Customs and Border Protection (CBP) of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-07
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Protection, Department of Homeland Security. ACTION: 30-Day notice and request for comments; Extension of an existing information collection. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of...
77 FR 5819 - Notice of Cancellation of Customs Broker Licenses
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses AGENCY: U.S. Customs and Border Protection, U.S. Department of Homeland Security ACTION: General notice. SUMMARY: Pursuant to section 641 of the Tariff Act of 1930, as amended, (19 USC...
75 FR 11898 - Notice of Cancellation of Customs Broker License
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-12
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker License AGENCY: U.S. Customs and Border Protection, U.S. Department of Homeland Security. ACTION: General Notice. SUMMARY: Pursuant to section 641 of the Tariff Act of 1930, as amended (19 USC...
75 FR 47825 - Notice of Cancellation of Customs Broker Licenses
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-09
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses AGENCY: U.S. Customs and Border Protection, U.S. Department of Homeland Security. ACTION: General notice. SUMMARY: Pursuant to section 641 of the Tariff Act of 1930, as amended, (19 USC...
75 FR 5618 - Notice of Cancellation of Customs Broker License
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-03
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker License AGENCY: U.S. Customs and Border Protection, U.S. Department of Homeland Security. ACTION: General notice. SUMMARY: Pursuant to section 641 of the Tariff Act of 1930, as amended, (19 USC...
Numbers Matter: Post-2014 Afghan National Security Force End Strength
2013-03-01
Afghan Border Police ( ABP ), and the Afghan National Civil Order Police (ANCOP).16 Two other Afghan security organizations, which did not factor...Air Force (AAF), Afghan Border Police ( ABP ), and Afghan Uniform Police (AUP), is also a significant challenge to the legitimacy of the ANSF with the
Proceedings of Border Institute VI: transboundary ecosystem management
D. Rick Van Schoik
2005-01-01
Ecosystems are bisected by international borders along the United States-Mexican border; infrastructure and the heightened security activities bisect the north-south cores, corridors, and buffers essential to preservation of ecosystems. The Southwest Consortium for Environmental Research and Policy (SCERP) and its partners convened an annual policy conference, Border...
Homeland Security: A Selected Bibliography
2011-04-01
ProQuest Witzleb, Robert W., and Scott C . Truver. "Not Just a Bad Hair Day." [underwater mines] Proceedings: U.S. Naval Institute 134, no. 10...SAR) 18. NUMBER OF PAGES 35 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT unclassified c . THIS PAGE unclassified...IP_15_09_MigrationAndBorderSecurity.pdf Haddal, Chad C . Border Security: Key Agencies and Their Missions. Washington, DC: Library of Congress, Congressional Research Service
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-02
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation and Approval of Coastal Gulf and International, Inc. as a Commercial Gauger and Laboratory AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of Coastal Gulf and...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-08
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation and Approval of Amspec Services LLC, as a Commercial Gauger and Laboratory AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of Amspec Services LLC, as a...
77 FR 34055 - Accreditation and Approval of Saybolt LP, as a Commercial Gauger and Laboratory
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-08
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation and Approval of Saybolt LP, as a Commercial Gauger and Laboratory AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of Saybolt LP, as a commercial...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-21
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation and Approval of Amspec Services LLC, as a Commercial Gauger and Laboratory AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of Amspec Services LLC, as a...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-21
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation and Approval of Amspec Services LLC, as a Commercial Gauger and Laboratory AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of Amspec Services LLC, as a...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-06
... DEPARTMENT OF HOMELAND SECURITY Bureau of Customs and Border Protection Re-Accreditation and Re... Border Protection, Department of Homeland Security. ACTION: Notice of re-approval of Intertek Testing..., Texas 78406, has been re-approved to gauge petroleum and petroleum products, organic chemicals and...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-19
... DEPARTMENT OF HOMELAND SECURITY Bureau of Customs and Border Protection Re-Accreditation and Re... Customs and Border Protection, Department of Homeland Security. ACTION: Notice of re-approval of..., has been re- approved to gauge petroleum and petroleum products, organic chemicals and vegetable oils...
2016-11-01
in the FY2017 NDAA Congressional Research Service Summary During the lame duck session, the 114th Congress is expected to consider various...the lame duck session beginning in November is expected to address the NDAA conference report. Security cooperation provisions in the conference report...U.S. security assistance authorities, see Defense Security Cooperation Agency (DSCA), Defense Institute of Security Cooperation Studies , “Chapter 2
Border Security: The Role of the U.S. Border Patrol
2010-08-11
officials have jointly administered this program to return at least 82,558 Mexican nationals from the Arizona- Sonora desert to the interior of Mexico ...international borders with Mexico and Canada and the coastal waters around Florida and Puerto Rico. However, there are significant geographic...political, and immigration-related differences between the northern border with Canada and the Southwest border with Mexico . Accordingly, the USBP deploys
77 FR 5521 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-03
... recommendations on how to proceed on those topics: The work of the Global Supply Chain Security Air Cargo..., 2011 meeting: The National Supply Chain Security Strategy. The CBP Initiatives of the Customs and Trade Partnership Against Terrorism (C-TPAT) program and Beyond the Border (BTB)--Report by the Global Supply Chain...
ERIC Educational Resources Information Center
Murphy, Garrett
2014-01-01
This brief report summarizes the requirements for undocumented immigrants set forth by the Border Security, Economic Opportunity, and Immigration Modernization Act (S.744). Assuming that S.744 will move forward in Congress, the report also examines issues having to do with certain language, civics and government, and education/training provisions…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-19
... DEPARTMENT OF HOMELAND SECURITY Bureau of Customs and Border Protection Re-Accreditation and Re... Border Protection, Department of Homeland Security. ACTION: Notice of re-approval of SGS North America..., pursuant to 19 CFR 151.13, SGS North America, Inc., Bayonne, New Jersey 07002, has been re-approved to...
OSRP Source Repatriations-Case Studies: Brazil, Ecuador, Uruguay
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greenberg, Ray Jr.; Abeyta, Cristy; Matzke, Jim
2012-07-01
The Global Threat Reduction Initiative's (GTRI) Offsite Source Recovery Project (OSRP) began recovering excess and unwanted radioactive sealed sources (sources) in 1999. As of February 2012, the project had recovered over 30,000 sources totaling over 820,000 Ci. OSRP grew out of early efforts at Los Alamos National Laboratory (LANL) to recover disused excess Plutonium- 239 (Pu-239) sources that were distributed in the 1960's and 1970's under the Atoms for Peace Program. Source recovery was initially considered a waste management activity. However, after the 9/11 terrorist attacks, the interagency community began to recognize that excess and unwanted radioactive sealed sources posemore » a national security threat, particularly those that lack a disposition path. After OSRP's transfer to the U.S. National Nuclear Security Administration (NNSA) to be part of GTRI, its mission was expanded to include all disused sealed sources that might require national security consideration. Recognizing the transnational threat posed by porous borders and the ubiquitous nature of sources, GTRI/OSRP repatriates U.S. origin sources based on threat reduction prioritization criteria. For example, several recent challenging source repatriation missions have been conducted by GTRI/OSRP in South America. These include the repatriation of a significant amount of Cs-137 and other isotopes from Brazil; re-packaging of conditioned Ra-226 sources in Ecuador for future repatriation; and, multilateral cooperation in the consolidation and export of Canadian, US, and Indian Co-60/Cs-137 sources from Uruguay. In addition, cooperation with regulators and private source owners in other countries presents opportunities for GTRI/OSRP to exchange best practices for managing disused sources. These positive experiences often result in long-term cooperation and information sharing with key foreign counterparts. International source recovery operations are essential to the preservation of U.S. national security interests. They are also mutually beneficial for fostering positive relationships with other governments and private industry, and demonstrate that responsible end-of-life options are given to legacy U.S.-origin sources in other countries. GTRI/OSRP does not take back sources that have a viable path for commercial disposal. Most US origin sources were sold commercially and were not provided by the US government. Below is a synopsis of cooperative efforts with Brazil, Ecuador, and Uruguay. Bilateral and multilateral efforts have been successful in removing hundreds of U.S.origin sealed radioactive sources from Latin American countries to the U.S. As many disused sources remain in the region, and since repatriation is not always an option, GTRI will continue to work with those countries to ensure that these sources are stored securely for the long-term. Successful Latin America operations should serve as a model for other regional cooperation in the repatriation of sealed sources, encouraging other source exporting countries to implement similar programs. Securing and removing sources, both domestically and internationally, is crucial to strengthening the life-cycle management of radioactive sources worldwide. Such efforts not only prevent these materials from being used maliciously, but also address public health and safety concerns, and under-gird the IAEA Code of Conduct on the Safety and Security of Radioactive Sources. (authors)« less
Smart border: ad-hoc wireless sensor networks for border surveillance
NASA Astrophysics Data System (ADS)
He, Jun; Fallahi, Mahmoud; Norwood, Robert A.; Peyghambarian, Nasser
2011-06-01
Wireless sensor networks have been proposed as promising candidates to provide automated monitoring, target tracking, and intrusion detection for border surveillance. In this paper, we demonstrate an ad-hoc wireless sensor network system for border surveillance. The network consists of heterogeneously autonomous sensor nodes that distributively cooperate with each other to enable a smart border in remote areas. This paper also presents energy-aware and sleeping algorithms designed to maximize the operating lifetime of the deployed sensor network. Lessons learned in building the network and important findings from field experiments are shared in the paper.
Border Security: The Role of the U.S. Border Patrol
2010-07-30
least 82,558 Mexican nationals from the Arizona- Sonora desert to the interior of Mexico .52 Program renewal for FY2010 has not yet been announced...international borders with Mexico and Canada and the coastal waters around Florida and Puerto Rico. However, there are significant geographic...political, and immigration-related differences between the northern border with Canada and the southwest border with Mexico . Accordingly, the USBP deploys a
76 FR 61950 - Security Zones, 2011 Asia-Pacific Economic Cooperation Conference, Oahu, HI
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-06
...-AA87 Security Zones, 2011 Asia-Pacific Economic Cooperation Conference, Oahu, HI AGENCY: Coast Guard... of the Asia-Pacific Economic Cooperation (APEC) conference in Oahu, Hawaii. The establishment of... necessary security measures required for the Asia-Pacific Economic Cooperation conference held on Oahu. We...
Globalization and Health at the United States–Mexico Border
Homedes, Núria; Ugalde, Antonio
2003-01-01
Objectives. We studied the impact of globalization on the making of health policy. Globalization is understood as economic interdependence among nations. The North American Free Trade Agreement is used as a marker to assess the effects of economic interdependence on binational health cooperation along the United States–Mexico border. Methods. We observed participants and conducted in-depth interviews with policymakers, public health specialists, representatives of professional organizations, and unions. Results. Globalization has not promoted binational health policy cooperation. Barriers that keep US and Mexican policymakers apart prevail while health problems that do not recognize international borders go unresolved. Conclusions. If international health problems are to be solved, political, cultural, and social interdependence need to be built with the same impetus by which policymakers promote international trade. PMID:14652325
Rogers, Kimberly; Ward, Sarah; Ojo, Olubumni; Kakaī, Clement Glele; Agbeko, Tamekloe Tsidi; Garba, Hassan; MacGurn, Amanda; Oppert, Marydale; Kone, Idrissa; Bamsa, Olutola; Schneider, Dana; Brown, Clive
2017-01-01
Recent multinational disease outbreaks demonstrate the risk of disease spreading globally before public health systems can respond to an event. To ensure global health security, countries need robust multisectoral systems to rapidly detect and respond to domestic or imported communicable diseases. The US Centers for Disease Control and Prevention International Border Team works with the governments of Nigeria, Togo, and Benin, along with Pro-Health International and the Abidjan-Lagos Corridor Organization, to build sustainable International Health Regulations capacities at points of entry (POEs) and along border regions. Together, we strengthen comprehensive national and regional border health systems by developing public health emergency response plans for POEs, conducting qualitative assessments of public health preparedness and response capacities at ground crossings, integrating internationally mobile populations into national health surveillance systems, and formalizing cross-border public health coordination. Achieving comprehensive national and regional border health capacity, which advances overall global health security, necessitates multisectoral dedication to the aforementioned components. PMID:29155668
Merrill, Rebecca D; Rogers, Kimberly; Ward, Sarah; Ojo, Olubumni; Kakaī, Clement Glele; Agbeko, Tamekloe Tsidi; Garba, Hassan; MacGurn, Amanda; Oppert, Marydale; Kone, Idrissa; Bamsa, Olutola; Schneider, Dana; Brown, Clive
2017-12-01
Recent multinational disease outbreaks demonstrate the risk of disease spreading globally before public health systems can respond to an event. To ensure global health security, countries need robust multisectoral systems to rapidly detect and respond to domestic or imported communicable diseases. The US Centers for Disease Control and Prevention International Border Team works with the governments of Nigeria, Togo, and Benin, along with Pro-Health International and the Abidjan-Lagos Corridor Organization, to build sustainable International Health Regulations capacities at points of entry (POEs) and along border regions. Together, we strengthen comprehensive national and regional border health systems by developing public health emergency response plans for POEs, conducting qualitative assessments of public health preparedness and response capacities at ground crossings, integrating internationally mobile populations into national health surveillance systems, and formalizing cross-border public health coordination. Achieving comprehensive national and regional border health capacity, which advances overall global health security, necessitates multisectoral dedication to the aforementioned components.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Medeiros, Eduardo, E-mail: emedeiros@campus.ul.pt
The use of territorial impact assessment procedures is gaining increasing relevance in the European Union policy evaluation processes. However, no concrete territorial impact assessment tools have been applied to evaluating EU cross-border programmes. In this light, this article provides a pioneering analysis on how to make use of territorial impact assessment procedures on cross-border programmes. More specifically, it assesses the main territorial impacts of the Inner Scandinavian INTERREG-A sub-programme, in the last 20 years (1996–2016). It focuses on its impacts on reducing the barrier effect, in all its main dimensions, posed by the presence of the administrative border. The resultsmore » indicate a quite positive impact of the analysed cross-border cooperation programme, in reducing the barrier effect in all its main dimensions. The obtained potential impact values for each analysed dimension indicate, however, that the ‘economy-technology’ dimension was particularly favoured, following its strategic intervention focus in stimulating the economic activity and the attractiveness of the border area. - Highlights: • A territorial impact assessment method to assess cross-border cooperation is proposed. • This method rationale is based on the main dimensions of the barrier effect. • This method identified positive impacts in all analysed dimensions. • The economy-technological dimension was the most positively impacted one.« less
People Crossing Borders: An Analysis of U.S. Border Protection Policies
2010-05-13
evaluate the policies that have been pursued in providing border protection, especially as these policies might impact other elements of the U.S. border...evaluate the impact of the current framework. Lastly, this report offers some policy options—both short-term and long-term—for addressing the...to account for the commercial consequences of ever-climbing levels of security at the U.S. border. In the end, balancing the economic impact of
A cooperative model for IS security risk management in distributed environment.
Feng, Nan; Zheng, Chundong
2014-01-01
Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of certain securities of cooperative apartment houses from section 15(a). 240.15a-2 Section 240.15a-2 Commodity and... Securities from Section 15(a) § 240.15a-2 Exemption of certain securities of cooperative apartment houses...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Exemption of certain securities of cooperative apartment houses from section 15(a). 240.15a-2 Section 240.15a-2 Commodity and... Securities from Section 15(a) § 240.15a-2 Exemption of certain securities of cooperative apartment houses...
Environmental health and hazardous waste issues related to the U.S.-Mexico border.
Carter, D E; Peña, C; Varady, R; Suk, W A
1996-01-01
Environmental health and environmental quality issues along the U.S.-Mexico border have been of concern for several years. The enactment of the North American Free Trade Agreement and the presence of the maquiladoras (foreign-owned industries using imported raw materials) have intensified those concerns recently. Efforts to assess these issues are complicated by the fact that many of the issues affecting the border region are within federal jurisdiction, but the problems are regional and local in nature. Thus, state and local governments become involved with public concerns about real and potential problems. One major problem is that environmental health data from this region are lacking, particularly from Mexico. Some new agencies such as the Border Environment Cooperation Commission, the United States-Mexico Border Health Commission, and the North American Commission on Environmental Cooperation have joined several existing agencies at the federal and state level to address environmental quality and health. Several studies have been initiated to determine air and water quality, but little is being done in the areas of hazardous waste and health assessment. Several problems are anticipated in the generation of such data, such as its format and accessibility. Data gaps and research needs are discussed. PMID:8793340
The Value of Doctrine for a Developing Organization
2009-12-01
increasingly public topic since the events of September 11, 2001. Customs and Border Protection (CBP) is one of the Department of Homeland Security’s...CBP was created, the majority of the existing organization came from two legacy agencies, U.S. Customs and the Immigration and Naturalization Service...Collaboration, Merger, Trust, Customs And Border Protection, CBP 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY
Border Security: A Journey Without a Destination
2013-12-01
states and the federal government are, to a significant extent, defined by the United States Constitution and relevant case law .”77 Historically...government can invoke the “supremacy clause” of the Constitution , which can preempt state law . The federal government cited the supremacy clause in their...local governments have all defined what constitutes a secure border differently, which makes the measurement of success or failure virtually
U.S.-CHINA RADIOLOGICAL SOURCE SECURITY PROJECT: CONTINUING AND EXPANDING BILATERAL COOPERATION
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun
2009-10-07
The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy’s National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic andmore » beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-29
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs And Border Protection Agency Information Collection Activities: United States- Caribbean Basin Trade Partnership Act AGENCY: U.S. Customs and Border Protection... respondent burden, U.S. Customs and Border (CBP) invites the general public and other Federal agencies to...
75 FR 42115 - Agency Information Collection Activities: Passenger and Crew Manifest
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-20
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Passenger and Crew Manifest AGENCY: U.S. Customs and Border Protection, Department of Homeland....S. Customs and Border (CBP) invites the general public and other Federal agencies to comment on an...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-18
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection U.S. Customs and Border Protection 2013 East Coast Trade Symposium: ``Increasing Economic Competitiveness Through Global Partnership..., 2013. The theme for the 2013 East Coast Trade Symposium will be ``Increasing Economic Competitiveness...
Worldwide Emerging Environmental Issues Affecting the U.S. Military. September 2008 Report
2008-09-01
Anticipation and Response System…………………………………………..1 Item 3. First EU-Central Asia Security Forum Included Environmental Security………….2 Item 4. Indonesian ...back seat at EU-Central Asia talks http://euobserver.com/9/26778/?rk=1 Item 4. Indonesian Navy to Tighten Security in Sea Border Areas The... Indonesian Navy announced that it will tighten security in its eastern and western sea border areas to support law enforcement efforts at sea for
Border Security: Barriers Along the U.S. International Border
2009-03-16
1980). 120 Mexican Government Press Release, “Crecimiento con Calidad: El Presidente Vicente Fox encabezará la cena de gala de la XI Cumbre Anual...and Roads at Various Project Areas Located in California, Arizona, New Mexico , and Texas...Diego Border Primary Fence The USBP’s San Diego sector extends along the first 66 miles from the Pacific Ocean of the international border with Mexico
Borders and Borderlands in the Americas
2012-08-01
were the risk of violence is high. Cases considered by the project included the Venezuela-Colombia border, the Ecuador -Colombia border, and the U.S...national border security responsibilities.31 For example, in the case of Ecuador , the army deliberately avoids confrontations with Colombian insurgents...that may be useful for explaining the current policies and practices we observe in the 2 Americas. The cases considered also look backwards in
Speaker Verification Using SVM
2010-11-01
application the required resources are provided by the phone itself. Speaker recognition can be used in many areas, like: • homeland security: airport ... security , strengthening the national borders, in travel documents, visas; • enterprise-wide network security infrastructures; • secure electronic
van den Heuvel, D; Veer, A; Greuel, H-W
2014-01-01
To cover future needs of specialised geriatric patient-centred care, existing structures need to be developed further. Taking into account regional structures of providing care, the Federal Association of Geriatric Medicine in Germany developed the concept of Cross-Border Cooperation in Geriatric Medicine. This concept combines specific geriatric expertise provided by inpatient health care with specialised networking in ambulatory treatment of elderly with a typical geriatric profile. The objective is to provide geriatric patients with a holistic and specific care and case management that overcomes existing limitations.
A Cooperative Model for IS Security Risk Management in Distributed Environment
Zheng, Chundong
2014-01-01
Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively. PMID:24563626
2010-03-17
the sole "superpower" and once again changed the international security paradigm. Finally, on September 11, 2001, a terrorist attack on the U.S. by...be employed in the near term in order to improve operations in today’s security environment. Cooperative security is intended to change how militruy...default. However, the changing world security environment has dictated that the U.S. avoids any actions that could be perceived as heavy-handed
Southern Border Security Act of 2010
Rep. Kirkpatrick, Ann [D-AZ-1
2010-05-11
House - 05/13/2010 Referred to the Subcommittee on Border, Maritime, and Global Counterterrorism. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Tiahrt, Todd [R-KS-4
2010-04-28
House - 05/05/2010 Referred to the Subcommittee on Border, Maritime, and Global Counterterrorism. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Nicholas Palso
2009-01-01
This study explores the attitudes and feelings of self-drive tourists who cross the Alaska-Canada border about the increased security requirements of the Western Hemisphere Travel Initiative (WHTI), and how such attitudes and feelings may impact the tourism industry in this region. Results of a 2007 survey suggest that implementation of passport requirements will have...
Survey of Commercial Technologies for Face Recognition in Video
2014-09-01
by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety Canada. Led by Canada Border Services...Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2014 Science and Engineering Directorate Border...Objectives CO1 – Engage in rapid assessment, transition and deployment of innovative technologies for public safety and security practitioners to achieve
Border Security Search Accountability Act of 2011
Rep. Sanchez, Loretta [D-CA-47
2011-01-07
House - 01/31/2011 Referred to the Subcommittee on Border, Maritime, and Global Counterterrorism. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-10
... improved personal radiation detectors (PRD), RIDs, and NII tools, such as high-energy container scanners... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Availability of the... Border Activities AGENCY: U.S. Customs and Border, Protection, DHS. ACTION: Notice of availability...
United States Border Security and Reserve Component Forces
2007-03-15
and the thirteen mile border between San Diego and Tijuana , Mexico. The Border Patrol increased the number of agents from 3,389 in 1993 to 6,213 in...that assemble goods for exportation, known as the “ maquilas ,” to relocate to Mexico’s interior and southern regions.30 The infrastructure problems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-20
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection U.S. Customs and Border Protection 2014 East Coast Trade Symposium: ``Increasing Economic Competitiveness Through Global Partnership... Competitiveness Through Global Partnership and Innovation.'' The format of the East Coast Trade Symposium will be...
19 CFR 122.182 - Security provisions.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 19 Customs Duties 1 2014-04-01 2014-04-01 false Security provisions. 122.182 Section 122.182 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.182 Security provisions. (a...
19 CFR 122.182 - Security provisions.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 19 Customs Duties 1 2013-04-01 2013-04-01 false Security provisions. 122.182 Section 122.182 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.182 Security provisions. (a...
19 CFR 122.182 - Security provisions.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 19 Customs Duties 1 2012-04-01 2012-04-01 false Security provisions. 122.182 Section 122.182 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.182 Security provisions. (a...
Border Sovereignty and Protection Act
Rep. Hunter, Duncan D. [R-CA-52
2009-04-23
House - 05/26/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
National Border and Homeland Security Act of 2010
Rep. Franks, Trent [R-AZ-2
2010-07-01
House - 07/14/2010 Referred to the Subcommittee on Border, Maritime, and Global Counterterrorism. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Managing US-Mexico "border health": an organizational field approach.
Collins-Dogrul, Julie
2006-12-01
During World War II Mexican and US health professionals and organizations constructed a transnational organizational field to manage the border's public health problems. Despite barriers to inter-organizational cooperation, including disparate administrative structures and North-South stratification, the field's transnational approach to health on the border has continued for 60 years. Using archival data to track changes in the number and types of organizations, this article argues that the field practitioners call "border health" reconfigured during the North American Free Trade Association (NAFTA) decade from an era of loosely organized professionals to a specialized bureaucracies era. This change brought new vitality to border health, with transnational ties increasing and diversifying, but has not weakened entrenched cross-border inequalities. The organizational history of the US-Mexico border health field demonstrates how macro-politics and inter-organizational stratification shape transnational public health problems.
ERIC Educational Resources Information Center
Skagen, Kiki, Ed.
Nine papers comprise the proceedings from the conference on cultural interdependence between the border regions of San Diego, California, and Tijuana, Mexico. The papers discuss the following: (1) insurgence of the Southwest's Spanish-speaking minority since 1960; (2) opportunities for cooperation between the United States and Mexican governments;…
Exploring Binational Educational Issues: A Report from the Border Colloquy Project.
ERIC Educational Resources Information Center
Mace-Matluck, Betty; Boethel, Martha
"La frontera" is the unique, highly interdependent region spanning the boundary between the United States and Mexico. As this region develops into a zone of cooperation, it must address such issues as poverty and unemployment on both sides of the border, differing educational requirements and structures, continuing migration of Mexican…
ERIC Educational Resources Information Center
Kozma, Tamas; Radacsi, Imre
2000-01-01
Addresses the problem of educating minorities when the political borders of European nation-states fail to coincide with ethno-linguistic realities. Suggests two solutions to problems of higher education for ethno-linguistic minorities: (1) multilingual universities, and (2) regional cooperation in higher education in border areas. (Author/DB)
Assessment of the Office of Security Cooperation-Iraq Mission Capabilities
2013-09-18
and report and other activities conducted by the Office of Special Plans & Operations to spo@dodig.mil Defense Hotline, The Pentagon ... Defense for Policy, U.S. Cenh·al Command, Joint Staff, and Defense Security Cooperation Agency responses when preparing the final repmt. Please...of Department of Defense support for executing security cooperation programs in Iraq and whether the Office of Security
2014-10-01
Views September–October 2014 Air & Space Power Journal | 92 Aviation Security Cooperation Advancing Global Vigilance, Global Reach, and Global Power...2014 to 00-00-2014 4. TITLE AND SUBTITLE Aviation Security Cooperation: Advancing Global Vigilance, Global Reach, and Global Power in a Dynamic
Rep. Myrick, Sue Wilkins [R-NC-9
2009-01-15
House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Employing U.S. Army Special Forces to Defeat America’s Emerging Threats
2013-04-01
GPF operation which is primarily focused on improving allied and host nation security force capacity.36 In 2004, the El Salvadorian Ambassador to...forces to Haiti to conduct Stability Operations following their devastating earthquakes . Operation Unified Quest, led by LTG Ken Keen included personnel...U.S. Border Patrol (point of entry and border security operations), 95th Civil Affairs Brigade (Civil Affairs related activities), El Paso and Austin
Infectious Disease Border Issues Conference: Meeting Synopsis
2012-04-03
methicillin - resistant Staphylococcus aureus (MRSA). Operation MECACAR 1998 was highlighted as a successful example of cross-border coordination...training courses, no joint public health investigation teams) and illegal animal transportation across borders were identified as some of the existing...Work (2007), including fostering global partnerships; strengthening public health security in travel and transport ; improving the WHO global alert
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-30
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection U.S. Customs and Border Protection 2012 East Coast Trade Symposium: ``Expanding 21st Century Global Partnerships'' AGENCY: U.S... 21st Century Global Partnerships.'' The format of this year's East Coast Symposium will be held with...
DOT National Transportation Integrated Search
2011-09-01
The United States and Canada share the largest bi-national trading relationship in the world. An efficient and cost-effective border crossing system for both freight and passenger vehicle traffic is thus vital to the economic well-being and security ...
DOD Security Cooperation: An Overview of Authorities and Issues
2016-08-23
Cooperation: An Overview of Authorities and Issues Congressional Research Service 13 DOD funds six Regional Centers for Security Studies , which...Expenses Necessary for Theater Security Cooperation.” Another Senate proposal would revamp DOD’s five regional centers for security studies (10 U.S.C...184) by eliminating two that are located in Washington, DC (the Africa Center for Strategic Studies and the Near East South Asia Center for Strategic
78 FR 11671 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-19
... Term. 5. Discuss the Statement of Work and Next Steps regarding the Global Supply Chain Subcommittee... and Border Protection, Department of Homeland Security (DHS). ACTION: Committee Management; Notice of...
Border Reinforcement and Violence Reduction Act of 2009
Rep. Rodriguez, Ciro D. [D-TX-23
2009-03-11
House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
SMART Security Cooperation Objectives: Improving DoD Planning and Guidance
2016-01-01
integrate them into a system for assessing, monitoring, and evaluating security cooperation programs and activities. This report evaluates DoD’s...effectiveness in developing SMART security coopera- tion objectives that facilitate assessment, monitoring, and evaluation . It also proposes a systematic...Cooperation Ends, Ways, and Means . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 RAND Evaluation and Revision of Selected
MERCURY-ATLAS (MA)-9 - ASTRONAUT COOPER - EARTH-SKY VIEW - INDIA
1963-05-16
S63-06445 (15-16 May 1963) --- View of the Himalaya Mountain Range in the India-Nepal-Tibet border area, as photographed from the Mercury-Atlas 9 capsule by astronaut L. Gordon Cooper Jr., during his 22-orbit MA-9 spaceflight. Photo credit: NASA
Beyond Kargil: The technology of peace in India-Pakistan border relations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tahir-Kheli, S.; Biringer, K.L.
2000-01-12
The potential for cooperation between India and Pakistan is substantial. Topics as widely varying as national security, the environment and trade hold the potential for improved bilateral relations. This paper looks at a few areas in which monitoring technology could contribute to enhancing cooperative border agreements between the two nations. The goal of the paper is not to provide prescriptive solutions to regional problems, but to expand the number of options being considered for improving Indian-Pakistan relations. Many of the impediments to bilateral progress are a result of a history of conflict and mistrust. By utilizing technical monitoring and inspections,more » each side can begin to replace suspicion and doubt with knowledge and information useful in making informed political, economic and military decisions. At the same time, technical monitoring and inspections can build confidence through common interactions. India and Pakistan have pledged to resolve their disputes, including Kashmir, through dialogue. Implementation of that pledge is influenced by a number of factors, including changes in the political systems and the fortunes of the leadership. Events of the past year and a half have severely tested these two governments' ability to move forward along a constructive and positive path. Testing of new missile systems both preceded and followed testing of nuclear weapons in May 1998. Both countries disregarded subsequent international displeasure as they proceeded to openly declare their respective nuclear capability. Their brief engagement with each other in February 1999 and movement toward a rapprochement diluted international condemnation of their nuclear activity. Within a recent period of nine months however, progress in the dialogue has been stalled first by the Pakistani move in Kashmir in May 1999, then by the Indian election in the summer of 1999 and most recently by the military coup in Pakistan.« less
National wildlife refuge management on the United States/Mexico border
William R. Radke
2013-01-01
Many conservation strategies have been developed by the U.S. Fish and Wildlife Service in cooperation with others to protect habitat and enhance the recovery of fish and wildlife populations in the San Bernardino Valley, which straddles Arizona, United States, and Sonora, Mexico. Habitats along this international border have been impacted by illegal activities,...
System architecture of communication infrastructures for PPDR organisations
NASA Astrophysics Data System (ADS)
Müller, Wilmuth
2017-04-01
The growing number of events affecting public safety and security (PS and S) on a regional scale with potential to grow up to large scale cross border disasters puts an increased pressure on organizations responsible for PS and S. In order to respond timely and in an adequate manner to such events Public Protection and Disaster Relief (PPDR) organizations need to cooperate, align their procedures and activities, share the needed information and be interoperable. Existing PPDR/PMR technologies do not provide broadband capability, which is a major limitation in supporting new services hence new information flows and currently they have no successor. There is also no known standard that addresses interoperability of these technologies. The paper at hands provides an approach to tackle the above mentioned aspects by defining an Enterprise Architecture (EA) of PPDR organizations and a System Architecture of next generation PPDR communication networks for a variety of applications and services on broadband networks, including the ability of inter-system, inter-agency and cross-border operations. The Open Safety and Security Architecture Framework (OSSAF) provides a framework and approach to coordinate the perspectives of different types of stakeholders within a PS and S organization. It aims at bridging the silos in the chain of commands and on leveraging interoperability between PPDR organizations. The framework incorporates concepts of several mature enterprise architecture frameworks including the NATO Architecture Framework (NAF). However, OSSAF is not providing details on how NAF should be used for describing the OSSAF perspectives and views. In this contribution a mapping of the NAF elements to the OSSAF views is provided. Based on this mapping, an EA of PPDR organizations with a focus on communication infrastructure related capabilities is presented. Following the capability modeling, a system architecture for secure and interoperable communication infrastructures for PPDR organizations is presented. This architecture was implemented within a project sponsored by the European Union and successfully demonstrated in a live validation exercise in June 2016.
Securing the Borders: Creation of the Border Patrol Auxiliary
2007-05-05
auxiliary members will be the elite members of the BPA who will attend training at the Border Patrol Academy to gain the knowledge and skills required to...recruits and greatly reducing start-up costs for the Border Patrol. It would appeal directly to ideal candidates for the elite tier-two service: new...program, which is a small, elite , and highly selective service. Tier-two members will have to be recruited from specific target populations. Based on the
Crisis in Mexico: Assessing the Merida Initiative and its Impact on Us-Mexican Security
2009-04-01
s poor economic conditions to extort large amounts of cash from individuals wishing to cross the US-Mexican border in search of a job and a better...people crossed the US-Mexican border illegally in 2001. 31 The US State Department‟s Trafficking in Persons Report classifies Mexico as a Tier 2 in...southern borders. 33 Mexico estimates that approximately 400,000 illegal immigrants cross the Mexican-Guatemalan border each year. President
Code of Federal Regulations, 2010 CFR
2010-10-01
... to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Transportation of... determines is not known or is a threat to security. (e) At the border. (1) Train crew members who are not U.S...
Feasibility Analysis of Developing Cross-border Network Education in China
NASA Astrophysics Data System (ADS)
Lan, Jun
In the era of economic globalization, strengthen of international cooperation on network education is a general trend. Although China has not made commitments about the market access and national treatment of cross-border supply in Schedule of Specific Commitments on Services, the basic conditions of network education development in China have been met. The Chinese government should formulate strategies for the development of cross-border network education and take relevant measures to implement them. In the near future, the carrying out of cross-border network education in China will become an irreversible trend, and will possess broad prospect with the advance of globalization of Chinese education.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 19 Customs Duties 1 2014-04-01 2014-04-01 false Security. 19.47 Section 19.47 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.47 Security. The...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 19 Customs Duties 1 2012-04-01 2012-04-01 false Security. 19.47 Section 19.47 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.47 Security. The...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Security. 19.47 Section 19.47 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.47 Security. The...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 19 Customs Duties 1 2013-04-01 2013-04-01 false Security. 19.47 Section 19.47 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.47 Security. The...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 1 2011-04-01 2011-04-01 false Security. 19.47 Section 19.47 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.47 Security. The...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pregenzer, Arian Leigh
2011-12-01
The United States and China are committed to cooperation to address the challenges of the next century. Technical cooperation, building on a long tradition of technical exchange between the two countries, can play an important role. This paper focuses on technical cooperation between the United States and China in the areas of nonproliferation, arms control and other nuclear security topics. It reviews cooperation during the 1990s on nonproliferation and arms control under the U.S.-China Arms Control Exchange, discusses examples of ongoing activities under the Peaceful Uses of Technology Agreement to enhance security of nuclear and radiological material, and suggests opportunitiesmore » for expanding technical cooperation between the defense nuclear laboratories of both countries to address a broader range of nuclear security topics.« less
Analysis of Three Frameworks for Quality Assurance in Sino-Foreign Cooperation for Running Schools
ERIC Educational Resources Information Center
Chaocheng, Zhou
2009-01-01
As economic globalization sweeps across the world, cross-border higher education cooperation has witnessed remarkable achievements. Quality improvements, however, have not stepped up accordingly due to reasons including imperfect and distorted policies, incomplete governance structures, and the absence of an effective internal quality assessment…
BRICS and International Collaborations in Higher Education in India
ERIC Educational Resources Information Center
Varghese, N. V.
2015-01-01
International cooperation and collaborations played an important role in the economic and educational development of several countries. In the 1950s and 1960s external aid was an important modality to establish cooperation between countries, especially between developing and developed countries. Cross-border activities in higher education used to…
46 CFR 7.150 - Canadian (BC) and United States (AK) Borders to Cape Spencer, AK.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Canadian (BC) and United States (AK) Borders to Cape Spencer, AK. 7.150 Section 7.150 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC BOUNDARY LINES Alaska § 7.150 Canadian (BC) and United States (AK) Borders to Cape...
46 CFR 7.150 - Canadian (BC) and United States (AK) Borders to Cape Spencer, AK.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Canadian (BC) and United States (AK) Borders to Cape Spencer, AK. 7.150 Section 7.150 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC BOUNDARY LINES Alaska § 7.150 Canadian (BC) and United States (AK) Borders to Cape...
46 CFR 7.150 - Canadian (BC) and United States (AK) Borders to Cape Spencer, AK.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 1 2014-10-01 2014-10-01 false Canadian (BC) and United States (AK) Borders to Cape Spencer, AK. 7.150 Section 7.150 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC BOUNDARY LINES Alaska § 7.150 Canadian (BC) and United States (AK) Borders to Cape...
46 CFR 7.150 - Canadian (BC) and United States (AK) Borders to Cape Spencer, AK.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Canadian (BC) and United States (AK) Borders to Cape Spencer, AK. 7.150 Section 7.150 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC BOUNDARY LINES Alaska § 7.150 Canadian (BC) and United States (AK) Borders to Cape...
46 CFR 7.150 - Canadian (BC) and United States (AK) Borders to Cape Spencer, AK.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Canadian (BC) and United States (AK) Borders to Cape Spencer, AK. 7.150 Section 7.150 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC BOUNDARY LINES Alaska § 7.150 Canadian (BC) and United States (AK) Borders to Cape...
Improving food security empowerment in Indonesia- Timor Leste border
NASA Astrophysics Data System (ADS)
Dewi, G. D. P.; Yustikaningrum, R. V.
2018-03-01
Post Referendum 1999, Indonesia and Timor Leste have a strategic challenge to provide food consistently around the border. This research intended to discover an appropriate strategy to tackle fragility of food security in the land border of Indonesia-Timor Leste, to improve collaborative actions between parties, as well as, opportunity to actualize food cross-border trading between local farmers and factories. For the result, there are two approaches will be applied. First, the empowerment term refers to the strategy of empowerment in strengthening the capability and capacity of human capital as one of the determinant factors of the resilience and self-sufficiency achievement. Second, the gender approach looks at the women and men build confidence, resilience, and independence which one of them through an educational intervention that enable the local people to manage food chain. Atambua is a region count as relatively as high poverty, poor human capital, weak quality and competitiveness of agriculture products, livestock and fishery, SMEs, and infrastructure. Thus, field study research is applied to find the actual and strategic effort aim to lead the achievement of food security and to engage Atambua over food trade to Timor Leste.
Su, Yishan; Han, Guangyao; Fu, Xiaomei; Xu, Naishen; Jin, Zhigang
2017-04-06
Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel must be better than the eavesdropper channel. To alleviate the limitation, cooperative communication is introduced. Few studies have investigated the physical layer security of the relay transmission model. In this paper, we performed some experiments to evaluate the physical layer security of a cooperative communication system, with a relay operating in decode-and-forward (DF) cooperative mode, selfish and malicious behavior in real non-ideal transmission environment. Security performance is evaluated in terms of the probability of non-zero secrecy capacity. Experiments showed some different results compared to theoretical simulation: (1) to achieve the maximum secrecy capacity, the optimal relay power according to the experiments result is larger than that of ideal theoretical results under both cooperative and selfish behavior relay; (2) the relay in malicious behavior who forwards noise to deteriorate the main channel may deteriorate the eavesdropper channel more seriously than the main channel; (3) the optimal relay positions under cooperative and selfish behavior relay cases are both located near the destination because of non-ideal transmission.
17 CFR 230.801 - Exemption in connection with a rights offering.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exemption in connection with a rights offering. 230.801 Section 230.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Exemptions for Cross-Border Rights Offerings...
19 CFR 122.181 - Definition of Customs security area.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 19 Customs Duties 1 2014-04-01 2014-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...
19 CFR 122.181 - Definition of Customs security area.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 1 2011-04-01 2011-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...
19 CFR 122.181 - Definition of Customs security area.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 19 Customs Duties 1 2012-04-01 2012-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...
19 CFR 122.181 - Definition of Customs security area.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 19 Customs Duties 1 2013-04-01 2013-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-23
... context of the security-based swap dealer definition, for affiliated groups with a registered security... for Affiliated Groups with Registered Security-Based Swap Dealers); Rule 3a71-5 (Substituted... 13n-12 (Exemption from Requirements Governing Security-Based Swap Data Repositories for Certain Non-U...
ERIC Educational Resources Information Center
Kallo, Johanna; Semchenko, Anzhelika
2016-01-01
This article analyses the localisation of the United Nations Educational Scientific and Cultural Organisation (UNESCO)/Organisation for Economic Co-operation and Development (OECD) "Guidelines for Quality Provision in Cross-Border Higher Education" (2005) at the national and university levels in Finland and Russia. The article engages…
ERIC Educational Resources Information Center
Hacienda La Puente Unified School District, City of Industry, CA.
A cooperative literacy education program involving Mexico and the United States' border states is documented. The project has three objectives: to (1) implement the Mexican literacy agency's approach to promoting literacy among native Spanish speakers; (2) coordinate U.S./Mexico literacy task force activities; and (3) develop an immigrants' rights…
Holmes, Paul; Rijken, Conny; D'Orsi, Sergio; Esser, Luuk; Hol, Floor; Gallagher, Anne; Greenberg, Galit; Helberg, Louis; Horvatits, Lisa; McCarthy, Sean; Ratel, Jonathan; Scheper-Hughes, Nancy; Forsythe, John
2016-02-01
In this short summary report on the legal definition of trafficking in human beings for the purpose of organ removal and improving cross-border collaboration in criminal cases, challenges, and recommendations in the areas of defining the crime, criminal investigation and prosecution, and cross-border cooperation are made. These are the outcomes of a working group discussion during the writers' conference of the HOTT project, a European Union-funded project against trafficking in human beings for the purpose of organ removal.
33 CFR 165.708 - Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Harbor and Cooper River, Charleston, SC. 165.708 Section 165.708 Navigation and Navigable Waters COAST... Guard District § 165.708 Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC. (a... Cooper River. All coordinates referenced use datum: NAD 1983. (2) All waters within 100 yards of the...
Deaths in the Desert: The Human Rights Crisis on the U.S.--Mexico Border
ERIC Educational Resources Information Center
Androff, David K.; Tavassoli, Kyoko Y.
2012-01-01
Many would acknowledge that immigration is a major issue in the United States and that immigration reform should be a priority. However, there is little attention to the human rights crisis on the U.S.-Mexican border. As a result of tightened border security since 1994, it is estimated that over 5,000 migrants have died in the Sonoran desert. The…
Kamenopoulou, Vassiliki; Dimitriou, Panayiotis; Hourdakis, Constantine J; Maltezos, Antonios; Matikas, Theodore; Potiriadis, Constantinos; Camarinopoulos, Leonidas
2006-10-01
In light of the exceptional circumstances that arose from hosting the Olympic Games in Athens in 2004 and from recent terrorist events internationally, Greece attributes the highest priority to security issues. According to its statutory role, the Greek Atomic Energy Commission is responsible for emergency preparedness and response in case of nuclear and radiological events, and advises the Government on the measures and interventions necessary to protect the public. In this context, the Commission participated in the Nuclear, Radiological, Biological, and Chemical Threat National Emergency Plan, specially developed for the Olympic Games, and coordinated by the Olympic Games Security Division. The objective of this paper is to share the experience gained during the organization of the Olympic Games and to present the nuclear security program implemented prior to, during, and beyond the Games, in order to prevent, detect, assess, and respond to the threat of nuclear terrorism. This program adopted a multi-area coverage of nuclear security, including physical protection of nuclear and radiological facilities, prevention of smuggling of radioactive materials through borders, prevention of dispersion of these materials into the Olympic venues, enhancement of emergency preparedness and response to radiological events, upgrading of the technical infrastructure, establishment of new procedures for assessing the threat and responding to radiological incidents, and training personnel belonging to several organizations involved in the National Emergency Response Plan. Finally, the close cooperation of Greek Authorities with the International Atomic Energy Agency and the U.S. Department of Energy, under the coordination of the Greek Atomic Energy Commission, is also discussed.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-08
... DEPARTMENT OF JUSTICE Antitrust Division Notice Pursuant to the National Cooperative Research and Production Act of 1993--Secure Content Storage Association, LLC Notice is hereby given that, on May 3, 2012, pursuant to Section 6(a) of the National Cooperative Research and Production Act of 1993, 15 U.S.C. 4301 et seq. (``the Act''), the Secure...
The Importance of International Technical Nuclear Forensics to Deter Illicit Trafficking
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, D K
2007-01-30
Illicit trafficking of nuclear materials is a transboundary problem that requires a cooperative approach involving international nuclear forensics to ensure all states understand the threat posed by nuclear smuggling as well as a means to best deter the movement of nuclear contraband. To achieve the objectives, all cases involving illicit trafficking of nuclear and radiological materials must be vigorously pursued and prosecuted when appropriate. The importance of outreach and formal government-to-government relationships with partner nations affected by nuclear trafficking cannot be under-estimated. States that are situated on smuggling routes may be well motivated to counter nuclear crimes to bolster theirmore » own border and transportation security as well as strengthen their economic and political viability. National law enforcement and atomic energy agencies in these states are aggressively pursuing a comprehensive strategy to counter nuclear smuggling through increasing reliance on technical nuclear forensics. As part of these activities, it is essential that these organizations be given adequate orientation to the best practices in this emerging discipline including the categorization of interdicted nuclear material, collection of traditional and nuclear forensic evidence, data analysis using optimized analytical protocols, and how to best fuse forensics information with reliable case input to best develop a law enforcement or national security response. The purpose of formalized USG relationship is to establish an institutional framework for collaboration in international forensics, improve standards of forensics practice, conduct joint exercises, and pursue case-work that benefits international security objectives. Just as outreach and formalized relationships are important to cultivate international nuclear forensics, linking nuclear forensics to ongoing national assistance in border and transpiration security, including port of entry of entry monitoring, nuclear safeguards, and emerging civilian nuclear power initiatives including the Global Nuclear Energy Partnership are crucial components of a successful nuclear detection and security architecture. Once illicit shipments of nuclear material are discovered at a border, the immediate next question will be the nature and the source of the material, as well as the identity of the individual(s) involved in the transfer as well as their motivations. The Nuclear Smuggling International Technical Working Group (ITWG) is a forum for the first responder, law enforcement, policy, and diplomatic community to partner with nuclear forensics experts worldwide to identify requirements and develop technical solutions in common. The ITWG was charted in 1996 and since that time approximately 30 member states and organizations have participated in 11 annual international meetings. The ITWG also works closely with the IAEA to provide countries with support for forensic analyses. Priorities include the development of common protocols for the collection of nuclear forensic evidence and laboratory investigations, organization of forensic round-robin analytical exercises and technical forensic assistance to requesting nations. To promote the science of nuclear forensics within the ITWG the Nuclear Forensics Laboratory Group was organized in 2004. A Model Action Plan for nuclear forensics was developed by the ITWG and published as an IAEA Nuclear security Series document to guide member states in their own forensics investigations. Through outreach, formalized partnerships, common approaches and security architectures, and international working groups, nuclear forensics provides an important contribution to promoting nuclear security and accountability.« less
Rep. Smith, Lamar [R-TX-21
2010-03-04
House - 04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Border and Transportation Security: Possible New Directions and Policy Options
2005-03-29
Security: Overview of Issues. See also “ JFK Airport to Receive Walk-Through Explosives Detection Portal,” Homeland Security Monitor, Oct. 26, 2004. In...of integrated security design can be seen at Terminal six at the JFK airport in New York City. Since many airports were originally designed in the
Summary of Independent Assessment of the Afghan National Security Forces
2014-02-01
Afghan National Police (ANP), which are the Afghan Border Police ( ABP ), Afghan National Civil Order Police (ANCOP), Afghan Uniform Police (AUP...intentionally left blank 43 Acronyms AACP Afghan Anti-Crime Police AAF Afghan Air Force ABP Afghan Border Police ALP Afghan
Cook, David C.; Fraser, Rob W.; Paini, Dean R.; Warden, Andrew C.; Lonsdale, W. Mark; De Barro, Paul J.
2011-01-01
The delivery of food security via continued crop yield improvement alone is not an effective food security strategy, and must be supported by pre- and post-border biosecurity policies to guard against perverse outcomes. In the wake of the green revolution, yield gains have been in steady decline, while post-harvest crop losses have increased as a result of insufficiently resourced and uncoordinated efforts to control spoilage throughout global transport and storage networks. This paper focuses on the role that biosecurity is set to play in future food security by preventing both pre- and post-harvest losses, thereby protecting crop yield. We model biosecurity as a food security technology that may complement conventional yield improvement policies if the gains in global farm profits are sufficient to offset the costs of implementation and maintenance. Using phytosanitary measures that slow global spread of the Ug99 strain of wheat stem rust as an example of pre-border biosecurity risk mitigation and combining it with post-border surveillance and invasive alien species control efforts, we estimate global farm profitability may be improved by over US$4.5 billion per annum. PMID:22022517
G. J. Gottfried; C. B. Edminster; Madelyn C. Dillon
1998-01-01
This conference brought together scientists and resource managers from government, universities, and private organizations in the United States and Mexico. In a continuing international forum, participants exchanged information on existing or potential cooperative projects, agency functions and programs, and issues were concerning natural and cultural resource...
ERIC Educational Resources Information Center
Minxuan, Zhang
2009-01-01
Since World War II, the internationalization of education has experienced a change from a period of political influence to a service trade structure. As the Third International Forum on the Educational Service Trade began, more and more governments accepted the concept of cross-border education. At a time when both opportunities and challenges lay…
Border Security: Barriers Along the U.S. International Border
2006-09-21
Mexican Government Press Release, “Crecimiento con Calidad: El Presidente Vicente Fox encabezará la cena de gala de la XI Cumbre Anual Hemispheria San...international border with Mexico , and covers approximately 7,000 square miles of territory. Located north of Tijuana and Tecate, Mexican cities with a...The study concluded that aliens attempting to enter the United States from Mexico had shown remarkable resiliency in bypassing or destroying obstacles
Traveling the Terror Highway: Infiltration of Terror Operatives across the U.S.-Mexico Border
2011-12-01
this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government . IRB...Immigration Advisory Program SWI Southwest Border Initiative FY Fiscal Year GAO Government Accounting Office BEST Border Enforcement Security...for Ecuador . Hassan avoided flying into Venezuela, worried about its heavy focus from the international law enforcement community. Ecuador was
2012-05-22
publication of the Security Cooperation Guidance ( SCG ), 32 U.S. Joint Chiefs of Staff, Joint Operation...format and content of the plans themselves. 2 The 2003 release of the classified SCG , which replaced TEPs with TSCPs, rendered CJCSM 3113.01 obsolete...interests while providing the SecDef increased visibility on and control over security cooperation activities, but the SCG was not as explicit in its
Student Visa Security Improvement Act
Rep. Bilirakis, Gus M. [R-FL-9
2010-05-05
House - 06/15/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
DOT National Transportation Integrated Search
2008-10-01
The Arizona-Sonora border has become increasingly important to both states economy : due to increased trade between the regions following the 1994 passage of the North American : Free Trade Agreement (NAFTA) and the establishment of maquiladora in...
75 FR 70680 - Agency Information Collection Activities: Request for Information
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-18
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Request for Information AGENCY: U.S. Customs and Border Protection, Department of Homeland... information: 1651-0023. SUMMARY: As part of its continuing effort to reduce paperwork and respondent burden...
NASA Astrophysics Data System (ADS)
Lizotte, Todd E.; Ohar, Orest P.
2009-05-01
At a border security conference in August 2008, Michael Sullivan, acting director of Bureau of Alcohol, Tobacco, Firearms and Explosives stated that, "Nearly all illegal firearms (90% to 95%) seized in Mexico come from the United States"[1]. When firearms are recovered at a crime scene, the firearms can be traced providing specific details on illegal firearm dealers or straw purchasers within the United States. Criminals or narco terrorist groups target US dealers to source firearms for drug cartels in Mexico and South America. Joint law enforcement programs between the US and Mexico law enforcement have been effective, however, in most cases the firearms that are seized are only a small fraction of the firearms trafficked across the United States border. A technology called Microstamping, when applied to newly manufactured firearms will provide further opportunities for tracing illegal firearms for law enforcement in the United States and across the globe. Microstamping is a patented technology and trace solution where intentional tooling marks are formed or micromachined onto firearms interior surfaces that come into contact or impact the surfaces of cartridge casings. The intentional tooling marks can take the form of alphanumeric codes or encoded geometric codes, such as a barcode. As the firearm is discharged the intentional tooling marks transfer a code to the cartridge casing before it is ejected out of the firearm. When recovered at the scene of an incident, the Microstamped cartridge can indentify a specific firearm, without the need to recover that firearm. Microstamping provides critical intelligence for use in border security operations and cross border violent drug related crime investigations. This paper will explain the key attributes of microstamping technology; including its potential benefits in border security operations and how data gathered from the technique can be used in geospatial information systems to identify illicit firearm sources, trafficking routes, as well as spatial and temporal mapping of narco-terrorist movements on either side of the border.
U.S.-Canadian Border Security: Lessons Learned from Denmarks Experience with the Schengen Convention
2014-03-01
January 1, 1994, binding the North American continent with similar economic interests and pursuits.10 NAFTA does not deal with security and laws in the...SC). The Department of Homeland Security coordinates U.S. security with representatives from law enforcement, military and civilian entities. Public...European Schengen Convention (SC). The Department of Homeland Security coordinates U.S. security with representatives from law enforcement, military
Border Security Results Act of 2013
Sen. Cornyn, John [R-TX
2013-04-09
Senate - 04/09/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Textile Enforcement and Security Act of 2010
Rep. Kissell, Larry [D-NC-8
2010-05-25
House - 09/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Border Security Enforcement Act of 2010
Sen. McCain, John [R-AZ
2010-05-07
Senate - 05/07/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Border Security Enforcement Act of 2011
Sen. McCain, John [R-AZ
2011-04-13
Senate - 04/13/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Optical benchmarking of security document readers for automated border control
NASA Astrophysics Data System (ADS)
Valentín, Kristián.; Wild, Peter; Å tolc, Svorad; Daubner, Franz; Clabian, Markus
2016-10-01
Authentication and optical verification of travel documents upon crossing borders is of utmost importance for national security. Understanding the workflow and different approaches to ICAO 9303 travel document scanning in passport readers, as well as highlighting normalization issues and designing new methods to achieve better harmonization across inspection devices are key steps for the development of more effective and efficient next- generation passport inspection. This paper presents a survey of state-of-the-art document inspection systems, showcasing results of a document reader challenge investigating 9 devices with regards to optical characteristics.
U.S. Maritime Security: Sustainability Challenges
2011-09-01
Security Council ICE Immigration and Customs Enforcement IOC Interagency Operation Center JHOC Joint Harbor Operation Center JIATF-S Joint...maritime threats into nation threats, transnational criminal and piracy threats, environmental destruction, and illegal seaborne immigration (U.S...safe and secure borders, welcome lawful immigrants and visitors and promote the free-flow of commerce (U.S. Department of Homeland Security, 2011
19 CFR Appendix D to Part 113 - Importer Security Filing Bond
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Importer Security Filing Bond D Appendix D to Part 113 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS Pt. 113, App. D Appendix D to Part 113—Importer Security Filing Bond This...
Shumeta, Zekarias; D'Haese, Marijke
2018-06-01
Most coffee in Ethiopia is produced by smallholder farmers who face a daily struggle to get sufficient income but also to feed their families. At the same time, many smallholder coffee producers are members of cooperatives. Yet, literature has paid little attention to the effect of cooperatives on combating food insecurity among cash crop producers including coffee farmers. The objective of the study was to investigate how coffee cooperative membership may affect food security among coffee farm households in Southwest Ethiopia. The study used cross-sectional household data on income, expenditure on food, staple food production (maize and teff), and utilization of improved inputs (fertilizer and improved seed) collected from 256 randomly selected farm households (132 cooperative members and 124 nonmembers) and applied an inverse probability weighting (IPW) estimation to assess the impact of cooperative membership on food security. The result revealed that cooperative membership has a positive and significant effect on staple food production (maize and teff) and facilitated technological transformation via increased utilization of fertilizer and improved seeds. Nonetheless, the effect on food expenditure and income could not be confirmed. Findings suggest a trade-off between coffee marketing and input supply functions of the cooperatives, impairing their true food security impact from the pooled income and production effect.
2016-09-01
be conducted midstream, at the end of an activity program or LOE, or ex post facto . Not all security cooperation endeavors require evaluation...noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only...iv Developing an AME Framework for DoD Security Cooperation approach, the study team analyzed documents, interviewed subject- matter experts
Holmes, Paul; Rijken, Conny; D'Orsi, Sergio; Esser, Luuk; Hol, Floor; Gallagher, Anne; Greenberg, Galit; Helberg, Louis; Horvatits, Lisa; McCarthy, Sean; Ratel, Jonathan; Scheper-Hughes, Nancy; Forsythe, John
2016-01-01
Abstract In this short summary report on the legal definition of trafficking in human beings for the purpose of organ removal and improving cross-border collaboration in criminal cases, challenges, and recommendations in the areas of defining the crime, criminal investigation and prosecution, and cross-border cooperation are made. These are the outcomes of a working group discussion during the writers' conference of the HOTT project, a European Union-funded project against trafficking in human beings for the purpose of organ removal. PMID:27500251
77 FR 59206 - U.S. Customs and Border Protection
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-26
... collection techniques or the use of other forms of information technology; and (e) the annual cost burden to... Schedule of the United States (HTSUS). This declaration includes information such as the quantity, value... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection...
78 FR 75576 - Agency Information Collection Activities: Request for Information
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-12
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Request for Information AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland... information: 1651-0023. SUMMARY: As part of its continuing effort to reduce paperwork and respondent burden...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-29
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Modification of Two National Customs Automation Program (NCAP) Tests Concerning Automated Commercial Environment (ACE) Document Image System (DIS) and Simplified Entry (SE); Correction AGENCY: U.S. Customs and Border Protection, Department...
Engaging in cross-border power exchange and trade via the Arab Gulf states power grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fraser, Hamish; Al-Asaad, Hassan K.
2008-12-15
When construction is complete in 2010, an interconnector established among the Gulf states will enhance their electricity infrastructure while increasing reliability and security of power supply. The interconnector will also foster exchanges of energy and facilitate cross-border trade. (author)
Border Security: Barriers Along the U.S. International Border
2006-10-30
Crecimiento con Calidad: El Presidente Vicente Fox encabezará la cena de gala de la XI Cumbre Anual Hemispheria San Pedro 2005: Rubén Aguilar, Vocero de ...Pacific Ocean of the international border with Mexico , and covers approximately 7,000 square miles of territory. Located north of Tijuana and Tecate...had entered the country illegally.15 The study concluded that aliens attempting to enter the United States from Mexico had shown remarkable
19 CFR 111.34 - Undue influence upon Department of Homeland Security employees.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 19 Customs Duties 1 2012-04-01 2012-04-01 false Undue influence upon Department of Homeland Security employees. 111.34 Section 111.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BROKERS Duties and Responsibilities of Customs...
19 CFR 111.34 - Undue influence upon Department of Homeland Security employees.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 19 Customs Duties 1 2014-04-01 2014-04-01 false Undue influence upon Department of Homeland Security employees. 111.34 Section 111.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BROKERS Duties and Responsibilities of Customs...
19 CFR 111.34 - Undue influence upon Department of Homeland Security employees.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Undue influence upon Department of Homeland Security employees. 111.34 Section 111.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BROKERS Duties and Responsibilities of Customs...
19 CFR 111.34 - Undue influence upon Department of Homeland Security employees.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 1 2011-04-01 2011-04-01 false Undue influence upon Department of Homeland Security employees. 111.34 Section 111.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BROKERS Duties and Responsibilities of Customs...
19 CFR 111.34 - Undue influence upon Department of Homeland Security employees.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 19 Customs Duties 1 2013-04-01 2013-04-01 false Undue influence upon Department of Homeland Security employees. 111.34 Section 111.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BROKERS Duties and Responsibilities of Customs...
19 CFR 113.37 - Corporate sureties.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... on the bond. (d) Social security number of agent or attorney on the bond. In the appropriate place on... place his/her social security number, as it appears on the corporate surety power of attorney. (e...
19 CFR 113.37 - Corporate sureties.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... on the bond. (d) Social security number of agent or attorney on the bond. In the appropriate place on... place his/her social security number, as it appears on the corporate surety power of attorney. (e...
19 CFR 113.37 - Corporate sureties.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... on the bond. (d) Social security number of agent or attorney on the bond. In the appropriate place on... place his/her social security number, as it appears on the corporate surety power of attorney. (e...
19 CFR 113.37 - Corporate sureties.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... on the bond. (d) Social security number of agent or attorney on the bond. In the appropriate place on... place his/her social security number, as it appears on the corporate surety power of attorney. (e...
19 CFR 113.37 - Corporate sureties.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... on the bond. (d) Social security number of agent or attorney on the bond. In the appropriate place on... place his/her social security number, as it appears on the corporate surety power of attorney. (e...
Microsensors for border patrol applications
NASA Astrophysics Data System (ADS)
Falkofske, Dwight; Krantz, Brian; Shimazu, Ron; Berglund, Victor
2005-05-01
A top concern in homeland security efforts is the lack of ability to monitor the thousands of miles of open border with our neighbors. It is not currently feasible to continually monitor the borders for illegal intrusions. The MicroSensor System (MSS) seeks to achieve a low-cost monitoring solution that can be efficiently deployed for border patrol applications. The modifications and issues regarding the unique requirements of this application will be discussed and presented. The MicroSensor System was developed by the Defense Microelectronics Activity (DMEA) for military applications, but border patrol applications, with their unique sensor requirements, demand careful adaptation and modification from the military application. Adaptation of the existing sensor design for border applications has been initiated. Coverage issues, communications needs, and other requirements need to be explored for the border patrol application. Currently, border patrol has a number of deficiencies that can be addressed with a microsensor network. First, a distributed networked sensor field could mitigate the porous border intruder detection problem. Second, a unified database needs to be available to identify aliens attempting to cross into the United States. This database needs to take unique characteristics (e.g. biometrics, fingerprints) recovered from a specialized field unit to reliably identify intruders. Finally, this sensor network needs to provide a communication ability to allow border patrol officers to have quick access to intrusion information as well as equipment tracking and voice communication. MSS already addresses the sensing portion of the solution, including detection of acoustic, infrared, magnetic, and seismic events. MSS also includes a low-power networking protocol to lengthen the battery life. In addition to current military requirements, MSS needs a solar panel solution to extend its battery life to 5 years, and an additional backbone communication link. Expanding the capabilities of MSS will go a long way to improving the security of the nation's porous borders.
NATO, the Subjective Alliance: The Debate Over the Future
1988-04-01
consistency and conceptual neatness become the currency for intra-alliance bargaining in a manner which may exacerbate disagreement and transform difference...Republic. The West Germans of today are also comfortable realists who recog- nize the limits of cross -border brotherhood and the risks of too much of it...liberalization of the East, economic cooperation, and relaxation of border- crossing restrictions. Krell describes the breadth as well as the substance of
Social Security Number Fraud and Identity Theft Prevention Act
Rep. Coffman, Mike [R-CO-6
2009-05-19
House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
76 FR 17143 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-28
... Data System 5. Enhancing Air Cargo Security 6. National Strategy Global Supply Chain Security and the...: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Advisory Committee on...
Security through Termination Of Proliferation Act of 2009
Rep. Ros-Lehtinen, Ileana [R-FL-18
2009-01-13
House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Security and Fairness Enhancement for America Act of 2009
Rep. Goodlatte, Bob [R-VA-6
2009-05-07
House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
[Open Borders for Alpine Pastures: The History of the Pacage Franco- Suisse].
Schluep, J
2017-01-01
Alpine transhumance and summer grazing of animals on both sides of the French-Swiss border has a long tradition. The Bernese authorities first regulated the movement of animals across the French border in the 18th century due to outbreaks of epidemics. At that time the importation of cattle from the "Franche-Comté" was forbidden, but grazing on the French side of the border remained allowed. The 1912 agreement, relating to grazing on both sides of the border, was used for decades as a guideline to ensure the open communication and close cooperation of the veterinary and customs authorities of both countries with regard to border traffic. During World War I the movement across the border was temporarily stopped, whereas it remained open during World War II. During the last two decades of the 20th century problems have arisen due to IBR/ IPV from the Swiss, and BSE from the French point of view. In 1996, France annulled the 1912 agreement without any negative impact on the movement of animals across the border. As of 1999, the EU communitarian veterinary regulations apply, and veterinary border inspections have been abolished.
Caribbean and Eastern Pacific Maritime Security: Regional Cooperation in Bridge and Insular States
The international cocaine market has transformed the Caribbean Basin into the most violent region in the world. Against the onslaught of drugs and... violence , interstate security cooperation and intelligence sharing are increasingly prominent features of state security strategies. The evolution of
Devices and dressings to secure peripheral venous catheters to prevent complications.
Marsh, Nicole; Webster, Joan; Mihala, Gabor; Rickard, Claire M
2015-06-12
A peripheral venous catheter (PVC) is typically used for short-term delivery of intravascular fluids and medications. It is an essential element of modern medicine and the most frequent invasive procedure performed in hospitals. However, PVCs often fail before intravenous treatment is completed: this can occur because the device is not adequately attached to the skin, allowing the PVC to fall out, leading to complications such as phlebitis (irritation or inflammation to the vein wall), infiltration (fluid leaking into surrounding tissues) or occlusion (blockage). An inadequately secured PVC also increases the risk of catheter-related bloodstream infection (CRBSI), as the pistoning action (moving back and forth in the vein) of the catheter can allow migration of organisms along the catheter and into the bloodstream. Despite the many dressings and securement devices available, the impact of different securement techniques for increasing PVC dwell time is still unclear; there is a need to provide guidance for clinicians by reviewing current studies systematically. To assess the effects of PVC dressings and securement devices on the incidence of PVC failure. We searched the following electronic databases to identify reports of relevant randomised controlled trials (RCTs): the Cochrane Wounds Group Register (searched 08 April 2015): The Cochrane Central Register of Controlled Trials (CENTRAL; 2015, Issue 3), Ovid MEDLINE (1946 to March 7 2015); Ovid MEDLINE (In-Process & Other Non-Indexed Citations, March 7 2015); Ovid EMBASE (1974 to March 7 2015); and EBSCO CINAHL (1982 to March 8 2015). RCTs or cluster RCTs comparing different dressings or securement devices for the stabilisation of PVCs. Cross-over trials were ineligible for inclusion, unless data for the first treatment period could be obtained. Two review authors independently selected studies, assessed trial quality and extracted data. We contacted study authors for missing information. We used standard methodological procedures expected by Cochrane. We included six RCTs (1539 participants) in this review. Trial sizes ranged from 50 to 703 participants. These six trials made four comparisons, namely: transparent dressings versus gauze; bordered transparent dressings versus a securement device; bordered transparent dressings versus tape; and transparent dressing versus sticking plaster. There is very low quality evidence of fewer catheter dislodgements or accidental removals with transparent dressings compared with gauze (two studies, 278 participants, RR 0.40; 95% CI 0.17 to 0.92, P = 0.03%). The relative effects of transparent dressings and gauze on phlebitis (RR 0.89; 95% CI 0.47 to 1.68) and infiltration (RR 0.80; 95% CI 0.48 to 1.33) are unclear. The relative effects on PVC failure of a bordered transparent dressing and a securement device have been assessed in only one small study and these were unclear. There was very low quality evidence from the same single study of less frequent dislodgement or accidental catheter removal with bordered transparent dressings than securement devices (RR 0.14, 95% CI 0.03 to 0.63) but more phlebitis with bordered dressings (RR 8.11, 95% CI 1.03 to 64.02) (very low quality evidence). A small single study compared bordered transparent dressings with tape and found very low quality evidence of more PVC failure with the bordered dressing (RR 1.84, 95% CI 1.08 to 3.11) but the relative effects on dislodgement were not clear (very low quality evidence). The relative effects of transparent dressings and a sticking plaster have only been compared in one small study and are unclear. More high quality RCTs are required to determine the relative effects of alternative PVC dressings and securement devices. It is not clear if any one dressing or securement device is better than any other in securing peripheral venous catheters. There is a need for further, independent high quality trials to evaluate the many traditional as well as the newer, high use products. Given the large cost differences between some different dressings and securement devices, future trials should include a robust cost-effectiveness analysis.
75 FR 12445 - Name Change of Two DHS Components
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-16
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection U.S. Immigration and Customs... Components AGENCY: U.S. Customs and Border Protection, DHS; U.S. Immigration and Customs Enforcement, DHS; Department of the Treasury. ACTION: Final rule. SUMMARY: On March 31, 2007, the name of the Bureau of Customs...
75 FR 55811 - Testing Method of Pressed and Toughened (Specially Tempered) Glassware
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-14
.... 10-31] Testing Method of Pressed and Toughened (Specially Tempered) Glassware AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of method CBP uses to test... document adopts modifications to the test method currently applied by U.S. Customs and Border Protection...
Nonstate Actors and the Open Border Policy: The Border Security Case Study of Nepal and India
2014-12-01
Washington headquarters Services, Directorate for Information Operations and Reports. 1215 Jefferson Davis Highway, Suite 1204. Arlington, VA 22202-4302... remuneration .”276 This massive migration of young and eager workers allowed Germany to take advantage of booming industries and markets. The impact on
Intelligence-Driven Border Security: A Promethean View of U.S. Border Patrol Intelligence Operations
2015-12-01
USBP agent, intelligence ( BPA -I), information sharing, capability gap analysis process (CGAP), Tucson Sector Red Team 15. NUMBER OF PAGES 109 16...27 2. BPA -I .............................................................................................28 3. BPA -I Requirements...71 APPENDIX A. PROFESSIONAL INTELLIGENCE ASSOCIATIONS— ADDITIONAL OPPORTUNITIES FOR BPA -IS
NASA Astrophysics Data System (ADS)
Ferriere, D.; Rucinski, A.; Jankowski, T.
2007-04-01
Establishing a Virtual Sea Border by performing a real-time, satellite-accessible Internet-based bio-metric supported threat assessment of arriving foreign-flagged cargo ships, their management and ownership, their arrival terminal operator and owner, and rewarding proven legitimate operators with an economic incentive for their transparency will simultaneously improve port security and maritime transportation efficiencies.
75 FR 70937 - U.S. Customs and Border Protection
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-19
... Robinson International (USA) Inc., as a Commercial Gauger and Laboratory AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of Robinson... to 19 CFR 151.12 and 19 CFR 151.13, Robinson International (USA) Inc., 4400 S. Wayside Drive, Suite...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-13
... recognized by Customs and Border Protection, through a mutual recognition arrangement or comparable... been recognized by CBP, through a mutual recognition arrangement or comparable arrangement, as being... or through Mutual Recognition Arrangements (MRA) or memoranda of understanding relating to...
Negev, Maya; Paz, Shlomit; Clermont, Alexandra; Pri-Or, Noemie Groag; Shalom, Uri; Yeger, Tamar; Green, Manfred S
2015-06-15
The Mediterranean region is vulnerable to climatic changes. A warming trend exists in the basin with changes in rainfall patterns. It is expected that vector-borne diseases (VBD) in the region will be influenced by climate change since weather conditions influence their emergence. For some diseases (i.e., West Nile virus) the linkage between emergence andclimate change was recently proved; for others (such as dengue) the risk for local transmission is real. Consequently, adaptation and preparation for changing patterns of VBD distribution is crucial in the Mediterranean basin. We analyzed six representative Mediterranean countries and found that they have started to prepare for this threat, but the preparation levels among them differ, and policy mechanisms are limited and basic. Furthermore, cross-border cooperation is not stable and depends on international frameworks. The Mediterranean countries should improve their adaptation plans, and develop more cross-sectoral, multidisciplinary and participatory approaches. In addition, based on experience from existing local networks in advancing national legislation and trans-border cooperation, we outline recommendations for a regional cooperation framework. We suggest that a stable and neutral framework is required, and that it should address the characteristics and needs of African, Asian and European countries around the Mediterranean in order to ensure participation. Such a regional framework is essential to reduce the risk of VBD transmission, since the vectors of infectious diseases know no political borders.
Cooperative monitoring and its role in regional security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Biringer, K.; Olsen, J.; Lincoln, R.
1997-03-01
Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technicalmore » expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.« less
2007-11-14
including evaluations of controls over radioactive materials and security at America’s borders, airport security , sales of sensitive and surplus...officers. The details of this March 2006 report are classified; however, TSA has authorized this limited discussion. Airport Security Testing Sale of...of covert security vulnerability testing of numerous airports across the country. During these covert tests, our investigators passed through airport
Tackling the Anglophones' Free Ride: Fair Linguistic Cooperation with a Global Lingua Franca
ERIC Educational Resources Information Center
Van Parijs, Philippe
2007-01-01
In science and in all other domains that require communication across borders, we need one lingua franca, and this lingua franca will be English. The adoption of the native language of some as everyone's lingua franca unavoidably raises a problem of justice in various senses. One of these is cooperative justice, the fair distribution of the cost…
Chemical Sniffing Instrumentation for Security Applications.
Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; Marshall, Alan; Verbeck, Guido F
2016-07-27
Border control for homeland security faces major challenges worldwide due to chemical threats from national and/or international terrorism as well as organized crime. A wide range of technologies and systems with threat detection and monitoring capabilities has emerged to identify the chemical footprint associated with these illegal activities. This review paper investigates artificial sniffing technologies used as chemical sensors for point-of-use chemical analysis, especially during border security applications. This article presents an overview of (a) the existing available technologies reported in the scientific literature for threat screening, (b) commercially available, portable (hand-held and stand-off) chemical detection systems, and (c) their underlying functional and operational principles. Emphasis is given to technologies that have been developed for in-field security operations, but laboratory developed techniques are also summarized as emerging technologies. The chemical analytes of interest in this review are (a) volatile organic compounds (VOCs) associated with security applications (e.g., illegal, hazardous, and terrorist events), (b) chemical "signatures" associated with human presence, and (c) threat compounds (drugs, explosives, and chemical warfare agents).
Rep. Miller, Candice S. [R-MI-10
2011-03-31
Senate - 06/04/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Counterterrorism Enhancement and Department of Homeland Security Authorization Act of 2010
Rep. King, Peter T. [R-NY-3
2010-06-24
House - 07/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
The Hammer and the Anvil: The Need for A Comprehensive Southwest Border Security Strategy
2010-06-02
ublic figures voiced concern about the “war on drugs,” the right level and kind of immigration, problems along the southwest border, migration , crises...thesis, Naval Postgraduate School, 2006), 1. 27 K. Larry Stores, Mexico-U.S. Dialogue on Migration and Border Issues 2001-2005, (Washington, DC...13 Seven organized crime families operate the drug trade in and from Mexico. The Sinaloa Federation is a cocaine smuggling organization headed by
2013-03-01
constituted officer of the law , or to prevent the commission of a felony.109 On 27 February 1925, the U.S. Congress passed Public Law 502 (PL502), which...INS Immigration and Naturalization Service IRCA Immigration Reform and Control Act MOU Memorandum of Understanding NAFTA North American Free...major border communities, law enforcement officials conduct patrols behind massive fences while floodlights illuminate the border at night in an
Recent advances to address European Union Health Security from cross border chemical health threats.
Duarte-Davidson, R; Orford, R; Wyke, S; Griffiths, M; Amlôt, R; Chilcott, R
2014-11-01
The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10 years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development. Crown Copyright © 2014. Published by Elsevier Ltd. All rights reserved.
Enhancing and Managing Regionally Oriented Individuals and Organizations
2014-06-30
RAF. An additional challenge with the Army’s approach to RAF is funding. According to a recent article in Military Review, “very little ‘ juice ’ comes...http://www.hqmc.marines.mil/Portals/138/Docs/PL/ PLU /2012%20USMC%20Security%20Cooperation%20Narrative.pdf. 174 H.A.S.C. 112-89, Institutionalizing...Security Cooperation. 2012. http://www.hqmc.marines.mil/Portals/138/Docs/PL/ PLU /2012%20USMC%20Secur ity%20Cooperation%20Narrative.pdf. U.S. Air Force
17 CFR 230.702(T)-230.703(T) - [Reserved
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false [Reserved] 230.702(T)-230.703(T) Section 230.702(T)-230.703(T) Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Small Business Investment Companies §§ 230.702(T)-230.703(T) [Reserved] Exemptions for Cross-Border...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-31
... globalization of securities markets, cross-border coordination of trading and quotation halts is important to... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68526; File No. SR-FINRA-2012-010] Self... Change To Amend FINRA Rule 6440 (Trading and Quotation Halt in OTC Equity Securities) December 21, 2012...
Volpe engineers use biometrics to help ease border crush
DOT National Transportation Integrated Search
1997-01-01
Using technology previously reserved for military and other high security applications, engineers from the Safety and Security Systems Division of the Volpe Center have developed a number of automated biometric systems to speed the processing of freq...
Analyzing the homeland security of the U.S.-Mexico border.
Wein, Lawrence M; Liu, Yifan; Motskin, Arik
2009-05-01
We develop a mathematical optimization model at the intersection of homeland security and immigration, that chooses various immigration enforcement decision variables to minimize the probability that a terrorist can successfully enter the United States across the U.S.-Mexico border. Included are a discrete choice model for the probability that a potential alien crosser will attempt to cross the U.S.-Mexico border in terms of the likelihood of success and the U.S. wage for illegal workers, a spatial model that calculates the apprehension probability as a function of the number of crossers, the number of border patrol agents, and the amount of surveillance technology on the border, a queueing model that determines the probability that an apprehended alien will be detained and removed as a function of the number of detention beds, and an equilibrium model for the illegal wage that balances the supply and demand for work and incorporates the impact of worksite enforcement. Our main result is that detention beds are the current system bottleneck (even after the large reduction in detention residence times recently achieved by expedited removal), and increases in border patrol staffing or surveillance technology would not provide any improvements without a large increase in detention capacity. Our model also predicts that surveillance technology is more cost effective than border patrol agents, which in turn are more cost effective than worksite inspectors, but these results are not robust due to the difficulty of predicting human behavior from existing data. Overall, the probability that a terrorist can successfully enter the United States is very high, and it would be extremely costly and difficult to significantly reduce it. We also investigate the alternative objective function of minimizing the flow of illegal aliens across the U.S.-Mexico border, and obtain qualitatively similar results.
Secure Borders and Open Doors: Preserving Our Welcome to the World in an Age of Terrorism
2008-01-01
maura harty, have made efforts to leverage america’s vast academic assets for public diplomacy. however, the president’s commitment to strike the...robert gluck, walt disney parks and resorts; John hamilton, electronic data Systems corporation; matthew howe, Border trade alliance; Kelly hunt, u.S
78 FR 77140 - Customs Brokers User Fee Payment for 2014
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-20
... Payment for 2014 AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION..., association, or corporation, is due by February 21, 2014. U.S. Customs and Border Protection announces this date of payment for 2014 in accordance with the Tax Reform Act of 1986. DATES: Payment of the 2014...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-14
... DEPARTMENT OF HOMELAND SECURITY U. S. Customs and Border Protection 19 CFR Part 141 [USCBP-2008-0062; CBP Dec. 10-34] RIN 1515-AD61 (Formerly 1505-AB96) Technical Correction: Completion of Entry and Entry Summary-- Declaration of Value; Correction AGENCY: Customs and Border Protection, Department of...
NASA Astrophysics Data System (ADS)
Smit, F. W. H.; Bregman, E. P. H.
2012-04-01
Quaternary glaciations have left a significant sedimentological fingerprint in the subsurface of north Europe, in the form of buried glacial valleys. These structures are important drinking water reservoirs for millions of people in the ice-marginal landscape, but are increasingly threatened by anthropogenic pollution (nitrate, sulphate and organic pollutants) and geogenic pollution (salinization). That is one of the conclusion of a recent overview study in the IML of northern Europe from the North Sea to the southern Baltic area. Adequate policy making is yet not possible for several reasons: - Large amounts of data are needed to get a good grip on the lateral continuity of the complex infill. - The BurVal Working Group (2006) has shown that a combination of high resolution seismic survey, together with transient electromagnetic (TEM) surveys can provide realistic data for 3D hydrogeological models. However, these data have not yet been retrieved on a European scale. - Available borehole data can only be used as control points in 3D hydrological models, since the infill of buried glacial valleys is often lateral too complex to make sound interpolations possible. Pollution in buried glacial valleys crosses national borders in northern Europe and therefore national geological surveys have to cooperate in a newly formed European project on protection of these structures. The ENCORE - project (Environmental Conference of the European Regions) has shown in the past that it can facilitate fruitful European cooperation, which is urgently needed due to the costs of gathering data and due to knowledge gaps between different countries. By working together in a European context, these problems can be reduced so that better policy making is possible in order to secure our future drinking water availability.
2011-06-01
For example, in 2009 the British embassies in Zagreb and Belgrade funded a project to have the International Organization for Migration (IOM) utilize...Embassy Zagreb , UK in Croatia, “UK-backed Croatia-Serbia border police project successfully completed,” (3 May 2010), accessed May 17, 2010, http...cocaine seizure was made and two people arrested at Zagreb airport bound for Serbia. Also in November 2009, Serbian police arrested four people in
2013-05-24
abuse of materiel. In zones that were under-resourced, zone commanders do not have the resources to meet their operational needs. Funding for Canine ...Program – Coalition forces and German Police Training Teams worked with the Border Police to develop a canine program to search for explosives and...airports and major border crossings did not know if their canine teams would be available post-2014, which prevented planning for effective security
ERIC Educational Resources Information Center
Lanaghan, David M.
Presented is the end of project report of the handicapped children's nature study center and outdoor education program (funded through Title III), a cooperative science/special education project serving approximately 1,000 children in the Muscatine-Scott County School System in Iowa. A 6 acre land strip bordered by a creek and a river is said to…
Rep. Hastings, Alcee L. [D-FL-23
2009-01-15
House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
2010-06-01
was due to jalapeno and Serrano peppers grown and packed in Mexico and distributed in the United States. According to the USDA Rural Cooperative, the...early warning and active syndromic illness and disease monitoring network operating in the United States (U.S.)- Mexico Border Region and targets...Mexican national policies. Primary Users State and local public health epidemiologists at the U.S.- Mexico border Primary Providers of Data Data are
NASA Astrophysics Data System (ADS)
Xu, Yunjun; Remeikas, Charles; Pham, Khanh
2014-03-01
Cooperative trajectory planning is crucial for networked vehicles to respond rapidly in cluttered environments and has a significant impact on many applications such as air traffic or border security monitoring and assessment. One of the challenges in cooperative planning is to find a computationally efficient algorithm that can accommodate both the complexity of the environment and real hardware and configuration constraints of vehicles in the formation. Inspired by a local pursuit strategy observed in foraging ants, feasible and optimal trajectory planning algorithms are proposed in this paper for a class of nonlinear constrained cooperative vehicles in environments with densely populated obstacles. In an iterative hierarchical approach, the local behaviours, such as the formation stability, obstacle avoidance, and individual vehicle's constraints, are considered in each vehicle's (i.e. follower's) decentralised optimisation. The cooperative-level behaviours, such as the inter-vehicle collision avoidance, are considered in the virtual leader's centralised optimisation. Early termination conditions are derived to reduce the computational cost by not wasting time in the local-level optimisation if the virtual leader trajectory does not satisfy those conditions. The expected advantages of the proposed algorithms are (1) the formation can be globally asymptotically maintained in a decentralised manner; (2) each vehicle decides its local trajectory using only the virtual leader and its own information; (3) the formation convergence speed is controlled by one single parameter, which makes it attractive for many practical applications; (4) nonlinear dynamics and many realistic constraints, such as the speed limitation and obstacle avoidance, can be easily considered; (5) inter-vehicle collision avoidance can be guaranteed in both the formation transient stage and the formation steady stage; and (6) the computational cost in finding both the feasible and optimal solutions is low. In particular, the feasible solution can be computed in a very quick fashion. The minimum energy trajectory planning for a group of robots in an obstacle-laden environment is simulated to showcase the advantages of the proposed algorithms.
The impact of Border policy effect on cross-border ethnic areas
NASA Astrophysics Data System (ADS)
Bie, Q. L.; Zhou, S. Y.; Li, C. S.
2013-11-01
Boundary effect analysis is related to border policy making in the cross-border ethnic area. The border effect literatures show that geographic boundaries have obvious impacts on economic, social and cultural relations in both sides of a nation border. Particularly in cross-border ethnic areas, each ethnic group has strong internal spatial structure relevance, and the boundary effect is more obvious. However, most of China's border areas are cross-border ethnic areas, each of border issues is unique. Under this perspective, we analyze the border effects of various boundaries can provide basis for formulating border management policies. For small scale of cross-border ethnic minority areas, how to formulate the boundary management policy is a good question to explore. This paper is demonstrated by a study of the impact of border management policies in Dehong Dai and Jingpo Autonomous Prefecture in Yunnan Province at the border area to Burma. The comparative method is used to analysis the border management policies in past 50 decades for the border area of Yunnan Province .This research aims to define trends within border policy and its influences to national security. This paper also examines Wendy Brown's liberal theory of border management policy. We found that it is not suitable for Sino-Burma border area. The conclusion is that the changes or instability of international economic and political situation has more influence to this cross-border ethnic area, and only innovative policy will be effective in cross-border ethnic area. So the border management policies should reflect the change of international context.
Reevaluating American Grand Strategy in an Era of Retrenchment
2012-06-01
institutions.30 The United States 23 Bruce D. Jones, Shepard Forman, and Richard Gowan, ed., Cooperating...13. 25 Teresa Whitfield, “New Arrangements for Peace Negotiation” in Cooperating For Peace and Security, edited by Bruce D. Jones, Shepard Forman...Shifting Strategic Environment” in Cooperating For Peace and Security, edited by Bruce D. Jones, Shepard Forman, and Richard Gowan (New York, NY
Asia-Pacific Economic Cooperation Business Travel Cards Act of 2009
Rep. Larsen, Rick [D-WA-2
2009-07-13
House - 07/17/2009 Referred to the Subcommittee on Border, Maritime, and Global Counterterrorism. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Border and Transportation Security: Overview of Congressional Issues
2004-12-17
railways, airways, and waterways. While in the immediate aftermath of 9/11 efforts primarily concentrated on an expanded federal role in aviation ... security (in particular on the heightened screening of passengers and baggage), increasingly attention is being turned towards other modes of transportation.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-27
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Announcement of Test Concerning... announces U.S. Customs and Border Protection's (CBP's) plan to conduct a test concerning the manifesting and... test announced in this document begins. In HQ Ruling H026715, CBP held that in order to ensure the...
75 FR 11899 - Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-12
... DEPARTMENT OF HOMELAND SECURITY Customs and Border Protection Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder AGENCY: U.S. Customs and Border Protection, U.S... broker licenses and any and all permits have been cancelled due to the death of the broker: License Name...
76 FR 22912 - Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-25
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder AGENCY: U.S. Customs and Border Protection, DHS... have been cancelled due to the death of the broker: Name License No. Port name Leandro U. Guevarra...
75 FR 40864 - Notice of Fiscal Year 2010 Border Grant Funding and Solicitation for Applications
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-14
... Federal Grant Web site, http://www.grants.gov . Eligible projects for funding with BEG are identified in... applications for BEG funding at the Federal Grant Web site, http://www.grants.gov . FOR FURTHER INFORMATION... the MOE explanation, http://www.fmcsa.dot.gov/safety-security/grants/beg/moe.aspx . The Border...
Solutions for North American Water Security Challenge: Colorado and Bravo transboundary basins cases
NASA Astrophysics Data System (ADS)
López Pérez, M.
2013-12-01
The transboundary basins of Colorado (Baja California) and Rio Bravo (Grande) have low water availability figures and water will be appreciated as a highly valued good. In the Rio Grande basin, the strategies and actions have been developed with the River Basin Council: a new surface water management, new water allocation rules for different rainfall and runoff scenarios (climate change included), new sources of water and establishment of water reserves for human consumption and for environmental purposes. In the Colorado River, with an integrated watershed management vision, Mexican and US federal, state and non-governmental organizations representatives signed Minute 319 for 5 years without changing the 1944 Water Treaty. Concepts and rules for surplus, shortage, Intentionally Created Mexican Water (ICMA), salinity, water for the environment and international projects were included and are been implemented. Parallel drinking water and sanitation services in both sides of the border through the Joint Investment Program, EPA-CONAGUA invested 979.2 million dollars from grants to improve the quality of the environment and the inhabitants. Accomplishments are high and the reduction in river health is a good indicator. The implementation of this binational cooperation actions under the framework of the 1944 Water Treaty are considered global solutions in the field of integrated water management in transboundary basins and for creating water security in highly pressured basins. Keywords: Colorado River, Rio Grande or Bravo River, water security, Transboundary basins, environmental water reserves
To Enable and Sustain: Pacific Air Forces’ Theater Security Cooperation as a Line of Operation
2015-02-01
security cooperation mechanisms already in place are evolving into a more sequenced and deliberate plan towards a defined cooperative end state. This...alignment of higher guidance and is designed to advise and guide the command’s activities in the region. Joint in its es- sence , it communicates and...face of crises, it is far better to prevent them from occurring in the first place , establish cooperative arrangements ahead of time, and reduce
DOE Office of Scientific and Technical Information (OSTI.GOV)
Butler, Nicholas; Watson, Erica E.; Wright, Kyle A.
The Global Threat Reduction Initiative (GTRI) reduces and protects vulnerable nuclear and radiological material located at civilian sites worldwide from sabotage, theft or diversion. The GTRI program has worked successfully with foreign countries to remove and protect nuclear and radioactive materials including high-activity sources used in medical, commercial, and research applications. There are many barriers to successful bilateral cooperation that must be overcome including language, preconceived perceptions, long distances, and different views on the threat and protection requirements. Successful cooperation is often based on relationships and building trusting relationships takes time. In the case of Mexico, GTRI first made contactmore » in 2005. The project then lost momentum and stalled. At the same time, GTRI’s cooperation with the Republic of Colombia was a resounding success resulting in the securing of forty sites; the consolidation of numerous disused/orphan sources at a secure national storage facility; and, the development of a comprehensive approach to security including, inter alia, training and sustainability. The government of Colombia also showcased this comprehensive approach to thirteen Central American and Caribbean countries at a GTRI regional security conference held in Panama in October 2004. Representatives from the Colombian government were aware of GTRI’s interest in initiating cooperation with the Government of Mexico and to facilitate this cooperation, they offered to invite their Mexican counterparts to Colombia to observe its successful cooperation with GTRI. Shortly after that visit, the Government of Mexico agreed to move forward and requested that the cooperative efforts in Mexico be performed in a tripartite manner, leveraging the skills, experience, and resources of the Colombians. As a result, 22 of Mexico’s largest radioactive sites have had security upgrades in place within 18 months of cooperation.« less
Nuclear Energy Experiments to the Center for Global Security and Cooperation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Osborn, Douglas M.
2015-06-01
This is to serve as verification that the Center 6200 experimental pieces supplied to the Technology Training and Demonstration Area within the Center of Global Security and Cooperation are indeed unclassified unlimited released for viewing.
Mojarro, Octavio; Sutton, Paul D.; Ventura, Stephanie J.
2013-01-01
Introduction The US–Mexico border region has 15 million residents and 300,000 births annually. Reproductive health concerns have been identified on both sides of the border, but comparable information about reproductive health is not available. The objective of this study was to compare reproductive health indicators among populations in this region. Methods We used 2009 US Hispanic and Mexican birth certificate data to compare births inside the border region, elsewhere within the border states, and in the United States and Mexico overall. We examined trends in total fertility and birth rates using birth data from 2000 through 2009 and intercensal population estimates. Results Among women in the border region, US women had more lifetime births than Mexican women in 2009 (2.69 births vs 2.15 births) and throughout the decade. Birth rates in the group aged 15 to 19 years were high in both the US (73.8/1,000) and Mexican (86.7/1,000) border regions. Late or no prenatal care was nearly twice as prevalent in the border regions as in the nonborder regions of border states. Low birth weight and preterm and early-term birth were more prevalent in the US border than in the Mexican border region; US border rates were higher and Mexican rates were lower than their corresponding nonborder and national rates. We found some variations within border states. Conclusion These findings constitute the first population-based information on the reproductive health of the entire Hispanic US–Mexico border population. Evidence of disparities warrants exploration at state and local levels. Teen pregnancy and inadequate prenatal care are shared problems in US–Mexico border communities and suggest an area for binational cooperation. PMID:23948338
McDonald, Jill A; Mojarro, Octavio; Sutton, Paul D; Ventura, Stephanie J
2013-08-15
The US-Mexico border region has 15 million residents and 300,000 births annually. Reproductive health concerns have been identified on both sides of the border, but comparable information about reproductive health is not available. The objective of this study was to compare reproductive health indicators among populations in this region. We used 2009 US Hispanic and Mexican birth certificate data to compare births inside the border region, elsewhere within the border states, and in the United States and Mexico overall. We examined trends in total fertility and birth rates using birth data from 2000 through 2009 and intercensal population estimates. Among women in the border region, US women had more lifetime births than Mexican women in 2009 (2.69 births vs 2.15 births) and throughout the decade. Birth rates in the group aged 15 to 19 years were high in both the US (73.8/1,000) and Mexican (86.7/1,000) border regions. Late or no prenatal care was nearly twice as prevalent in the border regions as in the nonborder regions of border states. Low birth weight and preterm and early-term birth were more prevalent in the US border than in the Mexican border region; US border rates were higher and Mexican rates were lower than their corresponding nonborder and national rates. We found some variations within border states. These findings constitute the first population-based information on the reproductive health of the entire Hispanic US-Mexico border population. Evidence of disparities warrants exploration at state and local levels. Teen pregnancy and inadequate prenatal care are shared problems in US-Mexico border communities and suggest an area for binational cooperation.
Regional Military Security Cooperation in North America
2009-12-11
will serve as the main research sources. The primary research question is how might the United States better facilitate greater security cooperation...militarily between the U.S., Canada, and Mexico? Secondary research questions are why do we need increased security integration? How do current...research question has several associated tertiary questions . The paper consists of five chapters. Chapters 1 through 3 are introductory and
Theater Security Cooperation: The Military Engagement Team. Lessons and Best Practices
2017-01-01
Reproduction of this publication is welcomed and highly encouraged. Theater Security Cooperation: The Military Engagement Team FOLLOW CALL ON SOCIAL...Cooperation: The MET Table of Contents Chapter 1. Military Engagement Team 1 Chapter 2. Predeployment Training 7 Chapter 3. Engagement Planning 13...Chapter 4. Engagement Execution 19 Chapter 5. Engagement Closeout 23 Appendix A. Military Engagement Team Position Descriptions and Duties 27 Appendix
Making the National Security Council Better In the Bahamas to Resolve Illegal Migration
2015-12-01
ABSTRACT (maximum 200 words) The Bahamas’ economy depends primarily on tourism . Unchecked crime and cross-border threats jeopardize the country’s economic... tourism , opportunistic maritime criminality, national security strategy, national insecurity, U.S.-Bahamian relations, Haitian migration, transnational...of National Security Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT The Bahamas’ economy depends primarily on tourism . Unchecked
NASA Astrophysics Data System (ADS)
Chalmers, Alex
2004-09-01
To increase the security and throughput of ISO traffic through international terminals more technology must be applied to the problem. A transnational central archive of inspection records is discussed that can be accessed by national agencies as ISO containers approach their borders. The intent is to improve the throughput and security of the cargo inspection process. A review of currently available digital media archiving technologies is presented and their possible application to the tracking of international ISO container shipments. Specific image formats employed by current x-ray inspection systems are discussed. Sample x-ray data from systems in use today are shown that could be entered into such a system. Data from other inspection technologies are shown to be easily integrated, as well as the creation of database records suitable for interfacing with other computer systems. Overall system performance requirements are discussed in terms of security, response time and capacity. Suggestions for pilot projects based on existing border inspection processes are made also.
1992-12-01
Iraq, and the countries of the Gulf Cooperation Council (GCC-Saudi Arabia, Kuwait, Bahrain, the United Arab Emirates (UAE), Qatar , and Oman) are the...Council (GCC) itself. In October 1992 a border dispute between Qatar and Saudi Arabia flared up. Qatar accused Saudi forces of illegally occupying a...Qatari border post and killing two people. Qatar demanded the withdrawal of the Saudi troops. Riyadh denied that Saudi forces were involved in the
WCCI at Fifteen: A World Community of Educators.
ERIC Educational Resources Information Center
Miel, Alice
1987-01-01
Reviews the development of the World Council for Curriculum and Instruction (WCCI), an international organization of educators founded in 1971. States that membership is open to educators who wish to cooperate across international borders. (JDH)
2010-11-01
protection and to isolate threats in order to survive and develop. The cell model implies osmosis , allowing flows to take place across the borders and the...relationships to new levels, much as cell phone technology replaces the laying of copper wire for traditional telephone service. Whole-of-Government/Whole...in urban, rural, and remote environments. This practical experience with the men and women of the U.S. Border Patrol animated many of the concepts
Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network
Caiti, Andrea; Calabrò, Vincenzo; Dini, Gianluca; Duca, Angelica Lo; Munafò, Andrea
2012-01-01
Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles—AUVs) respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach). The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal) is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011. PMID:22438748
Secure cooperation of autonomous mobile sensors using an underwater acoustic network.
Caiti, Andrea; Calabrò, Vincenzo; Dini, Gianluca; Lo Duca, Angelica; Munafò, Andrea
2012-01-01
Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles-AUVs) respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach). The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal) is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011.
76 FR 37136 - Post-Summary Corrections to Entry Summaries Filed in ACE Pursuant to the ESAR IV Test
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-24
... Phased Out for Entry Summaries Filed in ACE The Post-Entry Amendment (PEA) test allows importers to amend... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Post-Summary Corrections to Entry Summaries Filed in ACE Pursuant to the ESAR IV Test AGENCY: U.S. Customs and Border Protection...
77 FR 16249 - Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-20
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder AGENCY: U.S. Customs and Border Protection, U.S... broker licenses and any and all permits have been cancelled due to the death of the broker: Name License...
77 FR 45648 - Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-01
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder AGENCY: U.S. Customs and Border Protection, U.S... broker licenses and any and all permits have been cancelled due to the death of the broker: Name License...
76 FR 44033 - Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder AGENCY: U.S. Customs and Border Protection, U.S... broker licenses and any and all permits have been cancelled due to the death of the broker: License Name...
76 FR 2918 - Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-18
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses Due to Death of the License Holder AGENCY: U.S. Customs and Border Protection, U.S... broker license and any and all permits have been cancelled due to the death of the broker: Name License...
Threats to cross-border wildlife linkages in the Sky Islands Wildlands Network
Kim Vacariu
2005-01-01
One of the greatest challenges facing conservationists in the Sky Islands region is finding a realistic means to maintain historic travel routes for wide-ranging species crossing the United States-Mexico border. This challenge is made difficult due to the ongoing efforts by the Federal government to install additional security infrastructure to stem the flood of...
Saudi Arabia’s Counterterrorism Methods: A Case Study on Homeland Security
2017-06-01
laws to safeguard the homeland and its borders, Saudi Arabia has enacted laws that impose stiff penalties aimed at money laundering and other illicit...safeguard the homeland and its borders, Saudi Arabia has enacted laws that impose stiff penalties aimed at money laundering and other illicit activities...34 1. Combating Financing Terrorist Organizations ............... 34 2. Combating Money Laundering by
Security Cooperation Organizations in the Country Team: Options for Success
2010-01-01
JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...Security Cooperation Organizations in the Country Team Options for Success Terrence K. Kelly, Jefferson P. Marquis, Cathryn Quantic Thurston...Tommie Sue Montgomery, “Fighting Guerrillas: The United States and Low-Intensity Conflict in El Salvador,” New Political Science , Vol. 9, No. 18–19
The Arctic Region: A Requirement for New Security Architecture?
2013-03-01
cooperation and mutually beneficial partnerships . Denmark’s security policy states that existing international law and established forums of cooperation...increase leadership in multinational forum and, develop comprehensive partnerships without the need to create a new security organization. Figure 3...Arctic region. Endnotes 1 Government of Canada, “Canada’s Arctic foreign policy” (Ottawa, Canada, 2007), 2. 2 WWF Global, “Arctic oil and gas”, http
49 CFR 1540.203 - Security threat assessment.
Code of Federal Regulations, 2013 CFR
2013-10-01
.... (3) Date and place of birth. (4) Social security number (submission is voluntary, although failure to provide it may delay or prevent completion of the threat assessment). (5) Gender. (6) Country of... Border Protection. (i) If asserting completion of a comparable threat assessment listed in paragraph (h...
49 CFR 1540.203 - Security threat assessment.
Code of Federal Regulations, 2012 CFR
2012-10-01
.... (3) Date and place of birth. (4) Social security number (submission is voluntary, although failure to provide it may delay or prevent completion of the threat assessment). (5) Gender. (6) Country of... Border Protection. (i) If asserting completion of a comparable threat assessment listed in paragraph (h...
Rep. Young, Don [R-AK-At Large
2010-03-19
House - 04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
U.S. Security Cooperation with India and Pakistan: A Comparative Study
2013-06-01
Pakistan’s nuclear ambitions, and resulted in further sanctions200 Pakistan spent the better part of the 1990s seething about the U.S. “abandonment... nuclear accident that happens in future. (From India’s perspective, the problem of liability has been exacerbated by the Fukushima disaster and anti...14. SUBJECT TERMS: United States, India, Pakistan, Security Cooperation, South Asia, Cold War, Defense Cooperation, Kashmir, Nuclear
2016-06-10
inefficiencies have even escalated to cases where soldiers in the brigades experienced challenges and delays in obtaining official passports . Despite...USARAF and RAF BCTs supporting DoS coordinated and approved security cooperation activities, DoS passport procedures have denied many soldiers from...draw from, in order to support sometimes late notice security cooperation activities. As a result, brigades often 84 put in blanket official passport
Bahrain Country Analysis Brief
2016-01-01
The Kingdom of Bahrain is the smallest oil producer among the Gulf Cooperation Council (GCC) nations. Bahrain and Oman are the only two countries bordering the Persian Gulf which are not members of the Organization of the Petroleum Exporting Countries (OPEC).
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Advance electronic information for air, truck, and rail cargo; Importer Security Filing information for vessel cargo. 103.31a Section 103.31a Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AVAILABILITY OF INFORMATION Other Information...
Rep. Rogers, Mike J. [R-MI-8
2009-06-19
House - 07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Securitization, alterity, and the state Human (in)security on an Amazonian frontier
Brightman, Marc; Grotti, Vanessa
2016-01-01
Focusing on the region surrounding the Maroni River, which forms the border between Suriname and French Guiana, we examine how relations between different state and non-state social groups are articulated in terms of security. The region is characterised by multiple “borders” and frontiers of various kinds, the state boundary having the features of an interface or contact zone. Several key collectivities meet in this border zone: native Amazonians, tribal Maroon peoples, migrant Brazilian gold prospectors, and metropolitan French state functionaries. We explore the relationships between these different sets of actors and describe how their mutual encounters center on discourses of human and state security, thus challenging the commonly held view of the region as a stateless zone and showing that the “human security” of citizens from the perspective of the state may compete with locally salient ideas or experiences of well-being. PMID:27996063
19 CFR 122.187 - Revocation or suspension of access.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 19 Customs Duties 1 2014-04-01 2014-04-01 false Revocation or suspension of access. 122.187 Section 122.187 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.187 Revocation or...
19 CFR 122.187 - Revocation or suspension of access.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 19 Customs Duties 1 2013-04-01 2013-04-01 false Revocation or suspension of access. 122.187 Section 122.187 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.187 Revocation or...
19 CFR 122.187 - Revocation or suspension of access.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 1 2011-04-01 2011-04-01 false Revocation or suspension of access. 122.187 Section 122.187 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.187 Revocation or...
19 CFR 122.187 - Revocation or suspension of access.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 19 Customs Duties 1 2012-04-01 2012-04-01 false Revocation or suspension of access. 122.187 Section 122.187 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.187 Revocation or...
Efficient Security Mechanisms for the Border Gateway Routing Protocol
1997-08-22
Finding Algorithm for Loop- Free Routing. IEEE/ACM Transactions on Networking, 5(1):148{160, Feb. 1997. [7] International Standards Organization. ISO/IEC...Jersey 07974, Feb. 1985. ftp://netlib.att.com/netlib/att/cs/ cstr /117.ps.Z. [16] S. L. Murphy. Presentation in Panel on \\Security Architecture for the
77 FR 26564 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-04
... National Strategy for Global Supply Chain Security. The work of the Trade Facilitation Subcommittee... Strategy for Global Supply Chain Security as it relates to the Committee's effort to solicit, consolidate... chain management project. The Anti-Dumping/Countervailing Duties Subcommittee work on educational...
77 FR 12867 - Accreditation of ALTOL Chemical and Environmental Lab Inc., as a Commercial Laboratory
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-02
... accredited to test petroleum, petroleum products, organic chemicals and vegetable oils for customs purposes... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation of ALTOL Chemical..., Department of Homeland Security. ACTION: Notice of accreditation of Altol Chemical and Environmental Lab Inc...
77 FR 2308 - Approval of Altol Petroleum Product Service, as a Commercial Gauger
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Approval of Altol Petroleum... Security. ACTION: Notice of approval of Altol Petroleum Product Service, as a commercial gauger. SUMMARY: Notice is hereby given that, pursuant to 19 CFR 151.13, Altol Petroleum Product Service, Calle Gregorio...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 2 2011-04-01 2011-04-01 false Data elements. 149.3 Section 149.3 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) IMPORTER SECURITY FILING § 149.3 Data elements. (a) Shipments intended to be entered into the...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Data elements. 149.3 Section 149.3 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) IMPORTER SECURITY FILING § 149.3 Data elements. (a) Shipments intended to be entered into the...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Butler, Nicholas; McCaw, Erica E.; Wright, Kyle A.
The Global Threat Reduction Initiative (GTRI) reduces and protects vulnerable nuclear and radiological material located at civilian sites worldwide from sabotage, theft or diversion. The GTRI has worked successfully with foreign countries to remove and protect nuclear and radioactive materials including high-activity sources used in medical, commercial, and research applications. There are many barriers to successful bilateral cooperation that must be overcome including language, preconceived perceptions, long distances, and different views on the threat and protection requirements. Successful cooperation is often based on relationships and building trusting relationships takes time. In the case of Dominican Republic, the GTRI first receivedmore » contact in 2008 from the Government of Dominican Republic. They requested cooperation that was similar to the tri-partite cooperation between Colombia, Mexico and the United States. Throughout the region it was widely known that the GTRI’s cooperation with the Government of Colombia was a resounding success resulting in the securing of forty sites; the consolidation of numerous disused/orphan sources at a secure national storage facility; and, the development of a comprehensive approach to security including, inter alia, training and sustainability. The Government of Colombia also showcased this comprehensive approach to thirteen Central American and Caribbean countries at a GTRI regional security conference held in Panama in October 2004. In 2007, Colombia was an integral component of GTRI multi-lateral cooperation initiation in Mexico. As a result, twenty two of Mexico’s largest radioactive sites have been upgraded in the past eighteen months. These two endeavors served as catalysts for cooperation opportunities in the Dominican Republic. Representatives from the Colombian government were aware of GTRI’s interest in initiating cooperation with the Government of Dominican Republic and to facilitate this cooperation, they traveled to the Dominican Republic and provided briefings and presentations which demonstrated its successful cooperation with the GTRI. Shortly after that visit, the Government of Dominican Republic agreed to move forward and requested that the cooperative efforts in Dominican Republic be performed in a tripartite manner, leveraging the skills, experience, and resources of the Colombians, and the financial and technical support of the United States. As a result, two of Dominican Republic’s largest radioactive sites had security upgrades in place within 90 days of the cooperation visit in December 2008.« less
The Evolution of European Security: From Confrontation to Cooperation
2013-03-01
leading U.S. companies such as Boeing and Lockheed Martin , just to name a few.77 But more robust cooperation is still limited by the member states...Common Security and Defense Policy: Intersecting Trajectories”, 4. 63 Gustav Lindstrom , Enter the EU Battlegroups, (Paris: Institute for Security...Battlegroups, Strategy Research Project (Carlisle Barracks, PA: U.S. Army War College, January 22, 2009), 4. 67 Lindstrom , Enter the EU Battlegroups
Weigel, M Margaret; Armijos, Rodrigo X; Hall, Yolanda Posada; Ramirez, Yolanda; Orozco, Rubi
2007-07-01
Emerging evidence suggests chronic household food insecurity has an adverse effect on health. This study examined the prevalence, predictors and health outcomes associated with food insecurity in 100 migrant and seasonal farmworker (MSFW) households living on the U.S.-Mexico border. Data were collected using the U.S. Food Security Scale, California Agricultural Worker's Health Survey, and objective anthropometric, clinical and biochemical indicators. Food insecurity affected 82% of households; 49% also had hunger. Household food insecurity was predicted by the presence of minor children in the home and low maternal education. Food insecure households were more likely to have at least one member affected by symptoms of depression (deprimido), nervios (an ethnospecific condition), learning disorders, and symptoms suggestive of gastrointestinal infection. Although not directly associated with food insecurity, adult obesity, central body adiposity, elevated blood pressure, and blood lipid and glucose disturbances were common. These findings highlight the significant food security and health challenges faced by border area MSFW families.
Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa
2017-05-16
In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.
Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa
2017-01-01
In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks. PMID:28509841
A sequential-move game for enhancing safety and security cooperation within chemical clusters.
Pavlova, Yulia; Reniers, Genserik
2011-02-15
The present paper provides a game theoretic analysis of strategic cooperation on safety and security among chemical companies within a chemical industrial cluster. We suggest a two-stage sequential move game between adjacent chemical plants and the so-called Multi-Plant Council (MPC). The MPC is considered in the game as a leader player who makes the first move, and the individual chemical companies are the followers. The MPC's objective is to achieve full cooperation among players through establishing a subsidy system at minimum expense. The rest of the players rationally react to the subsidies proposed by the MPC and play Nash equilibrium. We show that such a case of conflict between safety and security, and social cooperation, belongs to the 'coordination with assurance' class of games, and we explore the role of cluster governance (fulfilled by the MPC) in achieving a full cooperative outcome in domino effects prevention negotiations. The paper proposes an algorithm that can be used by the MPC to develop the subsidy system. Furthermore, a stepwise plan to improve cross-company safety and security management in a chemical industrial cluster is suggested and an illustrative example is provided. Copyright © 2010 Elsevier B.V. All rights reserved.
Defense.gov Special Report: Travels With Hagel
Halifax International Security Forum. Story U.S., Canada Sign Asia-Pacific Cooperation Framework Defense Cooperation Framework as both leaders take part in the Halifax International Security Forum. Story Travel Visits First Zumwalt-class Destroyer Photo Essays Photo Essay: Hagel Attends Halifax International
The Uzbekistan Kyrgyzstan Border: Institutional Legitimacy and Regional Stability
2017-06-01
Advisor: David Yost THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev...this thesis analyzes the subjective forms of border legitimacy and obedience in relation to local perceptions and social behavior. While scholarly
Securing the Northern Maritime Border Through Maritime Domain Awareness
2010-09-01
is handled through 1) aircraft overflights (Coast Guard and Coast Guard Auxiliary aircraft, U.S. Air Force, Customs and Border Patrol, Canadian...caliber machine gun, or like automatic weapons. Bruce Levy, Director, U.S. Transboundary Division conveyed to Nancy Mason, Director, Office of...1 NORAD, the North American Aerospace Defense Command, is a binational military command focused on the air defense of North America and located
Multinational Integration Newsletter, Number 10-51, July 2010
2010-07-01
Ecuador . Colombia alerted other governments about FARC activities on their soils: Argentina four times, Bolivia twice, Brazil seven, Peru four, and...Correa government attempted to respond to the vulnerability of the northern border. Its Plan Ecuador is intended to improve border security by... Government Fernando Bustamante declared at Washington’s Inter-American Dialogue on March 18 that Ecuador has an impressive record against narcotics and the
Glinos, Irene A; Baeten, Rita
2015-01-01
Despite being a niche phenomenon, cross-border health care collaboration receives a lot of attention in the EU and figures visibly on the policy agenda, in particular since the policy process which eventually led to the adoption of Directive 2011/24/EU. One of the underlying assumptions is that cross-border collaboration is desirable, providing justification to both the European Commission and to border-region stakeholders for promoting it. The purpose of this paper is to question this assumption and to examine the role of actors in pushing (or not) for cross-border collaboration. The analysis takes place in two parts. First, the EU policies to promote cross-border collaboration and the tools employed are examined, namely (a) use of European funds to sponsor concrete border-region collaboration projects, (b) use of European funds to sponsor research which gives visibility to cross-border collaboration, and (c) use of the European Commission's newly acquired legal mandate to encourage "Member States to cooperate in cross-border health care provision in border-regions" (Art. 10) and support "Member States in the development of European reference networks between health care providers and centres of expertise" (Art. 12). Second, evidence gathered in 2011-2013 from seven European border-regions on hospital cross-border collaboration is systematically reviewed to assess the reality of cross-border collaboration - can it work and when, and why do actors engage in cross-border collaboration? The preliminary findings suggest that while the EU plays a prominent role in some border-region initiatives, cross-border collaboration needs such a specific set of circumstances to work that it is questionable whether it can effectively be promoted. Moreover, local actors make use of the EU (as a source of funding, legislation or legitimisation) to serve their needs. Copyright © 2014. Published by Elsevier Ltd.
Glinos, Irene A; Baeten, Rita
2014-09-01
Despite being a niche phenomenon, cross-border health care collaboration receives a lot of attention in the EU and figures visibly on the policy agenda, in particular since the policy process which eventually led to the adoption of Directive 2011/24/EU. One of the underlying assumptions is that cross-border collaboration is desirable, providing justification to both the European Commission and to border-region stakeholders for promoting it. The purpose of this paper is to question this assumption and to examine the role of actors in pushing (or not) for cross-border collaboration. The analysis takes place in two parts. First, the EU policies to promote cross-border collaboration and the tools employed are examined, namely (a) use of European funds to sponsor concrete border-region collaboration projects, (b) use of European funds to sponsor research which gives visibility to cross-border collaboration, and (c) use of the European Commission's newly acquired legal mandate to encourage "Member States to cooperate in cross-border health care provision in border-regions" (Art. 10) and support "Member States in the development of European reference networks between health care providers and centres of expertise" (Art. 12). Second, evidence gathered in 2011-2013 from seven European border-regions on hospital cross-border collaboration is systematically reviewed to assess the reality of cross-border collaboration - can it work and when, and why do actors engage in cross-border collaboration? The preliminary findings suggest that while the EU plays a prominent role in some border-region initiatives, cross-border collaboration needs such a specific set of circumstances to work that it is questionable whether it can effectively be promoted. Moreover, local actors make use of the EU (as a source of funding, legislation or legitimisation) to serve their needs. Copyright © 2014. Published by Elsevier Ltd.
Similarity-based cooperation and spatial segregation
NASA Astrophysics Data System (ADS)
Traulsen, Arne; Claussen, Jens Christian
2004-10-01
We analyze a cooperative game, where the cooperative act is not based on the previous behavior of the coplayer, but on the similarity between the players. This system has been studied in a mean-field description recently [A. Traulsen and H. G. Schuster, Phys. Rev. E 68, 046129 (2003)]. Here, the spatial extension to a two-dimensional lattice is studied, where each player interacts with eight players in a Moore neighborhood. The system shows a strong segregation independent of parameters. The introduction of a local conversion mechanism towards tolerance allows for four-state cycles and the emergence of spiral waves in the spatial game. In the case of asymmetric costs of cooperation a rich variety of complex behavior is observed depending on both cooperation costs. Finally, we study the stabilization of a cooperative fixed point of a forecast rule in the symmetric game, which corresponds to cooperation across segregation borders. This fixed point becomes unstable for high cooperation costs, but can be stabilized by a linear feedback mechanism.
2008-12-01
Program,” http://www.cbp.gov/xp/cgov/trade/cargo_security/ ctpat /fast/ (accessed October 14, 2008). 73 U.S. Customs and Border Protection, “What Is...Customs-Trade Partnership against Terrorism (C- TPAT)?” http://www.cbp.gov/xp/cgov/trade/cargo_security/ ctpat /what_ctpat/ (accessed October 14, 2008...cgov/trade/cargo_security/ ctpat / (accessed September 12, 2008). 69 1. National Park Service Historic Preservation Tax Incentives The U.S. government
2010-09-03
Obama is quite popular in Canada. The two North American countries continue to cooperate widely in international security and political issues...39 North American Cooperation on Competitiveness and Security...the 1989 U.S.-Canada Free Trade Agreement, and the 1994 North American Free Trade Agreement. To many Canadians, however, Ottawa seemed at times to have
U.S.-Mexican Security Cooperation: the Merida Initiative and Beyond
2010-07-29
Department to USAID for implementation. 71 “Cárteles Perturban al Sistema Carcelario,” El Universal, June 18, 2010. 72 Silvia Otero, “No Investigan 95...a Web .” Milenio. July 28, 2010. U.S.-Mexican Security Cooperation: the Mérida Initiative and Beyond Congressional Research Service 27 Similar
U.S.- Mexican Security Cooperation: The Merida Initiative and Beyond
2010-07-29
Department to USAID for implementation. 71 “Cárteles Perturban al Sistema Carcelario,” El Universal, June 18, 2010. 72 Silvia Otero, “No Investigan 95...a Web .” Milenio. July 28, 2010. U.S.-Mexican Security Cooperation: the Mérida Initiative and Beyond Congressional Research Service 27 Similar
U.S.-Mexican Security Cooperation: the Merida Initiative and Beyond
2010-08-16
2010, those funds had yet to be transferred from the State Department to USAID for implementation. 71 “Cárteles Perturban al Sistema Carcelario,” El...Quejas a Web .” Milenio. July 28, 2010. U.S.-Mexican Security Cooperation: the Mérida Initiative and Beyond Congressional Research Service 27
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-16
... DEPARTMENT OF HOMELAND SECURITY Cooperative Research and Development Agreement (CRADA) Opportunity With the Department of Homeland Security for the Development of a Foot-and-Mouth Disease 3ABC ELISA... in developing and validating an ELISA diagnostic kit for detection of Foot and Mouth Disease Virus...
Under Secretary of Defense for Policy > OUSDP Offices > ASD for
cooperation programs and foreign military sales programs in these regions. Responsibilities and Functions The defense establishments; and for oversight of security cooperation programs and foreign military sales all foreign governments in assigned areas of responsibility. Develop regional security and defense
2016-12-01
as a Fulbright Scholar at Durham University’s Institute of Advanced Study . Dr. Manjikian’s publications in- clude Apocalypse and Post -Politics: The...concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S
International cooperation in the solution to trade-related invasive species risks.
Perrings, Charles; Burgiel, Stas; Lonsdale, Mark; Mooney, Harold; Williamson, Mark
2010-05-01
In this paper, we consider the factors behind the growth of invasive species as a global problem, and the scope for international cooperation and coordination in addressing that problem. This is limited by the terms of the various international agreements governing trade, health, and biodiversity. The default strategy in most cases has two parts: border protection and the control of or adaptation to introduced species that have escaped detection at the border. Most invasive species policy involves unilateral national defensive action as opposed to coordinated international action. We argue that an important part of the solution to the problem lies in global coordination and cooperation in the management of both pathways and sanitary and phytosanitary risks at all scales. More particularly, because invasive species are an externality of trade, transport, and travel that involve public goods, they require collective regulation of international markets that goes beyond that admitted under the World Trade Organization's (WTO) Agreement on the Application of Sanitary and Phytosanitary Measures. We argue that it is important to bring that agreement into conformity with the International Health Regulations (IHR), and to develop an international mechanism to generate and disseminate information on invasive species risks and their impacts.
Governance: The Mission Ingredient in Security Cooperation
2017-06-09
assistance guiding principle of “do-no-harm,” should be included in the future DOS guidance. Seven do-no-harm lessons include: (1) norms and... principle of “do-no-harm.” 15. SUBJECT TERMS Security cooperation, security assistance, defense institution building, USAID, best practices...foreign assistance guiding principle of “do-no-harm,” should be included in the future DOS guidance. Seven do-no-harm lessons include: (1) norms and
Globalization of the International Arms Industry: A Step Towards ABCA and NATO Interoperability?
2009-04-01
adversely affect national security. In the words of Bitzinger the challenge will be to: “distinguish between ‘good’ globalization and ‘ bad ...accurately captured the dilemma when he stated that: “We’re not just making toothpaste ; we’re in the business of national security. National borders do
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-10
... Protection, DHS/CBP--017 Analytical Framework for Intelligence (AFI) System of Records AGENCY: Privacy Office... Homeland Security/U.S. Customs and Border Protection, DHS/CBP--017 Analytical Framework for Intelligence... Analytical Framework for Intelligence (AFI) System of Records'' from one or more provisions of the Privacy...
19 CFR 122.188 - Issuance of temporary Customs access seal.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 19 Customs Duties 1 2012-04-01 2012-04-01 false Issuance of temporary Customs access seal. 122.188 Section 122.188 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.188 Issuance of...
19 CFR 122.188 - Issuance of temporary Customs access seal.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 19 Customs Duties 1 2014-04-01 2014-04-01 false Issuance of temporary Customs access seal. 122.188 Section 122.188 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.188 Issuance of...
19 CFR 122.188 - Issuance of temporary Customs access seal.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 19 Customs Duties 1 2013-04-01 2013-04-01 false Issuance of temporary Customs access seal. 122.188 Section 122.188 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.188 Issuance of...
76 FR 29257 - Accreditation of Intertek USA, Inc., as a Commercial Laboratory
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-20
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation of Intertek USA... Security. ACTION: Notice of accreditation of Intertek USA, Inc., as a commercial laboratory. SUMMARY: Notice is hereby given that, pursuant to 19 CFR 151.12, Intertek USA, Inc., 8500 West Bay Road MS 37...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-09
..., DHS. ACTION: Notice. SUMMARY: The United States and Canada are staunch allies, vital economic partners... in which the United States and Canada share responsibility for the security and resilience of our..., while working together to facilitate the flows of legitimate travel and trade. Beyond the Border...
76 FR 55082 - Re-Accreditation and Re-Approval of SGS North America, Inc. as a Commercial Gauger
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-06
... DEPARTMENT OF HOMELAND SECURITY Bureau of Customs and Border Protection Re-Accreditation and Re..., Department of Homeland Security. ACTION: Notice of re-approval of SGS North America, Inc., Baytown, Texas, as... America, Inc., Baytown, Texas 78408, has been re-approved to gauge petroleum and petroleum products...
76 FR 64966 - Re-Accreditation and Re-Approval of Intertek Caleb Brett as a Commercial Gauger
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-19
....gov/xp/cgov/import/operations_support/labs_scientific_svcs/org_and_operations.xml . DATES: The re... DEPARTMENT OF HOMELAND SECURITY Bureau of Customs and Border Protection Re-Accreditation and Re..., Department of Homeland Security. ACTION: Notice of re-approval of Intertek Caleb Brett, Ponce, Puerto Rico...
TeraSCREEN: multi-frequency multi-mode Terahertz screening for border checks
NASA Astrophysics Data System (ADS)
Alexander, Naomi E.; Alderman, Byron; Allona, Fernando; Frijlink, Peter; Gonzalo, Ramón; Hägelen, Manfred; Ibáñez, Asier; Krozer, Viktor; Langford, Marian L.; Limiti, Ernesto; Platt, Duncan; Schikora, Marek; Wang, Hui; Weber, Marc Andree
2014-06-01
The challenge for any security screening system is to identify potentially harmful objects such as weapons and explosives concealed under clothing. Classical border and security checkpoints are no longer capable of fulfilling the demands of today's ever growing security requirements, especially with respect to the high throughput generally required which entails a high detection rate of threat material and a low false alarm rate. TeraSCREEN proposes to develop an innovative concept of multi-frequency multi-mode Terahertz and millimeter-wave detection with new automatic detection and classification functionalities. The system developed will demonstrate, at a live control point, the safe automatic detection and classification of objects concealed under clothing, whilst respecting privacy and increasing current throughput rates. This innovative screening system will combine multi-frequency, multi-mode images taken by passive and active subsystems which will scan the subjects and obtain complementary spatial and spectral information, thus allowing for automatic threat recognition. The TeraSCREEN project, which will run from 2013 to 2016, has received funding from the European Union's Seventh Framework Programme under the Security Call. This paper will describe the project objectives and approach.
Unresolved legal questions in cross-border health care in Europe: liability and data protection.
van der Molen, I N; Commers, M J
2013-11-01
Directive 2011/24/EU was designed to clarify the rights of EU citizens in evaluating, accessing and obtaining reimbursement for cross-border care. Based on three regional case studies, the authors attempted to assess the added value of the Directive in helping clarify issues in to two key areas that have been identified as barriers to cross-border care: liability and data protection. Qualitative case study employing secondary data sources including research of jurisprudence, that set up a Legal framework as a base to investigate liability and data protection in the context of cross-border projects. By means of three case studies that have tackled liability and data protection hurdles in cross-border care implementation, this article attempts to provide insight into legal certainty and uncertainty regarding cross-border care in Europe. The case studies reveal that the Directive has not resolved core uncertainties related to liability and data protection issues within cross-border health care. Some issues related to the practice of cross-border health care in Europe have been further clarified by the Directive and some direction has been given to possible solutions for issues connected to liability and data protection. Directive 2011/24/EU is clearly a transposition of existing regulations on data protection and ECJ case law, plus a set of additional, mostly, voluntary rules that might enhance regional border cooperation. Therefore, as shown in the case studies, a practical and case by case approach is still necessary in designing and providing cross-border care. © 2013 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.
Cooperative global security programs modeling & simulation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Briand, Daniel
2010-05-01
The national laboratories global security programs implement sustainable technical solutions for cooperative nonproliferation, arms control, and physical security systems worldwide. To help in the development and execution of these programs, a wide range of analytical tools are used to model, for example, synthetic tactical environments for assessing infrastructure protection initiatives and tactics, systematic approaches for prioritizing nuclear and biological threat reduction opportunities worldwide, and nuclear fuel cycle enrichment and spent fuel management for nuclear power countries. This presentation will describe how these models are used in analyses to support the Obama Administration's agenda and bilateral/multinational treaties, and ultimately, to reducemore » weapons of mass destruction and terrorism threats through international technical cooperation.« less
NORAD: A Model to Address Gaps in US-Mexico Security Coordination
2016-05-26
37 slow economic recovery throughout the 1930s by creating a national investment bank , accelerating land reforms, and nationalizing the...population formed in northern Mexico, with unemployment rates rising as high as fifty percent in border cities such as Ciudad Juárez, Tijuana, and...Mexicali.178 To address unemployment in the historically volatile border region, the Mexican government instituted a series of economic development
Countering Violence Along the United States - Mexico Border: Thinking Strategically
2011-06-01
control more of the wholesale distribution of heroin, methamphetamine , and marijuana distribution than other major drug trafficking organizations in the...intrusive inspection equipment—enhancing border security by expanding CBP capabilities to scan commercial traffic for contraband through the use of X ... ray and other imaging technologies. 8 The use of commercial aircraft as a way to smuggle drugs into the U.S. from Mexico is not a method used
Borders, Corridors, and Economics: The Keys to Stopping Cross Border Violence
2013-04-22
control in the United States. The Tijuana Cartel, Federation Cartel, Gulf Cartel, Juarez Cartel, Sinaloa Cartel, Knights Templar Cartel, and Los Zetas...defeated rule of law and legitimate commerce migrated toward security. The lack of rule of law transmitted violence across Peru and was perpetuated by...million people live in poverty in Mexico. Deeply impoverished and unemployed people in Mexico have three options for survival: migration , tenuous and
Network-based reading system for lung cancer screening CT
NASA Astrophysics Data System (ADS)
Fujino, Yuichi; Fujimura, Kaori; Nomura, Shin-ichiro; Kawashima, Harumi; Tsuchikawa, Megumu; Matsumoto, Toru; Nagao, Kei-ichi; Uruma, Takahiro; Yamamoto, Shinji; Takizawa, Hotaka; Kuroda, Chikazumi; Nakayama, Tomio
2006-03-01
This research aims to support chest computed tomography (CT) medical checkups to decrease the death rate by lung cancer. We have developed a remote cooperative reading system for lung cancer screening over the Internet, a secure transmission function, and a cooperative reading environment. It is called the Network-based Reading System. A telemedicine system involves many issues, such as network costs and data security if we use it over the Internet, which is an open network. In Japan, broadband access is widespread and its cost is the lowest in the world. We developed our system considering human machine interface and security. It consists of data entry terminals, a database server, a computer aided diagnosis (CAD) system, and some reading terminals. It uses a secure Digital Imaging and Communication in Medicine (DICOM) encrypting method and Public Key Infrastructure (PKI) based secure DICOM image data distribution. We carried out an experimental trial over the Japan Gigabit Network (JGN), which is the testbed for the Japanese next-generation network, and conducted verification experiments of secure screening image distribution, some kinds of data addition, and remote cooperative reading. We found that network bandwidth of about 1.5 Mbps enabled distribution of screening images and cooperative reading and that the encryption and image distribution methods we proposed were applicable to the encryption and distribution of general DICOM images via the Internet.
76 FR 39076 - Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-05
... Defense (Policy); Department of State; US Northern Command and US Southern Command meeting on December 3rd... DEPARTMENT OF DEFENSE Department of the Army Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY...
2010-05-04
President Bush, Obama is quite popular in Canada. The two North American countries continue to cooperate widely in international security and...37 North American Cooperation on Competitiveness and Security ................................................. 38 Issue Definition...Agreement, and the 1994 North American Free Trade Agreement. To many Canadians, however, Ottawa seemed at times to have drawn a bit too close to
Hop, G E; Mourits, M C M; Oude Lansink, A G J M; Saatkamp, H W
2014-08-01
This paper analyses the potential gains and the main challenges for increased cross-border collaboration in the control of highly contagious livestock diseases in regions with cross-border reliance on production and consumption of livestock commodities. The aim of this intensification of cross-border collaboration is to retain the economic advantages of cross-border trade in livestock and livestock commodities while maintaining a low risk of highly contagious livestock diseases. From these two foci, possibilities for future policy making with respect to highly contagious livestock diseases are discussed: peacetime cross-border cooperation to improve the cost-effectiveness of routine veterinary measures and crisis time cross-border harmonization of current disease control strategies. A general disease management framework was used to describe the way in which these two fields are related to and affect the epidemiological system and, consequently, how they impact the stakeholders. In addition to this framework, the importance of a good understanding of influencing factors, that is, the production structure of livestock, was stressed because these factors are important determinants of the frequency and magnitude of highly contagious livestock diseases and their economic impact. The use of the suggested integrated approach was illustrated for the extended cross-border region of the Netherlands and Germany, that is, North Rhine Westphalia and Lower Saxony. For this region, current difficulties in cross-border trade in livestock and livestock commodities and possibilities for future cross-border collaboration were examined. The concepts and ideas presented in this paper should foster future development of cross-border collaboration in animal health control. © 2012 Blackwell Verlag GmbH.
A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Stelios, Yannis; Papayanoulas, Nikos; Trakadas, Panagiotis; Maniatis, Sotiris; Leligou, Helen C.; Zahariadis, Theodore
Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours in their way to the sink node. This implies that malicious nodes (denying their cooperation) can significantly affect the network operation. Trust management schemes provide a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them either for data forwarding, data aggregation or any other cooperative function. We propose a secure routing solution based on a novel distributed trust management system, which allows for fast detection of a wide set of attacks and also incorporates energy awareness.
2007-05-10
U.S. Naval War College, National Security Decision Making handout dated 19 April 2006, page 2. 15 Geoffrey Crawford, The Posse Comitatus Act...2. 20 Shawn Burns, Homeland Security Considerations, U.S. Naval War College, National Security Decision Making handout dated 19 April 2006, page 3...States.42 The routes that make free-flowing ports of entry so attractive for 40 Ibid. Vallone
The European cooperative approach to securing critical information infrastructure.
Purser, Steve
2011-10-01
This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.
Cooperative Atmosphere-Surface Exchange Study-1999.
NASA Astrophysics Data System (ADS)
Moeng, Chin-Hoh; Poulos, Gregory S.; Lemone, Margaret A.
2003-10-01
Surface-station, radiosonde, and Doppler minisodar data from the Cooperative Atmosphere-Surface Exchange Study-1997 (CASES-97) field project, collected in a 60-km-wide array in the lower Walnut River watershed (terrain variation 150 m) southeast of Wichita, Kansas, are used to study the relationship of the change of the 2-m potential temperature 2m with station elevation ze, 2m/ze ,ze to the ambient wind and thermal stratification /z ,z during fair-weather nights. As in many previous studies, predawn 2m varies linearly with ze, and ,ze ,z over a depth h that represents the maximum elevation range of the stations. Departures from the linear 2m-elevation relationship (
,ze line) are related to vegetation (cool for vegetation, warm for bare ground), local terrain (drainage flows from nearby hills, although a causal relationship is not established), and the formation of a cold pool at lower elevations on some days.
The near-surface flow and its evolution are functions of the Froude number Fr = S/(Nh), where S is the mean wind speed from the surface to h, and N is the corresponding Brunt-Väisälä frequency. The near-surface wind is coupled to the ambient flow for Fr = 3.3, based on where the straight line relating
,ze to ln Fr intersects the ln Fr axis. Under these conditions,
2m is constant horizontally even though
,z > 0, suggesting that near-surface air moves up- and downslope dry adiabatically. However,
2m cools (or warms) everywhere at the same rate. The lowest Froude numbers are associated with drainage flows, while intermediate values characterize regimes with intermediate behavior. The evolution of
2m horizontal variability σ
through the night is also a function of the predawn Froude number. For the nights with the lowest Fr, the σ
maximum occurs in the last 1-3 h before sunrise. For nights with Fr
3.3 (
,ze
0) and for intermediate values, σ
peaks 2-3 h after sunset. The standard deviations relative to the
,ze line reach their lowest values in the last hours of darkness. Thus, it is not surprising that the relationships of
,ze to Fr and
,z based on data through the night show more scatter, and
,ze
0.5
,z in contrast to the predawn relationship. However,
,ze
0 for ln Fr = 3.7, a value similar to that just before sunrise.
A heuristic Lagrangian parcel model is used to explain the horizontal uniformity of time-evolving
2m when the surface flow is coupled with the ambient wind, as well as both the linear variation of
2m with elevation and the time required to reach maximum values of σ
under drainage-flow conditions.
Influence through Airpower Security Cooperation in Egypt and Pakistan: Lessons for Iraq
2007-12-01
reengage the world’s primary arms suppliers (who happened to be the five permanent members of the U.N. Security Council) in cooperative restrictions...billion over five years, the purpose of which was to give “Pakistan confidence in our commitment to its security and provide us with reciprocal...prospect of nuclear war.72 The ongoing dispute with India over Kashmir in particular is a “ tinder box” issue over which the positions of the United
2005-02-14
hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed , and...the national level, the National Security Act of 1947 (NSA 47) mandates the need for interagency cooperation.6 In this regard, the National Security...within DoD, it lacks a central body or mechanism to provide the overarching, truly ’global’ oversight and guidance needed to ensure adequate interagency
1982-12-01
ADA2 690 PERSANGU SECUR HEUNEDSAESANDOMANHE / GUL COOPERATION CO..U) NAVAL POSTGRADUATE SCHOOL NC MONTEREY CA J A GAWLIK DEC 82CASSIFIED F/G 5/4 NL...CHART NATIONAL BUREAU OF STANDARDS 1963 A 1 NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS PERSIAN GULF SECURITY: THE UNITED STATES AND OMAN...5 PRA OGR NIT uw Naval Postgraduate School Monterey, California 93940 1i. CONTROLLIUG OPPICe NAME AND LOSOESS Ia. REPORT OATS Naval Postgraduate
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... users in the field in preventing the illegal entry of people and goods, or identifying other violations....g., Employer Identification Number (EIN) or Social Security Number (SSN), where available). f... entry of people and goods, or identifying other violations of law; (2) Allow analysts to conduct...
National Center for Border Security and Immigration
Research Contributing to the Development of "Smart Machines" August 21, 2014 Research Opportunity with DARPA August 21, 2014 Internship Opportunity with the White House Liaison's Office at the Department of Homeland Security August 21, 2014 Pages 1 2 3 4 5 6 7 8 next ⺠last » Recent Newsletter
Rep. Quigley, Mike [D-IL-5
2009-06-18
House - 07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-28
... teleconference. The meeting is limited to one topic, the 2010 National Strategy for Global Supply Chain Security... COAC will meet to discuss its views on the development of the 2010 National Strategy for Global Supply Chain Security. Public Participation: This meeting is open to the public; however, participation in COAC...
Rep. Castle, Michael N. [R-DE-At Large
2010-07-30
House - 09/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Homeland Security: Budget-in-Brief FY 2006
2005-01-11
nearly 11,000 undocumented migrants attempting to enter the country illegally by sea. • USCG saved the lives of nearly 5,500 mariners in distress and...well as more than 1,368 arrests and 895 indictments for money laundering and other financial crimes. ICE agents also conducted more than 2,500...than merely across the border. This program improves control of the border and save lives by returning Mexican migrants into the interior of Mexico
The Gap in Operation and Maintenance of the Afghan National Security Forces Infrastructure
2013-05-22
organizations. They include the Afghan Border Police ( ABP ), the Afghan Uniform Police (AUP), the Afghan Highway Police (AHP), and the Criminal...other elements under the ANP include the Afghan Border Police ( ABP ), the Afghan Uniformed Police (AUP), the Afghan Highway Police (AHP) and the...delineates the authorized personnel and equipment for the army. The ANP tashkil delineates the authorized personnel and equipment for the AUP, ABP , AHP, and
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jimenez, Richard, D., Dr.
2007-10-01
The U.S. Department of Energy (DOE) maintains a strong commitment to transfer the results of its science and technology programs to the private sector. The intent is to apply innovative and sometimes advanced technologies to address needs while simultaneously stimulating new commercial business opportunities. Such focused “technology transfer” was evident in the late 1990s as the results of DOE investments in environmental management technology development led to new tools for characterizing and remediating contaminated sites as well as handling and minimizing the generation of hazardous wastes. The Department’s Office of Environmental Management was attempting to reduce the cost, accelerate themore » schedule, and improve the efficacy of clean-up efforts in the nuclear weapons complex. It recognized that resulting technologies had broader world market applications and that their commercialization would further reduce costs and facilitate deployment of improved technology at DOE sites. DOE’s Albuquerque Operations Office (now part of the National Nuclear Security Administration) began in 1995 to build the foundation for a technology exchange program with Mexico. Initial sponsorship for this work was provided by the Department’s Office of Environmental Management. As part of this effort, Applied Sciences Laboratory, Inc. (ASL) was contracted by the DOE Albuquerque office to identify Mexico’s priority environmental management needs, identify and evaluate DOE-sponsored technologies as potential solutions for those needs, and coordinate these opportunities with decision makers from Mexico’s federal government. That work led to an improved understanding of many key environmental challenges that Mexico faces and the many opportunities to apply DOE’s technologies to help resolve them. The above results constituted, in large part, the foundation for an initial DOE-funded program to apply the Department’s technology base to help address some of Mexico’s challenging environmental issues. The results also brought focus to the potential contributions that DOE’s science and technology could make for solving the many difficult, multi-generational problems faced by hundreds of bi-national communities along the 2,000-mile shared border of the United States and Mexico. Efforts to address these U.S.-Mexico border issues were initially sponsored by the DOE’s Albuquerque and Carlsbad offices. In subsequent years, the U.S. Congress directed appropriations to DOE’s Carlsbad office to address public health, safety and security issues prevalent within U.S.-Mexico border communities. With ASL’s assistance, DOE’s Albuquerque office developed contacts and formed partnerships with interested U.S and Mexican government, academic, and commercial organizations. Border industries, industrial effluents, and public health conditions were evaluated and documented. Relevant technologies were then matched to environmental problem sets along the border. Several technologies that were identified and subsequently supported by this effort are now operational in a number of U.S.-Mexico border communities, several communities within Mexico’s interior states, and in other parts of Latin America. As a result, some serious public health threats within these communities caused by exposure to toxic airborne pollutants have been reduced. During this time, DOE’s Carlsbad office hosted a bilateral conference to establish a cross-border consensus on what should be done on the basis of these earlier investigative efforts. Participating border region stakeholders set an agenda for technical collaborations. This agenda was supported by several Members of Congress who provided appropriations and directed DOE’s Carlsbad office to initiate technology demonstration projects. During the following two years, more than 12 private-sector and DOE-sponsored technologies were demonstrated in partnership with numerous border community stakeholders. All technologies were well received and their effectiveness at addressing health, safety and security issues was successfully demonstrated. Several of these technologies, including those noted above and demonstrated under this effort, are now operational. Furthermore, a number of public and national security issues unique to the U.S.-Mexico border were brought to the attention of the federal government and are now being addressed, largely through the efforts of the U.S. Department of Homeland Security. Program results demonstrated the value and effectiveness of the program’s process for technology exchanges. Opportunities now exist to transition the program from its successful initial stage to one where it can more effectively address a broader spectrum of multi-disciplinary problems that impact millions of U.S. and Mexican citizens. Substantial benefits would accrue to both sides of the U.S.-Mexico border were the two countries to continue this collaboration.« less
Biological Terrorism: US Policies to Reduce Global Biothreats
2008-09-01
program for pro- jects that advance BEP objectives. Global Cooperation to develop bio- safety and pathogen security stan- dards that are consistent with...security. The Organization for Economic Cooperation and Development ( OECD ) has recently developed voluntary biosecurity guidelines for implementation...Abbreviations AG Australia Group BEP Biosecurity Engagement Program BSL Biosafety level BWC Biological Weapons Convention BWC-ISU Biological Weapons
A security mechanism based on evolutionary game in fog computing.
Sun, Yan; Lin, Fuhong; Zhang, Nan
2018-02-01
Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present an extensive geographical distribution. In this study, a credible third party was introduced to supervise the behavior of users and protect the security of user cooperation. A fog computing security mechanism based on human nervous system is proposed, and the strategy for a stable system evolution is calculated. The MATLAB simulation results show that the proposed mechanism can reduce the number of attack behaviors effectively and stimulate users to cooperate in application tasks positively.
Effectiveness of the Civil Aviation Security Program.
1980-05-22
SECURITY. - CONTINUED TRAINING OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. - SECURITY PROGRAMS IMPLEMENTED BY AIR FREIGHT...cooperation by all concerned. (See Exhibit 14) Airport Security - Ongoing activities which contributed significantly to airport security included full...implementation of the revised Federal Aviation Regulations (FAR) Part 107 governing airport security , training of law enforcement officers supporting
Evaluation of vincristine-associated myelosuppression in Border Collies.
Lind, Denise L; Fidel, Janean L; Gay, John M; Mealey, Katrina L
2013-02-01
To determine whether Border Collies (ATP binding cassette subfamily B1 gene [ABCB1] wildtype) were more likely than other breeds to develop vincristine-associated myelosuppression (VAM) and, if so, whether this was caused by a mutation in ABCB1 distinct from ABCB1-1Δ. Phase 1 comprised 36 dogs with the ABCB1 wildtype, including 26 dogs with lymphoma (5 Border Collies and 21 dogs representing 13 other breeds) treated with vincristine in a previous study; phase 2 comprised 10 additional Border Collies, including 3 that developed VAM and 7 with an unknown phenotype. For phase 1, the prevalence of VAM in ABCB1-wildtype Border Collies was compared with that for ABCB1-wildtype dogs of other breeds with data from a previous study. For phase 2, additional Border Collies were included. Hematologic adverse reactions were graded with Veterinary Co-operative Oncology Group criteria. Genomic DNA was used to amplify and sequence all 27 exons of the canine ABCB1. Sequences from affected dogs were compared with those of unaffected dogs and dogs of unknown phenotype. 3 of 5 Border Collies with the ABCB1 wildtype developed VAM; this was significantly higher than the proportion of other dogs that developed VAM (0/21). A causative mutation for VAM in Border Collies was not identified, although 8 single nucleotide polymorphisms in ABCB1 were detected. Breed-associated sensitivity to vincristine unrelated to ABCB1 was detected in Border Collies. Veterinarians should be aware of this breed predisposition to VAM. Causes for this apparent breed-associated sensitivity should be explored.
Cross-border Portfolio Investment Networks and Indicators for Financial Crises
Joseph, Andreas C.; Joseph, Stephan E.; Chen, Guanrong
2014-01-01
Cross-border equity and long-term debt securities portfolio investment networks are analysed from 2002 to 2012, covering the 2008 global financial crisis. They serve as network-proxies for measuring the robustness of the global financial system and the interdependence of financial markets, respectively. Two early-warning indicators for financial crises are identified: First, the algebraic connectivity of the equity securities network, as a measure for structural robustness, drops close to zero already in 2005, while there is an over-representation of high-degree off-shore financial centres among the countries most-related to this observation, suggesting an investigation of such nodes with respect to the structural stability of the global financial system. Second, using a phenomenological model, the edge density of the debt securities network is found to describe, and even forecast, the proliferation of several over-the-counter-traded financial derivatives, most prominently credit default swaps, enabling one to detect potentially dangerous levels of market interdependence and systemic risk. PMID:24510060
NASA Astrophysics Data System (ADS)
Hildebrandt, Mario; Dittmann, Jana; Vielhauer, Claus; Leich, Marcus
2011-11-01
The preventive application of automated latent fingerprint acquisition devices can enhance the Homeland Defence, e.g. by improving the border security. Here, contact-less optical acquisition techniques for the capture of traces are subject to research; chromatic white light sensors allow for multi-mode operation using coarse or detailed scans. The presence of potential fingerprints could be detected using fast coarse scans. Those Regions-of- Interest can be acquired afterwards with high-resolution detailed scans to allow for a verification or identification of individuals. An acquisition and analysis of fingerprint traces on different objects that are imported or pass borders might be a great enhancement for security. Additionally, if suspicious objects require a further investigation, an initial securing of potential fingerprints could be very useful. In this paper we show current research results for the coarse detection of fingerprints to prepare the detailed acquisition from various surface materials that are relevant for preventive applications.
Cross-border Portfolio Investment Networks and Indicators for Financial Crises
NASA Astrophysics Data System (ADS)
Joseph, Andreas C.; Joseph, Stephan E.; Chen, Guanrong
2014-02-01
Cross-border equity and long-term debt securities portfolio investment networks are analysed from 2002 to 2012, covering the 2008 global financial crisis. They serve as network-proxies for measuring the robustness of the global financial system and the interdependence of financial markets, respectively. Two early-warning indicators for financial crises are identified: First, the algebraic connectivity of the equity securities network, as a measure for structural robustness, drops close to zero already in 2005, while there is an over-representation of high-degree off-shore financial centres among the countries most-related to this observation, suggesting an investigation of such nodes with respect to the structural stability of the global financial system. Second, using a phenomenological model, the edge density of the debt securities network is found to describe, and even forecast, the proliferation of several over-the-counter-traded financial derivatives, most prominently credit default swaps, enabling one to detect potentially dangerous levels of market interdependence and systemic risk.
Cross-border portfolio investment networks and indicators for financial crises.
Joseph, Andreas C; Joseph, Stephan E; Chen, Guanrong
2014-02-10
Cross-border equity and long-term debt securities portfolio investment networks are analysed from 2002 to 2012, covering the 2008 global financial crisis. They serve as network-proxies for measuring the robustness of the global financial system and the interdependence of financial markets, respectively. Two early-warning indicators for financial crises are identified: First, the algebraic connectivity of the equity securities network, as a measure for structural robustness, drops close to zero already in 2005, while there is an over-representation of high-degree off-shore financial centres among the countries most-related to this observation, suggesting an investigation of such nodes with respect to the structural stability of the global financial system. Second, using a phenomenological model, the edge density of the debt securities network is found to describe, and even forecast, the proliferation of several over-the-counter-traded financial derivatives, most prominently credit default swaps, enabling one to detect potentially dangerous levels of market interdependence and systemic risk.
Advanced Ship Detection For Spaceborne Based Maritime Awareness
NASA Astrophysics Data System (ADS)
Radius, Andrea; Ferreira, Joao; Carmo, Paulo; Marques, Paulo
2013-12-01
In the last years the increase in marine traffic generated the necessity of global monitoring for marine environment management in terms of safety, security and fisheries. The increasing number of new satellite-based Synthetic Aperture Radar (SAR) systems, and the intrinsic capability of the transmitted electromagnetic pulses to interact with the ships and to retrieve its cinematic characteristics, made this instrument particularly fit to improve global maritime awareness through the fusion with cooperative data (AIS, VMS, LRIT). The growing need of global maritime awareness gave a push to the realization of different projects in the European context, each one focused on a different particular objective. Particularly useful is the synergy between the operational and research aspects, being the goal of the last to improve the state of the art in the field of ship detection. Two European projects are the key to strive this synergy: the project MARitime Security Service (MARISS), which implements the operational capability, and the R&D Dolphin projects, which is focused on the deep exploitation of remote sensing data and on the technological development of advanced techniques for ship detection and classification purposes, and Seabilla project, which is also dedicated to improve the current ship detection capability and to fuse all the available information from different data sources for border surveillance optimization. This paper introduces the multipurpose Edisoft Vessel Detection software (EdiVDC) implemented by the EDISOFT company, which comes from the necessity to respect increasingly stringent requirements in terms of ship detection. The EdiVDC software is being operationally used in the framework of the MARISS project and it integrates advanced processing algorithms, developed in the scope of the Dolphin project with the cooperation of ISEL-IT (Instituto de Telecomunicações), and data simulators, developed in the context of the Seabilla project, improving the software capability and introducing new functionalities. In this work we present the functionalities of the software and the main results achieved with different types of SAR data.
A REGIONAL ECOLOGICAL ANALYSIS OF THE GREAT LAKES BASIN
The U.S. Environmental Protection Agency (EPA) and Natural Resources Canada: Canada Centre for Remote Sensing (CCRS) are conducting a cooperative research landscape ecological study of the Great Lakes Basin. The analyses will include the areas located along the border of the Unit...
A LANDSCAPE ECOLOGY ANALYSIS OF THE GREAT LAKES BASIN
The U.S. Environmental Protection Agency (EPA) and Natural Resources Canada: Canada Centre for Remote Sensing (CCRS) are conducting a cooperative research landscape ecological study of the Great Lakes Basin. The analyses will include the areas located along the border of the Unit...
Pongvongsa, Tiengkham; Ha, Hoang; Thanh, Le; Marchand, Ron P; Nonaka, Daisuke; Tojo, Bumpei; Phongmany, Panom; Moji, Kazuhiko; Kobayashi, Jun
2012-08-03
In Savannakhet province, Laos and Quang Tri province, Vietnam, malaria is still an important health problem and most cases are found in the mountainous, forested border areas where ethnic minority groups live. The objectives of this study were to obtain a better joint understanding of the malaria situation along the border and, on the basis of that, improve malaria control methods through better cooperation between the two countries. Fourteen villages in Savannakhet and 22 villages in Quang Tri were randomly selected within 5 km from the border where a blood survey for microscopic diagnosis (n = 1256 and n = 1803, respectively), household interviews (n = 400, both sides) and vector surveys were conducted between August and October 2010. Satellite images were used to examine the forest density around the study villages. Malaria prevalence was significantly higher in Laos (5.2%) than in Vietnam (1.8%) and many other differences were found over the short distance across the border. Bed net coverage was high (> 90%) in both Laos and Vietnam but, while in Laos more than 60% of the nets were long-lasting insecticide-treated, Vietnam used indoor residual spraying in this area and the nets were untreated. Anopheles mosquitoes were more abundant in Laos than in Vietnam, especially many Anopheles dirus were captured in indoor light traps while none were collected in Vietnam. The forest cover was higher around the Lao than the Vietnamese villages. After this study routine exchange of malaria surveillance data was institutionalized and for the first time indoor residual spraying was applied in some Lao villages. The abundance of indoor-collected An. dirus on the Laos side raises doubts about the effectiveness of a sole reliance on long-lasting insecticide-treated nets in this area. Next to strengthening the early detection, correct diagnosis and prompt, adequate treatment of malaria infections, it is recommended to test focal indoor residual spraying and the promotion of insect repellent use in the early evening as additional vector interventions. Conducting joint malaria surveys by staff of two countries proved to be effective in stimulating better collaboration and improve cross-border malaria control.
Security Sector Reform’s Utility in Conflict Prevention
2013-12-10
Publications, 1994), 18. 40 Many of these countries in Africa are states in name only due to ill defined borders, fiscal limitations, nomadic ...Security Watch, 12 OCT 2009), Online at http://www.isn.ethz.ch/isn/ Digital -Library/Articles/Detail/?lng= en&id= 108451[accessed on 27 May 2013]. 85...ISN Security Watch, 12 OCT 2009. Online at http://www.isn.ethz.ch/isn/ Digital -Library/Articles/Detail/?lng= en&id= 108451[accessed on 27 May 2013
Evaluation of Different Features for Face Recognition in Video
2014-09-01
and Security Program (CSSP) which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public ...Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2014...deployment of innovative technologies for public safety and security practitioners to achieve specific objectives; 4. Threats/Hazards F – Major trans-border
Securing co-operation from persons supplying statistical data
Aubenque, M. J.; Blaikley, R. M.; Harris, F. Fraser; Lal, R. B.; Neurdenburg, M. G.; Hernández, R. de Shelly
1954-01-01
Securing the co-operation of persons supplying information required for medical statistics is essentially a problem in human relations, and an understanding of the motivations, attitudes, and behaviour of the respondents is necessary. Before any new statistical survey is undertaken, it is suggested by Aubenque and Harris that a preliminary review be made so that the maximum use is made of existing information. Care should also be taken not to burden respondents with an overloaded questionnaire. Aubenque and Harris recommend simplified reporting. Complete population coverage is not necessary. Neurdenburg suggests that the co-operation and support of such organizations as medical associations and social security boards are important and that propaganda should be directed specifically to the groups whose co-operation is sought. Informal personal contacts are valuable and desirable, according to Blaikley, but may have adverse effects if the right kind of approach is not made. Financial payments as an incentive in securing co-operation are opposed by Neurdenburg, who proposes that only postage-free envelopes or similar small favours be granted. Blaikley and Harris, on the other hand, express the view that financial incentives may do much to gain the support of those required to furnish data; there are, however, other incentives, and full use should be made of the natural inclinations of respondents. Compulsion may be necessary in certain instances, but administrative rather than statutory measures should be adopted. Penalties, according to Aubenque, should be inflicted only when justified by imperative health requirements. The results of surveys should be made available as soon as possible to those who co-operated, and Aubenque and Harris point out that they should also be of practical value to the suppliers of the information. Greater co-operation can be secured from medical persons who have an understanding of the statistical principles involved; Aubenque and Neurdenburg suggest that a course in elementary statistical methodology be introduced in the curriculum of medical schools. Methods for improving co-operation, and thus the compilation of statistics, in particular countries are discussed by Lal and de Shelly Hernández, who deal with India and Venezuela respectively. PMID:13199667
A cognitive and economic decision theory for examining cyber defense strategies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bier, Asmeret Brooke
Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participantsmore » interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.« less
MEMS and MOEMS for national security applications
NASA Astrophysics Data System (ADS)
Scott, Marion W.
2003-01-01
Major opportunities for microsystem insertion into commercial applications, such as telecommunications and medical prosthesis, are well known. Less well known are applications that ensure the security of our nation, the protection of its armed forces, and the safety of its citizens. Microsystems enable entirely new possibilities to meet National Security needs, which can be classed along three lines: anticipating security needs and threats, deterring the efficacy of identified threats, and defending against the application of these threats. In each of these areas, specific products that are enabled by MEMS and MOEMS are discussed. In the area of anticipating needs and threats, sensored microsystems designed for chem/bio/nuclear threats, and sensors for border and asset protection can significantly secure our borders, ports, and transportation systems. Key features for these applications include adaptive optics and spectroscopic capabilities. Microsystems to monitor soil and water quality can be used to secure critical infrastructure, food safety can be improved by in-situ identification of pathogens, and sensored buildings can ensure the architectural safety of our homes and workplaces. A challenge to commercializing these opportunities, and thus making them available for National Security needs, is developing predictable markets and predictable technology roadmaps. The integrated circuit manufacturing industry provides an example of predictable technology maturation and market insertion, primarily due to the existence of a "unit cell" that allows volume manufacturing. It is not clear that microsystems can follow an analogous path. The possible paths to affordable low-volume production, as well as the prospects of a microsystems unit cell, are discussed.
5 CFR 1312.22 - Responsibilities.
Code of Federal Regulations, 2012 CFR
2012-01-01
... computer systems meeting the appropriate security criteria. (a) EOP Security Officer. In cooperation with..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified... duty by employees will do much to ensure the adequate security of classified information in the...
5 CFR 1312.22 - Responsibilities.
Code of Federal Regulations, 2013 CFR
2013-01-01
... computer systems meeting the appropriate security criteria. (a) EOP Security Officer. In cooperation with..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified... duty by employees will do much to ensure the adequate security of classified information in the...
5 CFR 1312.22 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... computer systems meeting the appropriate security criteria. (a) EOP Security Officer. In cooperation with..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified... duty by employees will do much to ensure the adequate security of classified information in the...
5 CFR 1312.22 - Responsibilities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... computer systems meeting the appropriate security criteria. (a) EOP Security Officer. In cooperation with..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified... duty by employees will do much to ensure the adequate security of classified information in the...
5 CFR 1312.22 - Responsibilities.
Code of Federal Regulations, 2014 CFR
2014-01-01
... computer systems meeting the appropriate security criteria. (a) EOP Security Officer. In cooperation with..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified... duty by employees will do much to ensure the adequate security of classified information in the...
75 FR 69639 - Procurement List; Proposed Addition
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-15
... Graeber Street, March ARB, CA. NPA: ARC Riverside, Riverside, CA Contracting Activity: DEPT OF HOMELAND SECURITY, BUREAU OF CUSTOMS AND BORDER PROTECTION, WASHINGTON, DC. Barry S. Lineback, Director, Business...
Rep. Watson, Diane E. [D-CA-33
2009-06-26
House - 08/19/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Sen. Schumer, Charles E. [D-NY
2012-03-26
Senate - 03/27/2012 Committee on the Judiciary Subcommittee on Immigration, Refugees and Border Security . Hearings held. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Flake, Jeff [R-AZ-6
2009-03-30
House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Biometric Borders and Counterterrorism
2010-12-01
105 Gildas Avoine, Kassem Kalach and Jean-Jaques Quisquater, "EPassport: Securing International Contacts...2006): 336. Ashbourn, Julian. Practical Biometrics: From Aspiration to Implementation. London; New York: Springer, 2004. Avoine, Gildas, Kassem
A multi-sensor scenario for coastal surveillance
NASA Astrophysics Data System (ADS)
van den Broek, A. C.; van den Broek, S. P.; van den Heuvel, J. C.; Schwering, P. B. W.; van Heijningen, A. W. P.
2007-10-01
Maritime borders and coastal zones are susceptible to threats such as drug trafficking, piracy, undermining economical activities. At TNO Defence, Security and Safety various studies aim at improving situational awareness in a coastal zone. In this study we focus on multi-sensor surveillance of the coastal environment. We present a study on improving classification results for small sea surface targets using an advanced sensor suite and a scenario in which a small boat is approaching the coast. A next generation sensor suite mounted on a tower has been defined consisting of a maritime surveillance and tracking radar system, capable of producing range profiles and ISAR imagery of ships, an advanced infrared camera and a laser range profiler. For this suite we have developed a multi-sensor classification procedure, which is used to evaluate the capabilities for recognizing and identifying non-cooperative ships in coastal waters. We have found that the different sensors give complementary information. Each sensor has its own specific distance range in which it contributes most. A multi-sensor approach reduces the number of misclassifications and reliable classification results are obtained earlier compared to a single sensor approach.
2015-06-12
of people on advanced medicine has significantly increased; however, HIV still remains a lingering threat. Malaria and polio also continue to take a...toll on children due to the lack of vaccinations . 3 Based on this, there is a dire need to establish and/or reinforce an existing preventive
ERIC Educational Resources Information Center
Adelman, Clifford
2008-01-01
Each time the Organization for Economic Cooperation and Development announces that America's students are falling behind those of other countries, and with every business section article on America's trade deficit with China, America sees a new commission to reinforce the negatives and urge dramatic upgrading of the workforce. This author states…
The Evolution of the Security Order in Europe: Importance of Multinational Forces
1992-02-25
facto-- prevented the economic self - sufficiency of the republics.1 Therefore, it would have been necessary to agree some form of common market and...Defense Identity", Survival (July/August 1991), 336. 32 Douglas T. Stuart, "Can NATO Trascend Its Europeans Borders? NATO Out of Area Disputes", Strategic...Overaio (Novembre 1990): 1-18. Stuart, Douglas T. "Can NATO Trascend Its European Borders?." Strateoic Studies Institute (USAWC): 1-21. 48 Taylor
Automated Border Control Systems as Part of e-border Crossing Process
2015-01-01
which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety Canada. The project was led...Canada, as represented by the Minister of National Defence, 2015 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de...FAST US,EU (2013): AVATAR kiosks Examples: US, Canada: Deployed in Vancouver, Montreal, Toronto, and Chicago International Airports
Bordering on Failure: Mexican Instability, Drug Wars, and the Threat to U.S. Security
2012-04-19
NAFTA was that Mexico had to demonstrate it was not a one party political system; thus, the PRI began to loosen its suppression of opposition...events of 9/11, e.g., the employment of physical barriers, heightened technology, and increased law enforcement efforts along the U.S.-Mexico border...promises as he initially addressed Mexico as its president was to increase the budgets of the military, intelligence agencies, and law enforcement
Optimizing Distributed Sensor Placement for Border Patrol Interdiction Using Microsoft Excel
2007-04-01
weather conditions and they can be evaded by using techniques which minimize heat signatures use of lasers and other technologies day or night (26:8...technologies which can be used for border security. Maier [2004] developed a seismic intrusion sensor technology which uses fiber optic cables, lasers , and...needed to create the is used as the base map for the network. program originally developed by Keyhole by Google Inc. It provides satellite images of
Autonomous robot for detecting subsurface voids and tunnels using microgravity
NASA Astrophysics Data System (ADS)
Wilson, Stacy S.; Crawford, Nicholas C.; Croft, Leigh Ann; Howard, Michael; Miller, Stephen; Rippy, Thomas
2006-05-01
Tunnels have been used to evade security of defensive positions both during times of war and peace for hundreds of years. Tunnels are presently being built under the Mexican Border by drug smugglers and possibly terrorists. Several have been discovered at the border crossing at Nogales near Tucson, Arizona, along with others at other border towns. During this war on terror, tunnels under the Mexican Border pose a significant threat for the security of the United States. It is also possible that terrorists will attempt to tunnel under strategic buildings and possibly discharge explosives. The Center for Cave and Karst Study (CCKS) at Western Kentucky University has a long and successful history of determining the location of caves and subsurface voids using microgravity technology. Currently, the CCKS is developing a remotely controlled robot which will be used to locate voids underground. The robot will be a remotely controlled vehicle that will use microgravity and GPS to accurately detect and measure voids below the surface. It is hoped that this robot will also be used in military applications to locate other types of voids underground such as tunnels and bunkers. It is anticipated that the robot will be able to function up to a mile from the operator. This paper will describe the construction of the robot and the use of microgravity technology to locate subsurface voids with the robot.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rajen, Gauray
1999-06-01
The cessation of hostilities between India and Pakistan is an immediate need and of global concern, as these countries have tested nuclear devices, and have the capability to deploy nuclear weapons and long-range ballistic missiles. Cooperative monitoring projects among neighboring countries in South Asia could build regional confidence, and, through gradual improvements in relations, reduce the threat of war and the proliferation of weapons of mass destruction. This paper discusses monitoring the trans-border movement of flow and sediment in the Indian and Pakistani coastal areas. Through such a project, India and Pakistan could initiate greater cooperation, and engender movement towardsmore » the resolution of the Sir Creek territorial dispute in their coastal region. The Joint Working Groups dialogue being conducted by India and Pakistan provides a mechanism for promoting such a project. The proposed project also falls within a regional framework of cooperation agreed to by several South Asian countries. This framework has been codified in the South Asian Seas Action Plan, developed by Bangladesh, India, Maldives, Pakistan and Sri Lanka. This framework provides a useful starting point for Indian and Pakistani cooperative monitoring in their trans-border coastal area. The project discussed in this paper involves computer modeling, the placement of in situ sensors for remote data acquisition, and the development of joint reports. Preliminary computer modeling studies are presented in the paper. These results illustrate the cross-flow connections between Indian and Pakistani coastal regions and strengthen the argument for cooperation. Technologies and actions similar to those suggested for the coastal project are likely to be applied in future arms control and treaty verification agreements. The project, therefore, serves as a demonstration of cooperative monitoring technologies. The project will also increase people-to-people contacts among Indian and Pakistani policy makers and scientists. In the perceptions of the general public, the project will crystallize the idea that the two countries share ecosystems and natural resources, and have a vested interest in increased collaboration.« less
Tolerance-based punishment in continuous public goods game
NASA Astrophysics Data System (ADS)
Gao, Jia; Li, Zhi; Cong, Rui; Wang, Long
2012-08-01
Altruistic punishment for defectors is considered as a key motive for the explanation of cooperation. However, there is no clear border between the cooperative and defective behaviors in a continuous strategy game. We propose a model to study the effect of punishment on the evolution of cooperation in continuous public goods game, wherein individuals have the traits to punish the co-players based on social tolerance. We show that a reasonable punishment with a uniform tolerance can spur individuals to make more investments. Additionally, for a fixed punishment cost and a fixed fine, a moderate value of tolerance can result in the best promotion of cooperation. Furthermore, we investigate the coevolutionary dynamics of investment and tolerance. We find that the population splits into two branches: high-tolerance individuals who make high investments and low-tolerance individuals who make low investments. A dynamic equilibrium is achieved between these two types of individuals. Our work extends punishment to continuous cooperative behaviors and the results may enhance the understanding of altruistic punishment in the evolution of human cooperation.
Safe and Secure Border Infrastructure Act
Rep. Peters, Scott H. [D-CA-52
2013-09-25
House - 09/26/2013 Referred to the Subcommittee on Railroads, Pipelines, and Hazardous Materials. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Honda, Michael M. [D-CA-15
2009-06-04
House - 08/19/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Brown-Waite, Ginny [R-FL-5
2009-03-26
House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Myrick, Sue Wilkins [R-NC-9
2009-02-25
House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Altmire, Jason [D-PA-4
2010-05-06
House - 06/15/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Polis, Jared [D-CO-2
2009-12-10
House - 03/01/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Serrano, Jose E. [D-NY-16
2009-01-06
House - 02/09/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Border Security and Responsibility Act 2009
Rep. Grijalva, Raul M. [D-AZ-7
2009-04-23
House - 05/15/2009 Referred to the Subcommittee on Terrorism, Unconventional Threats and Capabilities. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
ERIC Educational Resources Information Center
Thomas, Susan
2013-01-01
My dissertation examines how global neoliberal forces intersect with racialized state security practices to shape the transnational subjectivities of South Asian overseas students studying in the U.S. in the post-9/11 moment. These students' movement across national borders to pursue higher education in the United States positions them as ideal…
A Compton Gamma Imager for Criminal and National Security Investigation
2014-05-01
which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety Canada. Partners in the...project include National Research Council, McGill University, Royal Canadian Mounted Police, Public Safety Canada, Toronto Police, and Canada Border...16 6.2.1 Follow-on Research ...................................................................................... 16 6.2.2 Follow-on
Rep. Bilirakis, Gus M. [R-FL-9
2009-02-24
House - 09/22/2009 Provisions of measure incorporated into Title XI, Section 1107 of H.R. 3619, as reported by the Committee on Transportation. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
20 CFR 439.620 - Cooperative agreement.
Code of Federal Regulations, 2010 CFR
2010-04-01
....620 Employees' Benefits SOCIAL SECURITY ADMINISTRATION GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 439.620 Cooperative agreement. Cooperative agreement means an... of relationship as a grant (see definition of grant in § 439.650), except that substantial...
Border effect-based precise measurement of any frequency signal
NASA Astrophysics Data System (ADS)
Bai, Li-Na; Ye, Bo; Xuan, Mei-Na; Jin, Yu-Zhen; Zhou, Wei
2015-12-01
Limited detection resolution leads to fuzzy areas during the measurement, and the discrimination of the border of a fuzzy area helps to use the resolution stability. In this way, measurement precision is greatly improved, hence this phenomenon is named the border effect. The resolution fuzzy area and its application should be studied to realize high-resolution measurement. During the measurement of any frequency signal, the fuzzy areas of phase-coincidence detection are always discrete and irregular. In this paper the difficulty in capturing the border information of discrete fuzzy areas is overcome and extra-high resolution measurement is implemented. Measurement precision of any frequency-signal can easily reach better than 1 × 10-11/s in a wide range of frequencies, showing the great importance of the border effect. An in-depth study of this issue has great significance for frequency standard comparison, signal processing, telecommunication, and fundamental subjects. Project supported by the National Natural Science Foundation of China (Grant Nos. 10978017 and 61201288), the Natural Science Foundation of Research Plan Projects of Shaanxi Province, China (Grant No. 2014JM2-6128), and the Sino-Poland Science and Technology Cooperation Projects (Grant No. 36-33).
3D Face Generation Tool Candide for Better Face Matching in Surveillance Video
2014-07-01
Safety and Security Program (CSSP) which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public ...by the Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale... public safety and security practitioners to achieve specific objectives; 4. Threats/Hazards F – Major trans-border criminal activity – e.g. smuggling
Radiation Control on Uzbekistan Borders - Results and Perspectives
DOE Office of Scientific and Technical Information (OSTI.GOV)
Petrenko, Vitaliy; Yuldashev, Bekhzod; Ismailov, Ulughbek
2009-12-02
The measures and actions on prevention, detection and response to criminal or unauthorized acts involving radioactive materials in Uzbekistan are presented. In frames of program of radiation monitoring to prevent illicit trafficking of nuclear and radioactive materials main customs border checkpoints were equipped with commercial radiation portal monitors. Special radiation monitors elaborated and manufactured in INP AS RU are installed in INP(main gates, research reactor and laboratory building) to provide nuclear security of Institute facilities. The experience of Uzbekistan in establishing radiation monitoring systems on its borders, their operation and maintenance would be useful for realization of proposed plan ofmore » strengthening measures to prevent illicit trafficking in Republics of Central Asia region.« less
Land border monitoring with remote sensing technologies
NASA Astrophysics Data System (ADS)
Malinowski, Radoslaw
2010-09-01
The remote sensing technology has many practical applications in different fields of science and industry. There is also a need to examine its usefulness for the purpose of land border surveillance. This research started with analysis of potential direct use of Earth Observation technology for monitoring migrations of people and preventing smuggling. The research, however, proved that there are still many fields within which the EO technology needs to be improved. From that point the analysis focused on improving Border Permeability Index which utilizes EO techniques as a source of information. The result of BPI analysis with use of high resolution data provides new kind of information which can support and make more effective work of authorities from security domain.
Drug Court Reauthorization Act
Rep. Jackson Lee, Sheila [D-TX-18
2010-08-10
House - 09/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Berman, Howard L. [D-CA-28
2010-12-07
House - 12/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Moran, James P. [D-VA-8
2009-03-19
House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Criminal Alien Accountability Act
Rep. Issa, Darrell E. [R-CA-49
2009-06-11
House - 07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Maloney, Carolyn B. [D-NY-14
2010-08-10
House - 09/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Gingrey, Phil [R-GA-11
2009-02-04
House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
19 CFR 122.64 - Other aircraft.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... the port of entry (regardless of whether it is an international airport) nearest the final departure airport. ...
19 CFR 122.64 - Other aircraft.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... the port of entry (regardless of whether it is an international airport) nearest the final departure airport. ...
19 CFR 122.64 - Other aircraft.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... the port of entry (regardless of whether it is an international airport) nearest the final departure airport. ...
19 CFR 122.64 - Other aircraft.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... the port of entry (regardless of whether it is an international airport) nearest the final departure airport. ...
19 CFR 122.64 - Other aircraft.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... the port of entry (regardless of whether it is an international airport) nearest the final departure airport. ...
Sen. Durbin, Richard J. [D-IL
2011-05-11
Senate - 06/28/2011 Committee on the Judiciary Subcommittee on Immigration, Refugees and Border Security . Hearings held. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Implementation of the International Health Regulations (2005) Through Cooperative Bioengagement
Standley, Claire J.; Sorrell, Erin M.; Kornblet, Sarah; Fischer, Julie E.; Katz, Rebecca
2015-01-01
Cooperative bioengagement efforts, as practiced by U.S. government-funded entities, such as the Defense Threat Reduction Agency’s Cooperative Biological Engagement Program, the State Department’s Biosecurity Engagement Program, and parallel programs in other countries, exist at the nexus between public health and security. These programs have an explicit emphasis on developing projects that address the priorities of the partner country as well as the donor. While the objectives of cooperative bioengagement programs focus on reducing the potential for accidental or intentional misuse and/or release of dangerous biological agents, many partner countries are interested in bioengagement as a means to improve basic public health capacities. This article examines the extent to which cooperative bioengagement projects address public health capacity building under the revised International Health Regulations and alignment with the Global Health Security Agenda action packages. PMID:26528463
2017-01-04
A Cooper's hawk takes flight from the branches of a small tree at NASA's Kennedy Space Center in Florida. The center shares a border with the Merritt Island National Wildlife Refuge. More than 330 native and migratory bird species, 25 mammals, 117 fishes and 65 amphibians and reptiles call Kennedy and the wildlife refuge home.
2017-01-04
A Cooper's hawk perches on branch of a small tree at NASA's Kennedy Space Center in Florida. The center shares a border with the Merritt Island National Wildlife Refuge. More than 330 native and migratory bird species, 25 mammals, 117 fishes and 65 amphibians and reptiles call Kennedy and the wildlife refuge home.
2017-01-30
A Cooper's hawk walks through underbrush at NASA's Kennedy Space Center in Florida. The center shares a border with the Merritt Island National Wildlife Refuge. The bird is one of more than 330 native and migratory bird species, 25 mammals, 117 fishes and 65 amphibians and reptiles that call Kennedy and the wildlife refuge home.
Friedman, Charles P; Iakovidis, Ilias; Debenedetti, Laurent; Lorenzi, Nancy M
2009-11-01
Countries on both sides of the Atlantic Ocean have invested in health information and communication technologies. Since eHealth challenges cross borders a European Union-United States of America conference on public policies relating to health IT and eHealth was held October 20-21, 2008 in Paris, France. The conference was organized around the four themes: (1) privacy and security, (2) health IT interoperability, (3) deployment and adoption of health IT, and (4) Public Private Collaborative Governance. The four key themes framed the discussion over the two days of plenary sessions and workshops. Key findings of the conference were organized along the four themes. (1) Privacy and security: Patients' access to their own data and key elements of a patient identification management framework were discussed. (2) Health IT interoperability: Three significant and common interoperability challenges emerged: (a) the need to establish common or compatible standards and clear guidelines for their implementation, (b) the desirability for shared certification criteria and (c) the need for greater awareness of the importance of interoperability. (3) Deployment and adoption of health IT: Three major areas of need emerged: (a) a shared knowledge base and assessment framework, (b) public-private collaboration and (c) and effective organizational change strategies. (4) Public Private Collaborative Governance: Sharing and communication are central to success in this area. Nations can learn from one another about ways to develop harmonious, effective partnerships. Three areas that were identified as highest priority for collaboration included: (1) health data security, (2) developing effective strategies to ensure healthcare professionals' acceptance of health IT tools, and (3) interoperability.
Zhang, Jun; Dong, Jia-Qiang; Li, Jia-Ying; Zhang, Yue; Tian, Yang-Hui; Sun, Xiao-Ying; Zhang, Guang-Yun; Li, Qing-Pu; Xu, Xiao-Yu; Cai, Tao
2016-09-01
In the Yunnan province of China, 18 counties in six prefectures border Myanmar. Due to its particular combination of geographic features, climate conditions, and cultural landscape, the area provides a suitable environment for the spread of insect-borne diseases such as malaria. In five identified Myanmar Special Regions along the China-Myanmar border, economic development is lagging, people live in extreme poverty, and the healthcare system is fragile. Coupled with political and other reasons, this precludes malaria control work to be effectively carried out in Myanmar, resulting in a heavy burden of the disease. Frequent population movements and favorable conditions for malaria transmission on the border fuel difficulties in controlling and eliminating the spread of the disease in the area. To reduce the prevalence of malaria in the China-Myanmar border area and improve healthcare services for local residents in this particular environment, Health Poverty Action (HPA) has provided malaria aid in the area since the beginning of 2006, as a sub-recipient of the China Global Fund Malaria Programs. In this case study, we examined HPA's activities as part of its malaria control programs in the area, analyzed and summarized the effectiveness and impact of the cross-border healthcare model as implemented by non-governmental organizations, and put forward suggestions for cross-border health aid models and for the prevention of malaria transmission in the Greater Mekong Subregion. HPA had carried out a great quantity of successful malaria control activities in border areas between China and Myanmar, strengthened the partnership and established the collaboration, coordination and cooperation channels among stakeholders. HPA has laid good groundwork and developed its valuable model that could be highlighted and referenced.
2015-12-01
DOD, joint, or armed service component’s manuals , and other publications . Obviously, JCETs fall under the broader spectrum of security cooperation...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited JOINT COMBINED...No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing
The US Army and Future Security Force Assistance Operations
2013-04-01
havens. It addresses the recent evolution of SFA doctrine, guidance and authorities, and the role of interagency cooperation related to the future...safe havens. It addresses the recent evolution of SFA doctrine, guidance and authorities, and the role of interagency cooperation related to the...organizations at all levels. 5 SFA extends well beyond military-to-military training and conceptually addresses security as a system of
The Reserve Forces Impact on Theater Security Cooperation
2013-03-01
in South America there are needs for purification is spoiled water, prophylactics, and typhoid , malaria, and yellow fever vaccines. Professions...Theater Security Cooperation (TSC) is a Phase 0 ( shaping ) instrument of regional commanders and is applied with the intent of precluding the use of...military force. The U.S. Army War College (USAWC) Theater Campaign Planning Handbook describes Phase 0 operations as “those shaping activities
Iran Human Rights Sanctions Act
Rep. McMahon, Michael E. [D-NY-13
2010-02-23
House - 04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Ortiz, Solomon P. [D-TX-27
2009-12-15
House - 03/01/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Vietnam Human Rights Sanctions Act
Rep. Cao, Anh "Joseph" [R-LA-2
2010-11-18
House - 12/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Berman, Howard L. [D-CA-28
2009-05-14
House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Birthright Citizenship Act of 2009
Rep. Deal, Nathan [R-GA-9
2009-04-02
House - 05/26/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Fairness for American Students Act
Rep. Tiahrt, Todd [R-KS-4
2010-01-27
House - 04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Whitfield, Ed [R-KY-1
2010-09-22
House - 12/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Family Reunification Act of 2010
Rep. Djou, Charles K. [R-HI-1
2010-07-27
House - 09/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Identification Integrity Act of 2009
Rep. Gallegly, Elton [R-CA-24
2009-01-06
House - 02/09/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Shadegg, John B. [R-AZ-3
2009-02-11
House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Emergency Nursing Supply Relief Act
Rep. Wexler, Robert [D-FL-19
2009-05-20
House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
International Megan's Law of 2009
Rep. Smith, Christopher H. [R-NJ-4
2009-03-19
House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Delahunt, Bill [D-MA-10
2009-06-18
House - 07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Haitian Protection Act of 2009
Rep. Hastings, Alcee L. [D-FL-23
2009-01-06
House - 02/09/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Immigration Oversight and Fairness Act
Rep. Roybal-Allard, Lucille [D-CA-34
2009-02-26
House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Syria Accountability and Liberation Act
Rep. Ros-Lehtinen, Ileana [R-FL-18
2009-02-26
House - 07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Senior Citizenship Act of 2009
Rep. Nadler, Jerrold [D-NY-8
2009-09-17
House - 10/19/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Meek, Kendrick B. [D-FL-17
2009-03-17
House - 04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Filipino Veterans Family Reunification Act
Rep. Hirono, Mazie K. [D-HI-2
2009-05-14
House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Burton, Dan [R-IN-5
2010-04-13
House - 06/15/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Narco-Crime in Mexico: Indication of State Failure or Symptoms of an Emerging Democracy
2010-05-21
Estudios sobre la Inseguridad a.c. (IESCI) or The Citizen’s Institute for Insecurity states in Olson’s article, “In terms of security, we are like those...losses have virtually rendered 30 Center for Latin American and Border Studies, “The Mexican Military’s Role in Crime Ridden Border Areas,” ( Las Cruces...executive, these criminal organizations have no interest in national or federal level governance inclusive of the spectrum of essential services required
2013-12-01
kg cocaine, 337.412 synthetic drugs and amphetamines, 26.190 Lt acetic anhydride and two drug laboratories.80 This statistic shows how deeply... synthetics like acetic anhydride at these laboratories.81 Heroin produced in Afghanistan moves to the international market through various routes: • To...smuggling of marijuana and cigarettes are other issues. Because of all these reasons, after 9/11, protecting the northern border—like the one in the
2014-07-01
partnership with Public Safety Canada. Led by Canada Border Services Agency partners included : Royal Canadian Mounted Police, Defence Research...Canada, as represented by the Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la...innovative technologies for public safety and security practitioners to achieve specific objectives; 4. Threats/Hazards F – Major trans-border criminal
Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network
Yang, Bin; Zhang, Jianfeng
2017-01-01
Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme. PMID:28657588
Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.
Yang, Bin; Zhang, Jianfeng
2017-06-28
Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.
For the relief of Hotaru Nakama Ferschke.
Rep. Duncan, John J., Jr. [R-TN-2
2009-07-10
House - 07/20/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation: