75 FR 60430 - Federal Advisory Committee; Threat Reduction Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-30
... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Threat Reduction... amended) the Department of Defense announces a meeting of the Threat Reduction Advisory Committee... Wright, Defense Threat Reduction Agency/AST, 8725 John J. Kingman Road, MS 6201, Fort Belvoir, VA 22060...
78 FR 29334 - Threat Reduction Advisory Committee; Notice of Federal Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-20
... DEPARTMENT OF DEFENSE Office of the Secretary Threat Reduction Advisory Committee; Notice of... Defense announces the following Federal advisory committee meeting of the Threat Reduction Advisory..., CO. FOR FURTHER INFORMATION CONTACT: Mr. William Hostyn, DoD, Defense Threat Reduction Agency/J2/5/8R...
78 FR 60863 - Threat Reduction Advisory Committee; Notice of Federal Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-02
... DEPARTMENT OF DEFENSE Office of the Secretary Threat Reduction Advisory Committee; Notice of... Defense announces the following Federal advisory committee meeting of the Threat Reduction Advisory... Springs, CO. FOR FURTHER INFORMATION CONTACT: Mr. William Hostyn, DoD, Defense Threat Reduction Agency/J2...
32 CFR 318.8 - Request for correction or amendment to a record.
Code of Federal Regulations, 2010 CFR
2010-07-01
... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE THREAT REDUCTION AGENCY PRIVACY PROGRAM § 318.8 Request for correction or amendment to a record. (a) An individual may request that the Defense Threat Reduction Agency... Division, Defense Threat Reduction Agency, 45045 Aviation Drive, Dulles, VA 20166-7517. (c) The requester...
77 FR 1672 - Threat Reduction Advisory Committee; Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-11
... DEPARTMENT OF DEFENSE Office of the Secretary Threat Reduction Advisory Committee; Notice of... committee meeting of the Threat Reduction Advisory Committee (hereafter referred to as ``the Committee.... FOR FURTHER INFORMATION CONTACT: Mr. William Hostyn, GS-15, DoD, Defense Threat Reduction Agency/SP...
76 FR 52319 - Federal Advisory Committee Meeting Notice; Threat Reduction Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-22
... DEPARTMENT OF DEFENSE Federal Advisory Committee Meeting Notice; Threat Reduction Advisory... committee meeting of the Threat Reduction Advisory Committee (Hereafter referred to as ``the Committee... CONTACT: Mr. William Hostyn, Defense Threat Reduction Agency/SP-ACP, 8725 John J. Kingman Road, MS 6201...
77 FR 19006 - Threat Reduction Advisory Committee; Notice of Federal Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-29
... DEPARTMENT OF DEFENSE Office of the Secretary Threat Reduction Advisory Committee; Notice of... advisory committee meeting of the Threat Reduction Advisory Committee (hereafter referred to as ``the.... William Hostyn, GS-15, DoD, Defense Threat Reduction Agency/SP-ACP, 8725 John J. Kingman Road, MS 6201...
75 FR 68330 - Closed Meeting of the Threat Reduction Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-05
... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Threat Reduction Advisory... advisory committee meeting of the Threat Reduction Advisory Committee (Hereafter referred to as ``the...: Contact Mr. Eric Wright, Defense Threat Reduction Agency/AST, 8725 John J. Kingman Road, MS 6201, Fort...
77 FR 2710 - Threat Reduction Advisory Committee; Notice of Federal Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-19
... DEPARTMENT OF DEFENSE Office of the Secretary Threat Reduction Advisory Committee; Notice of... following Federal advisory committee meeting of the Threat Reduction Advisory Committee (hereafter referred... CONTACT: Mr. William Hostyn, GS-15, DoD, Defense Threat Reduction Agency/SP-ACP, 8725 John J. Kingman Road...
77 FR 69807 - Threat Reduction Advisory Committee; Notice of Federal Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-21
... DEPARTMENT OF DEFENSE Office of the Secretary Threat Reduction Advisory Committee; Notice of... following Federal advisory committee meeting of the Threat Reduction Advisory Committee (hereafter referred... INFORMATION CONTACT: Mr. William Hostyn, DoD, Defense Threat Reduction Agency/J2/5/8R-ACP, 8725 John J...
77 FR 50088 - Threat Reduction Advisory Committee; Notice of Federal Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-20
... DEPARTMENT OF DEFENSE Office of the Secretary Threat Reduction Advisory Committee; Notice of... following Federal advisory committee meeting of the Threat Reduction Advisory Committee (hereafter referred... INFORMATION CONTACT: Mr. William Hostyn, GS-15, DoD, Defense Threat Reduction Agency/J2/5/8R, 8725 John J...
NASA Astrophysics Data System (ADS)
2002-09-01
This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.
32 CFR 318.7 - Disclosure of requested information to individuals.
Code of Federal Regulations, 2010 CFR
2010-07-01
... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE THREAT REDUCTION AGENCY PRIVACY PROGRAM § 318.7 Disclosure of requested information to individuals. (a) The Defense Threat Reduction Agency, upon receiving a request for... 32 National Defense 2 2010-07-01 2010-07-01 false Disclosure of requested information to...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-22
... DEPARTMENT OF DEFENSE Office of the Secretary Determination on Use of Cooperative Threat Reduction Funds in Pakistan and Afghanistan Under Section 1308 of the National Defense Authorization Act for... Threat Reduction (CTR) funds for the implementation of CTR programs in Pakistan and Afghanistan will...
75 FR 16758 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-02
... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2010-OS-0036] Privacy Act of 1974; System of Records AGENCY: Defense Threat Reduction Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Threat Reduction Agency proposes to amend a system of records notice in its...
2011-09-09
Chemical and Biological Defense Defense Threat Reduction Agency (DTRA)/Joint Science & Technology Office (JSTO) Dr. Alan Rudolph , Director, Chemical...Mr. Douglas W. Bryce 9:05 am – 9:45 am Dr. Alan Rudolph Director, Chemical and Biological Technologies Directorate, Defense Threat Reduction...Joint Science and Technology Office for Chemical and Biological Defense Dr. Alan S. Rudolph Mr. David K. Grimm Acting Heidi Shyu Joint Combat
77 FR 27208 - Renewal of Threat Reduction Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-09
... national defense, geopolitical and national security affairs, weapons of mass destruction, nuclear physics... Defense (Nuclear, Chemical and Biological Defense Programs), independent advice and recommendations on: a. Reducing the threat to the United States, its military forces, and its allies and partners posed by nuclear...
75 FR 30002 - Federal Advisory Committee; Threat Reduction Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-28
... as the Committee). FOR FURTHER INFORMATION CONTACT: Jim Freeman, Deputy Committee Management Officer for the Department of Defense, 703-601-6128. SUPPLEMENTARY INFORMATION: The Committee is a... Secretary of Defense for Acquisition, Technology and Logistics and the Director of the Defense Threat...
78 FR 46782 - Federal Acquisition Regulation; Iran Threat Reduction
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-01
...] RIN 9000-AM44 Federal Acquisition Regulation; Iran Threat Reduction AGENCIES: Department of Defense... expansion of sanctions relating to the energy sector of Iran and sanctions with respect to Iran's Revolutionary Guard Corps, as contained in titles II and III of the Iran Threat Reduction and Syria Human Rights...
Asian Transnational Security Challenge: Emerging Trends, Regional Visions
2010-10-01
the official policy or position of the Defense Threat Reduction Agency, the Department of Defense, or the United States Government . This report...the terrorist threat as seen through Southeast Asian eyes. IDA drew on its extensive network of academic and government contacts across Asia to...Asia would advance both government and non- government efforts to develop a better understanding of the roots of the terrorist threat and its links
32 CFR 318.13 - Enforcement actions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 2 2011-07-01 2011-07-01 false Enforcement actions. 318.13 Section 318.13 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE THREAT REDUCTION AGENCY PRIVACY PROGRAM § 318.13 Enforcement actions. Procedures and...
Translating dynamic defense patterns from rodents to people.
Blanchard, D Caroline
2017-05-01
Specific defensive behaviors of rodents are shaped by features of the eliciting threat stimuli and situation. Threat scenarios confirmed these relationships in people, with results substantially replicated in 4 additional scenario studies. Subsequent human studies involve computer games measuring fear as flight from threat stimuli and anxiety as alternation between two threats. Stabilometric studies have shown reduction in sway (freezing) to inescapable (e.g. with gun pointed at subject) threatening photographs; but enhanced lateral sway (flight attempts) to escapable threats; (gun pointed away from subject). Relationships between threat ambiguity, risk assessment, and anxiety have been validated by identification of videos of facial expressions to ambiguous threats, as anxiety; and systematic biases toward threat stimuli by anxious individuals. Enhanced rumination, interpretable as unsuccessful risk assessment, is a dynamic component of both anxiety and depression, particularly in women. While there is less experimental work on defensive threat/attack, a transdiagnostic "Fear of Harm" phenotype of aggression associated with fear suggests that this is a component of pathological as well as normal human defensive behavior. Copyright © 2016. Published by Elsevier Ltd.
5 CFR Appendix B to Part 2641 - Agency Components for Purposes of 18 U.S.C. 207(c)
Code of Federal Regulations, 2014 CFR
2014-01-01
... Systems Agency. Defense Intelligence Agency. Defense Logistics Agency. Defense Threat Reduction Agency... January 28, 1992). National Park Service (effective January 28, 1992). Office of Surface Mining...
5 CFR Appendix B to Part 2641 - Agency Components for Purposes of 18 U.S.C. 207(c)
Code of Federal Regulations, 2012 CFR
2012-01-01
... Systems Agency. Defense Intelligence Agency. Defense Logistics Agency. Defense Threat Reduction Agency... January 28, 1992). National Park Service (effective January 28, 1992). Office of Surface Mining...
5 CFR Appendix B to Part 2641 - Agency Components for Purposes of 18 U.S.C. 207(c)
Code of Federal Regulations, 2011 CFR
2011-01-01
... Systems Agency. Defense Intelligence Agency. Defense Logistics Agency. Defense Threat Reduction Agency... January 28, 1992). National Park Service (effective January 28, 1992). Office of Surface Mining...
5 CFR Appendix B to Part 2641 - Agency Components for Purposes of 18 U.S.C. 207(c)
Code of Federal Regulations, 2013 CFR
2013-01-01
... Systems Agency. Defense Intelligence Agency. Defense Logistics Agency. Defense Threat Reduction Agency... January 28, 1992). National Park Service (effective January 28, 1992). Office of Surface Mining...
77 FR 37443 - Records Schedules; Availability and Request for Comments
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-21
... process is available on request. Schedules Pending 1. Department of Defense, Defense Threat Reduction... for budget planning, financial forecasting, and related functions. 2. Department of Defense, Defense..., after a specified period, of records lacking administrative, legal, research, or other value. Notice is...
32 CFR 318.1 - Reissuance and purpose.
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE THREAT REDUCTION AGENCY PRIVACY PROGRAM § 318.1 Reissuance and purpose. (a) This part updates the policies, responsibilities, and procedures of the DTRA Privacy Program under the Privacy Act...
2002-09-01
Support 0605160D Counterproliferation Support (H) 0901502A Service Support to DTSA 0901502F Service Support to DTSA 0901502N Service Support to DTSA ...Base Operations Support 0901502A Service Support to DTSA (1F2C) Int’l Engagement & Threat Reduction 0901502F Service Support to DTSA (1F2C...Int’l Engagement & Threat Reduction 0901502N Service Support to DTSA (1F2C) Int’l Engagement & Threat Reduction 0901503A Service Support to OSD
75 FR 69642 - Membership of the Performance Review Board (PRB)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-15
... DEPARTMENT OF DEFENSE Office of the Secretary Membership of the Performance Review Board (PRB... Executive Service performance appraisals and makes recommendations regarding performance ratings and performance scores to the Director, Defense Threat Reduction Agency. DATES: Effective Date: The effective date...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-20
... amended by the National Defense Authorization Act for Fiscal Year 2008 (NDAA 08) section 807, the Director of DTRA and the Office of the Director, Defense Procurement and Acquisition Policy, Office of... pursuant to contracts for services. The inventory will be published to the DTRA Web site at the following...
Current biodefense vaccine programs and challenges.
Wolfe, Daniel N; Florence, William; Bryant, Paula
2013-07-01
The Defense Threat Reduction Agency's Joint Science and Technology Office manages the Chemical and Biological Defense Program's Science and Technology portfolio. The Joint Science and Technology Office's mission is to invest in transformational ideas, innovative people and actionable technology development for Chemical and Biological Defense solutions, with the primary goal to deliver Science and Technology products and capabilities to the warfighter and civilian population that outpace the threat. This commentary focuses on one thrust area within this mission: the Vaccine program of the Joint Science and Technology Office's Translational Medical Division. Here, we will describe candidate vaccines currently in the S&T pipeline, enabling technologies that should facilitate advanced development of these candidates into FDA licensed vaccines, and how the ever-changing biological threat landscape impacts the future of biodefense vaccines.
78 FR 40444 - Amendment of the Threat Reduction Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-05
..., geopolitical and national security affairs, WMD, nuclear physics, chemistry, and biology. The Committee members... the Assistant Secretary of Defense for Nuclear, Chemical and Biological Defense Programs (ASD(NCB..., and its allies and partners posed by nuclear, biological, chemical, conventional, and special weapons...
Defense Threat Reduction Agency > Research
Sciences Protection Sciences Science to Defeat WMD Science to Secure WMD Chemical/Biological Technologies unconventional means to answer some of the most difficult questions about chemical, biological, radiological and partnering with us, explore our pages. Chemical/Biological Technologies Chemical and biological threats are
Defense Threat Reduction Agency > Research > DTRIAC > Our Services
DTRIAC reference collection of more than 300,000 documents dating from 1946; experimental test data Analysis of nuclear and non-nuclear-related technology information as applied to defense policy, force technology transfer (application of nuclear related technologies to non-nuclear weapon phenomenologies and
Defense Health Board Annual Review of Department of Defense Deployment Health Centers
2012-03-19
biosurveillance information, such as the Defense Threat Reduction Agency (DTRA) (specifically, it’s Cooperative Biological Engagement Program) has been...compatibility with DoD PWPHI requirements, the Health Insurance Portability and Accountability Act and other applicable industry standards. AFHC’s...populations, findings often have Tri-Service applicability . Staff are presently studying Navy SEALS, Service members and recruits who have suffered heat
Moudy, Robin M; Ingerson-Mahar, Michael; Kanter, Jordan; Grant, Ashley M; Fisher, Dara R; Jones, Franca R
2014-01-01
In 2011, President Obama addressed the United Nations General Assembly and urged the global community to come together to prevent, detect, and fight every kind of biological danger, whether a pandemic, terrorist threat, or treatable disease. Over the past decade, the United States and key international partners have addressed these dangers through a variety of programs and strategies aimed at developing and enhancing countries' capacity to rapidly detect, assess, report, and respond to acute biological threats. Despite our collective efforts, however, an increasingly interconnected world presents heightened opportunities for human, animal, and zoonotic diseases to emerge and spread globally. Further, the technical capabilities required to develop biological agents into a weapon are relatively low. The launch of the Global Health Security Agenda (GHSA) provides an opportunity for the international community to enhance the linkages between the health and security sectors, accelerating global efforts to prevent avoidable epidemics and bioterrorism, detect threats early, and respond rapidly and effectively to biological threats. The US Department of Defense (DoD) plays a key role in achieving GHSA objectives through its force health protection, threat reduction, and biodefense efforts at home and abroad. This article focuses on GHSA activities conducted in the DoD Office of the Assistant Secretary of Defense for Nuclear, Chemical, and Biological Defense.
Defense.gov Special Report: DoD Helps Fight Ebola in West Africa
Assistance at a Glance Health Care Training Infographic #1 Ebola Treatment Units/Monrovian Medical Unit , Liberia and Sierra Leone. Story Medical Countermeasures Help Ebola Crisis Since 2003, the Defense Threat Reduction Agency has invested more than $300 million to develop medical countermeasures against hemorrhagic
After Globalization Future Security in a Technology Rich World
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gilmartin,T J
2001-08-17
Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency,more » and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and important variations of both the reviewers and the participants.« less
Defense Threat Reduction Agency > Careers > Onboarding
, click HERE. Let's Get Started Our values allow personnel to achieve their commitment to total customer satisfaction by meeting and anticipating customer needs. INTEGRITY SERVICE EXCELLENCE INNOVATION TEAMWORK
Defense Threat Reduction Agency > About > Our Values
Atoll Cleanup Documents TRAC About Who We Are Our Values History Locations Our Leadership Director Our Values Locations DTRA Leadership Stay Connected About DoD Top Issues News Photos & Videos
Reduction of Decision-Making Time in the Air Defense Management
2013-06-01
Cohen, Freeman, & Thompson, 1997), “Threat Evaluation and Weapon Allocation” ( Turan , 2012) and Evaluating the Performance of TEWA Systems (Fredrik...uses these threat values to propose weapon allocation ( Turan , 2012). Turan studied only static based weapon-target allocation. She evaluates and... Turan : - Proximity parameters (CPA, Time to CPA, CPA in units of time, time before hit, distance), - Capability parameters (target type, weapon
Anticipating the Species Jump: Surveillance for Emerging Viral Threats
2010-12-01
views expressed herein are those of the author and do not necessarily reflect the official policy or position of the Defense Threat Reduction Agency...Germany** [10, 11] Hantavirus (Sin Nombre virus) Deer mouse (Peromyscus maniculatus) 1993 Four Corners area, US [12] Monkeypox (Monkeypox virus...genetically diverse Marburg viruses from Egyptian fruit bats." PLoS Pathog 5(7): e1000536. 12. "Update: Outbreak of Hantavirus Infection — Southwestern
Defense Threat Reduction Agency > About > Media > Videos
treaty before the Senate Committee on Foreign Relations on June 25, 2010. USMC Master Gunnery Sgt . Shalanda Raynor talks about being the first female Marine in her MOS to achieve the rank of Master Gunnery
Code of Federal Regulations, 2010 CFR
2010-07-01
... locations. (b) This part shall be made applicable to DoD contractors who are operating a system of records... DEFENSE THREAT REDUCTION AGENCY PRIVACY PROGRAM § 318.2 Applicability. (a) This part applies to all..., associated with maintaining a system of records. ...
Sandia National Laboratories: National Security Missions: International
Transportation Energy Energy Research Global Security WMD Counterterrorism & Response Global Threat Reduction Homeland Defense & Force Protection Homeland Security Cyber & Infrastructure Security Global Business Procurement Technical Assistance Program (PTAP) Current Suppliers iSupplier Account Accounts
Defense Threat Reduction Agency > Research > DTRIAC > FAQ Sheet
FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test . Q: Does DTRIAC have a public reading room? A: No, DTRIAC does not have a reading room open to the
Defense Threat Reduction Agency
Sciences Protection Sciences Science to Defeat WMD Science to Secure WMD Chemical/Biological Technologies of Chemical, Biological, Radiological and Nuclear instruction. Watch Read DTRA leadership meet with How Butterflies Can Detect Deadly Chemical Weapon Agents May 2 Changing World Situation Requires
Annual Report to Congress on Foreign Economic Collection and Industrial Espionage - 2004
2005-04-01
Administration ( DTSA ) • Department of Energy (DOE) • Department of Justice (DOJ) • Department of State, including the Bureau of Intelligence and...Threat Reduction Agency DTSA Defense Technology Security Administration EAR Export Administration Regulations 18 EEA Economic Espionage Act of 1996
Defense Threat Reduction Agency > Careers > Professional Development
Justifications & Approvals Careers Who We Are Our Values Strategic Recruiting Programs Professional Your Reporting Day Senior Executive Service Special Programs PROFESSIONAL DEVELOPMENT Our Training and some of the pitfalls that may derail a career or delay a promotion. Competitive Professional
77 FR 57561 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-18
..., 8725 John J. Kingman Road, Fort Belvoir, VA 22060-6201.'' HDTRA 022 System name: Learning Management... replace with ``Defense Threat Reduction Agency employees and contractor personnel receiving training... & Program Development Division, 8725 John J. Kingman Road, Stop 6201, Fort Belvoir, VA 22060-6201...
Defense Threat Reduction Agency > Research > DTRIAC
FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
Defense Threat Reduction Agency > Careers
FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
Defense Threat Reduction Agency > Home > Contact
FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
Threat Control through Arms Control. Report to Congress 1994
1994-07-13
reduction, chemical weapons’ elimination, or any of the other growing arms control and nonproliferation challenges America faces, ACDA is an essential...nuclear missile reduction, chemical weapons elimination, or any of. the other growing arms control and nonproliferation challenges America faces... challenging . Nonprolif eration agreements are our first line of defense against the creation of a far more unstable and hazardous world than we have ever
32 CFR 318.5 - Designations and responsibilities
Code of Federal Regulations, 2011 CFR
2011-07-01
... requirements developed to collect and/or maintain personal data conform to DoD Privacy Act Program standards...) PRIVACY PROGRAM DEFENSE THREAT REDUCTION AGENCY PRIVACY PROGRAM § 318.5 Designations and responsibilities... effective Privacy Program. (2) Appoint a senior official to serve as the Agency Privacy Act Officer. (3...
32 CFR 318.5 - Designations and responsibilities.
Code of Federal Regulations, 2014 CFR
2014-07-01
... requirements developed to collect and/or maintain personal data conform to DoD Privacy Act Program standards...) PRIVACY PROGRAM DEFENSE THREAT REDUCTION AGENCY PRIVACY PROGRAM § 318.5 Designations and responsibilities... effective Privacy Program. (2) Appoint a senior official to serve as the Agency Privacy Act Officer. (3...
Defense Threat Reduction Agency > Contracts > Business Opportunities
FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
Defense Threat Reduction Agency > Contracts > Contract Award Data
FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
Defense Threat Reduction Agency > Contracts > Business Opportunities >
Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Current Contractors & Partners Cost Proposals & DCAA Pre-Award Surveys DTRA Cost Proposal
Defense Threat Reduction Agency > Contracts > Small Businesses
FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
Defense Threat Reduction Agency > Careers > Our Values
Atoll Cleanup Documents TRAC About Who We Are Our Values History Locations Our Leadership Director Justifications & Approvals Careers Who We Are Our Values Strategic Recruiting Programs Professional needs. INTEGRITY Our members exhibit the highest ethical standards. Truth, honesty, and courage are
Defense Threat Reduction Agency > Home > Operating Status
FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
Defense Threat Reduction Agency > Careers > Onboarding > Getting Here
FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
Defense Threat Reduction Agency > Research > DTRIAC > Links
FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
Defense Threat Reduction Agency > Careers > Who We Are
FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
Defense Threat Reduction Agency > About > Who We Are
FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
Defense Threat Reduction Agency > Research > DTRIAC > Contact Us
FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
Defense Threat Reduction Agency > Careers > Onboarding > Sponsor Program
critical role in the Onboarding Program. In addition to the traditional supervisory roles and explain expectations to ensure a smooth transition, and help you become successful in your new role. While will quickly become productive and effective in your new role. Reasonable Accommodations DTRA provides
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-07
... invention set forth in ``Radiation Detector System for Locating and Identifying Special Nuclear Material in..., or Partially-Exclusive Licensing of an Invention Concerning a Radiation Detector System for Locating and Identifying Special Nuclear Material in Moving Vehicles AGENCY: Defense Threat Reduction Agency...
Defense Threat Reduction Agency > Careers > Strategic Recruiting Programs
graduate science, mathematics and engineering students. Students are offered these scholarships and graduate science, mathematics and engineering students. Students are offered scholarships and fellowships with disabilities, please call (703) 767-4451. Workforce Recruitment Program for College Students with
Defense Threat Reduction Agency > Contracts > Business Opportunities >
Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Information Office of Small Business Programs Current Contractors & Partners Cost Proposals & DCAA Pre
Defense Threat Reduction Agency > About > History
History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak Atoll Cleanup Documents TRAC About Who We Are Our Values History Locations Our Leadership Director Your Reporting Day Senior Executive Service Special Programs HISTORY DTRA is the youngest agency in the
Defense Threat Reduction Agency > Success Stories
History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak Atoll Cleanup Documents TRAC About Who We Are Our Values History Locations Our Leadership Director counter WMD weapons systems, we have a long history of overcoming what others believe impossible
Defense Threat Reduction Agency > Careers > Onboarding > Onboarding
Through The FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
Defense Threat Reduction Agency > Success Stories > Philippines CBRN
Through The FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
Defense Threat Reduction Agency > Contracts > Business Opportunities >
Through The FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
32 CFR 318.15 - Rules of conduct
Code of Federal Regulations, 2010 CFR
2010-07-01
... DEFENSE THREAT REDUCTION AGENCY PRIVACY PROGRAM § 318.15 Rules of conduct (a) DTRA personnel shall: (1... of records, to which they have access or are using incident to the conduct of official business, shall be protected so that the security and confidentiality of the information shall be preserved. (2...
BD LSRFortessa for Tulane DoD ID and Cancer Projects
2015-01-21
Influenza Antivirals" PI: Patrick Iversen, AVI BioPharma DTRA-TMTI (Subcontract) "Rapid Development of Dengue Antivirals" PI: Patrick Iversen, AVI... BioPharma (PI) Lisa Morici, PhD: Defense Threat Reduction Agency HDTRA 1-13-C-0002 "Outer membrane vesicle vaccine-mediated protection against
Defense Threat Reduction Agency > Home > DTRA No Fear Act Reporting
FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
Defense Threat Reduction Agency > Research > DTRIAC > STI Support Center
FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
Defense Threat Reduction Agency > Careers > Onboarding > Before You Report
FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak
2007-03-01
similar in structure to HMX. HMX is used to implode fissionable material in nuclear devices to achieve critical mass and as a component of plastic...extent of DTRA activities on WSMR and reduce the Department of Defense capability to control and eliminate weapons of mass destruction. The Final...safeguarding the United States and its allies from weapons of mass destruction (WMD). DTRA maintains a number of test beds and target types at White Sands
Stop or move: Defensive strategies in humans.
Bastos, Aline F; Vieira, Andre S; Oliveira, Jose M; Oliveira, Leticia; Pereira, Mirtes G; Figueira, Ivan; Erthal, Fatima S; Volchan, Eliane
2016-04-01
Threatening cues and surrounding contexts trigger specific defensive response patterns. Potential threat evokes attentive immobility; attack evokes flight when escape is available and immobility when escape is blocked. Tonic immobility installs when threat is overwhelming and life-risky. In humans, reduced body sway characterizes attentive and tonic immobility, the former with bradycardia, and the later with expressive tachycardia. Here, we investigate human defensive strategies in the presence or absence of an escape route. We employed pictures depicting a man carrying a gun and worked with participants exposed to urban violence. In pictures simulating more possibility of escape, the gun was directed away from the observer; in those simulating higher risk and less chance of escape, the gun was directed toward the observer. Matched control pictures depicted similar layouts, but a non-lethal object substituted the gun. Posturographic and electrocardiographic recordings were collected. Amplitude of sway and heart rate were higher for gun directed-away and lower for gun direct-toward. Compared to their respective matched controls, there was a general increase in the amplitude of sway for the gun directed-away pictures; and a reduction in back-and-forth sway and in heart rate for gun directed-toward pictures. Taken together, those measures suggest that, when exposed to threat invading their margin of safety in a context indicating possible escape route, humans, as non-human species, engage in active escape, resembling the flight stage of the defensive cascade. When facing threat indicating less possibility of escape, humans present an immobile response with bradycardia. Copyright © 2016 Elsevier B.V. All rights reserved.
Lambird, Kathleen Hoffman; Mann, Traci
2006-09-01
High self-esteem (HSE) is increasingly recognized as heterogeneous. By measuring subtypes of HSE, the present research reevaluates the finding that HSE individuals show poor self-regulation following ego threat (Baumeister, Heatherton, & Tice, 1993). In Experiment 1, participants with HSE showed poor self-regulation after ego threat only if they also were defensive (high in self-presentation bias). In Experiment 2, two measures--self-presentation bias and implicit self-esteem--were used to subtype HSE individuals as defensive. Both operationalizations of defensive HSE predicted poor self-regulation after ego threat. The results indicate that (a) only defensive HSE individuals are prone to self-regulation failure following ego threat and (b) measures of self-presentation bias and implicit self-esteem can both be used to detect defensiveness.
Nash, Kyle; McGregor, Ian; Prentice, Mike
2011-12-01
Four studies investigated a goal regulation view of anxious uncertainty threat (Gray & McNaughton, 2000) and ideological defense. Participants (N = 444) were randomly assigned to have achievement or relationship goals implicitly primed. The implicit goal primes were followed by randomly assigned achievement or relationship threats that have reliably caused generalized, reactive approach motivation and ideological defense in past research. The threats caused anxious uncertainty (Study 1), reactive approach motivation (Studies 2 and 3), and reactive ideological conviction (Study 4) only when threat-relevant goals had first been primed, but not when threat-irrelevant goals had first been primed. Reactive ideological conviction (Study 4) was eliminated if participants were given an opportunity to attribute their anxiety to a mundane source. Results support a goal regulation view of anxious uncertainty, threat, and defense with potential for integrating theories of defensive compensation.
Evolution in strategic forces and doctrine
DOE Office of Scientific and Technical Information (OSTI.GOV)
Canavan, G.H.
The era of the deterrence through the threat of retaliation is ending. Strategic defense opens new options for deep reductions without loss of stability, which could be a guide for shifting from the residual forces from the offensive era into those appropriate for a multipolar world. There are strong arguments for retiring missiles under the cover of missile defenses and returning to fewer but more capable aircraft for strategic roles. Developing the technologies for theater and strategic defenses could largely eliminate the incentive for the development of missiles by the third world and shift their efforts into more stabilizing areas.more » 20 refs.« less
Exploring the Structure of Human Defensive Responses from Judgments of Threat Scenarios
Harrison, Laura A.; Ahn, Curie; Adolphs, Ralph
2015-01-01
How humans react to threats is a topic of broad theoretical importance, and also relevant for understanding anxiety disorders. Many animal threat reactions exhibit a common structure, a finding supported by human evaluations of written threat scenarios that parallel patterns of rodent defensive behavior to actual threats. Yet the factors that underlie these shared behavioral patterns remain unclear. Dimensional accounts rooted in Darwin’s conception of antithesis explain many defensive behaviors. Across species, it is also clear that defensive reactions depend on specific situational factors, a feature long emphasized by psychological appraisal theories. Our study sought to extend prior investigations of human judgments of threat to a broader set of threats, including natural disasters, threats from animals, and psychological (as opposed to physical) threats. Our goal was to test whether dimensional and specific patterns of threat evaluation replicate across different threat classes. 85 healthy adult subjects selected descriptions of defensive behaviors that indicated how they would react to 29 threatening scenarios. Scenarios differed with respect to ten factors, e.g., perceived dangerousness or escapability. Across scenarios, we correlated these factor ratings with the pattern of defensive behaviors subjects endorsed. A decision tree hierarchically organized these correlation patterns to successfully predict each scenario’s most common reaction, both for the original sample of subjects and a separate replication group (n = 22). At the top of the decision tree, degree of dangerousness interacted with threat type (physical or psychological) to predict dimensional approach/avoidance behavior. Subordinate nodes represented specific defensive responses evoked by particular contexts. Our ecological approach emphasizes the interplay of situational factors in evoking a broad range of threat reactions. Future studies could test predictions made by our results to help understand pathological threat processing, such as seen in anxiety disorders, and could begin to test underlying neural mechanisms. PMID:26296201
Defense Threat Reduction Agency > Careers > Onboarding > Special Programs
, programs, and practices to help our employees and Service members balance work and family responsibilities . We have put in place family-friendly Work/Life programs and policies designed to create a more Children and Family Leave Programs Work/Life Resources Onboarding Home Onboarding Overview Before You
Defense Threat Reduction Agency > Careers > Onboarding > Before You Report
Development Work/Life Programs Onboarding Onboarding Overview Before You Report Sponsor Program Getting Here , you may be eligible to enroll in health, dental and vision, life insurance, and flexible spending and Mass Transit Benefit Program. Health/Dental/Vision/Life for Civilian Employees Health/Dental/Life
Defense Threat Reduction Agency > About > Media > News > News Archive
into pulmonary research -- DTRA's ATHENA developing cutting-edge technology that benefits soldiers and civilians Dec 15 - Germany to fund more surveillance along Tunisia-Libya border -- DTRA project aims to help 27 - Modern border facility opens thanks to US support -- DTRA working with Georgian Ministry of
Defense Threat Reduction Agency > About > Media > News
event Apr 4 - Pacific Soldiers build relationships through radiological training taught by DTRA, 10th fighting method for DTRA Feb 10 - USAF commissions Boeing to build more MOPs - 30,000 lb. extreme bunker Malaysia may build bombs with radioactive materials Stay Connected About DoD Top Issues News Photos &
Defense Threat Reduction Agency > About > Locations
Air Force Base, Ca. Mercury, Nev. Albuquerque, N.M. White Sands Missile Range, N.M. Omaha, Neb . (USSTRATCOM) Eglin Air Force Base, Fla. National Capital Region Georgia Azerbaijan Armenia Japan Republic of , Md. Eglin Air Force Base, Fla. Albuquerque, N.M. White Sands Missile Range, N.M. Mercury, Nev. Travis
2010 Review on the Extension of the AMedP-8(C) Methodology to New Agents, Materials, and Conditions
2010-12-01
tularemia ). Applied Research Associates (ARA), under contract to the Defense Threat Reduction Agency (DTRA), has begun the development of similar...x P Included in IDA 2010 Analyses 1 Biological Staphylococcal Enterotoxin B x P Included in IDA 2010 Analyses 1 Biological Tularemia x P
Personality and defensive reactions: fear, trait anxiety, and threat magnification.
Perkins, Adam M; Cooper, Andrew; Abdelall, Maura; Smillie, Luke D; Corr, Philip J
2010-06-01
The revised Reinforcement Sensitivity Theory (rRST) of personality (Gray & McNaughton, 2000) maintains that trait individual differences in the operation of defensive systems relate to facets of human personality, most notably anxiety and fear. We investigated this theory in 2 separate studies (total N=270) using a threat scenario research strategy (Blanchard, Hynd, Minke, Minemoto, & Blanchard, 2001). Consistent with rRST, results showed that individuals with high fear questionnaire scores tended to select defensive responses entailing orientation away from threat (e.g., run away) and that fear-prone individuals also tended to perceive threats as magnified. The extent of this threat magnification mediated the positive association observed between fear and orientation away from threat. Overall, results suggest that interindividual variance in defensive reactions is associated with a variety of existing personality constructs but that further research is required to determine the precise relationship between personality and defensive reactions.
41 CFR 60-250.22 - Direct threat defense.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 41 Public Contracts and Property Management 1 2013-07-01 2013-07-01 false Direct threat defense. 60-250.22 Section 60-250.22 Public Contracts and Property Management Other Provisions Relating to... PROTECTED VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as a...
41 CFR 60-741.22 - Direct threat defense.
Code of Federal Regulations, 2010 CFR
2010-07-01
... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...
Defense Threat Reduction Agency > Research > DTRIAC > Media Collection
*Cover a broad scope of both the pre- and post-test activities of a test series or operation *Detonations FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test
Bradford, Daniel E; Motschman, Courtney A; Starr, Mark J; Curtin, John J
2017-11-01
Developing a better understanding of how and under what circumstances alcohol affects the emotions, cognitions and neural functions that precede and contribute to dangerous behaviors during intoxication may help to reduce their occurrence. Alcohol intoxication has recently been shown to reduce defensive reactivity and anxiety more during uncertain vs certain threat. However, alcohol's effects on emotionally motivated attention to these threats are unknown. Alcohol may disrupt both affective response to and attentional processing of uncertain threats making intoxicated individuals less able to avoid dangerous and costly behaviors. To test this possibility, we examined the effects of a broad range of blood alcohol concentrations on 96 participants' sub-cortically mediated defensive reactivity (startle potentiation), retrospective subjective anxiety (self-report) and cortically assessed emotionally motivated attention (probe P3 event related potential) while they experienced visually cued uncertain and certain location electric shock threat. As predicted, alcohol decreased defensive reactivity and subjective anxiety more during uncertain vs certain threat. In a novel finding, alcohol dampened emotionally motivated attention during uncertain but not certain threat. This effect appeared independent of alcohol's effects on defensive reactivity and subjective anxiety. These results suggest that alcohol intoxication dampens processing of uncertain threats while leaving processing of certain threats intact. © The Author (2017). Published by Oxford University Press.
Maladaptive defensive behaviours in monoamine oxidase A-deficient mice.
Godar, Sean C; Bortolato, Marco; Frau, Roberto; Dousti, Mona; Chen, Kevin; Shih, Jean C
2011-10-01
Rich evidence indicates that monoamine oxidase (MAO) A, the major enzyme catalysing the degradation of monoamine neurotransmitters, plays a key role in emotional regulation. Although MAOA deficiency is associated with reactive aggression in humans and mice, the involvement of this enzyme in defensive behaviour remains controversial and poorly understood. To address this issue, we tested MAOA knockout (KO) mice in a spectrum of paradigms and settings associated with variable degrees of threat. The presentation of novel inanimate objects induced a significant reduction in exploratory approaches and increase in defensive behaviours, such as tail-rattling, biting and digging. These neophobic responses were context-dependent and particularly marked in the home cage. In the elevated plus- and T-mazes, MAOA KO mice and wild-type (WT) littermates displayed equivalent locomotor activity and time in closed and open arms; however, MAOA KO mice featured significant reductions in risk assessment, as well as unconditioned avoidance and escape. No differences between genotypes were observed in the defensive withdrawal and emergence test. Conversely, MAOA KO mice exhibited a dramatic reduction of defensive and fear-related behaviours in the presence of predator-related cues, such as predator urine or an anaesthetized rat, in comparison with those observed in their WT littermates. The behavioural abnormalities in MAOA KO mice were not paralleled by overt alterations in sensory and microvibrissal functions. Collectively, these results suggest that MAOA deficiency leads to a general inability to appropriately assess contextual risk and attune defensive and emotional responses to environmental cues.
Defense Threat Reduction Agency > Careers > Onboarding > Your Reporting Day
Your Reporting Day Senior Executive Service Special Programs On your first day at DTRA, you will be reporting for your first day, you are required to provide proof of citizenship; therefore, you must bring a When reporting for your first day of duty, you are required to have your Common Access Card (CAC
The adaptive value of tool-aided defense against wild animal attacks.
Crabb, Peter B; Elizaga, Andrew
2008-01-01
Throughout history humans have faced the persistent threat of attacks by wild animals, and how humans respond to this problem can make the difference between survival and death. In theory, the use of tools to fend off animal attacks would be more effective than resisting bare-handed, yet evidence for the advantage of tool-aided defense is scarce and equivocal. Two studies of news accounts of wild animal attacks against humans were conducted to test the hypothesis that tool-aided defense is indeed associated with reductions in injuries and deaths. Results of both Study 1 (N=172) and Study 2 (N=370) supported the hypothesis. The observed survival advantage of tool-aided defense for modern humans suggests that this tactic also would have worked for human ancestors who lived more closely to dangerous wild animals. 2008 Wiley-Liss, Inc.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-01
... Defense of Infrastructure Against Cyber Threats (PREDICT) Program AGENCY: Science and Technology... Defense of Infrastructure Against Cyber Threats (PREDICT) initiative. PREDICT is an initiative to... new models, technologies and products that support effective threat assessment and increase cyber...
Multimillion Atom Simulations of Nanoenergetic Materials
2014-12-01
L R E P O R T DTRA-TR-14-46 Multimillion Atom Simulations of Nanoenergetic Materials Distribution Statement A. Approved for public release...December 2009 Multimillion Atom Simulations of Nanoenergetic Materials HDTRA1-07-1-0023 Priya Vashishta Rajiv K. Kalia Aiichiro Nakano Collaboratory for...Technical Report (December 18, 2006—December 17, 2009) Defense Threat Reduction Agency Grant # HDTRA1-07-1-0023 Multimillion Atom Simulations of
Categorizing threat : building and using a generic threat matrix.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede
2007-09-01
The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and ismore » not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.« less
Nelson, Brady D; Hajcak, Greg
2017-08-01
Predictability is an important characteristic of threat that impacts defensive motivation and attentional engagement. Supporting research has primarily focused on actual threat (e.g., shocks), and it is unclear whether the predictability of less intense threat (e.g., unpleasant pictures) similarly affects motivation and attention. The present study utilized a within-subject design and examined defensive motivation (startle reflex and self-reported anxiety) and attention (probe N100 and P300) in anticipation of shocks and unpleasant pictures during a no, predictable, and unpredictable threat task. This study also examined the impact of predictability on the P300 to shocks and late positive potential (LPP) to unpleasant pictures. The startle reflex and self-reported anxiety were increased in anticipation of both types of threat relative to no threat. Furthermore, startle potentiation in anticipation of unpredictable threat was greater for shocks compared to unpleasant pictures, but there was no difference for predictable threat. The probe N100 was enhanced in anticipation of unpredictable threat relative to predictable threat and no threat, and the probe P300 was suppressed in anticipation of predictable and unpredictable threat relative to no threat. These effects did not differ between the shock and unpleasant picture trials. Finally, the P300 and early LPP component were increased in response to unpredictable relative to predictable shocks and unpleasant pictures, respectively. The present study suggests that the unpredictability of unpleasant pictures increases defensive motivation, but to a lesser degree relative to actual threat. Moreover, unpredictability enhances attentional engagement in anticipation of, and in reaction to, both types of threat. © 2017 Society for Psychophysiological Research.
Doped Lanthanum Hafnates as Scintillating Materials for High-Energy Photon Detection
NASA Astrophysics Data System (ADS)
Wahid, Kareem; Pokhrel, Madhab; Mao, Yuanbing
Recent years have seen the emergence of nanocrystalline complex oxide scintillators for use in X-ray and gamma-ray detection. In this study, we investigate the structural and optical properties of La2Hf2O7 nanoparticles doped with varying levels of Eu3+ or Ce3+ by use of X-ray diffraction, Raman spectroscopy, scanning electron microscopy, transmission electron microscopy, and optical photoluminescence. In addition, scintillation response under X-ray and gamma-ray exposure is reported. The authors thank the support from the Defense Threat Reduction Agency (DTRA) of the U.S. Department of Defense (Award #HDTRA1-10-1-0114).
U.S. Chemical Defense and the Third-World Threat
1990-01-04
Is the Chemical and Engineering Nw. 14 April 1986. 43 Report of the Chemical Warfare Review Comnission. 6-7. Unless otherwise stated the information...Best Available Copy (U.S.. Chemical Defense and the Third-World Threat N I A Monograph by Major Quentin W. Schillare Armor AUG2 1 4,A., - School...Security Clauipfca tiori) U.S. Chemical Defense and the Third-World Threat (") 12. PERSONAL AUTHOR(S) Major Quentin W. Schillare, USA 13a. TYPE OF REPORT
Unattended Radiation Sensor Systems for Remote Terrestrial Applications and Nuclear Nonproliferation
2002-01-01
liquid nitrogen is not available, or frequent attention is inconvenient and time-consuming. The “box” section contains a Stirling engine cryocooler and...sponsorship of the Defense Threat Reduction Agency (DTRA). The first is a system consisting of a mechanical cryocooler coupled with a high-purity...amplifier, a multichannel analyzer, and gated integrator electronics to process the slow signal pulses generated by room temperature solid state detectors
2014-05-01
Defense Threat Reduction Agency Research and Development Counter WMD Technologies Test Support Division 1680 Texas Street SE Kirtland AFB, NM...Device Prototype Final Report iv | List of Figures List of Figures Figure 3-1. Print screen of the STL file of a hollow microneedle design in Alibre...electrochemical characterization of gold electrode (n = 8) array with oxide dielectric defined working electrodes with 1 mM [Fe(CN)6] 3- in 0.1 M potassium
Defense Threat Reduction Agency > Research > DTRIAC > DTRIAC Dispatch
@mail.mil with your submissions. DTRIAC Dispatch - Vol 5, Issue 3 DTRIAC Dispatch - Vol 5, Issue 2 DTRIAC Dispatch - Vol 5, Issue 1 DTRIAC Dispatch - Vol 4, Issue 1 DTRIAC Dispatch - Vol 3, Issue 4 DTRIAC Dispatch - Vol 3, Issue 3 DTRIAC Dispatch - Vol 3, Issue 2 DTRIAC Dispatch - Vol 3, Issue 1 DTRIAC Dispatch - Vol
2005-01-01
Cold Foam 1% ethylene glycol 1% benzalkonium chloride 1% polyvinylpolypyrrolidone 1% Brij 58 1% Benzyldimethyl tetradecyl ammonium chloride dihydrate...described in this report was authorized by the Defense Threat Reduction Agency. This work was started in December 2003 and completed in March 2004. The...LITERA TURE CITED ..................................................................................... 15 5 FIGURES 1. Rates of Chloride Release in
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
Although the Cold War has ended, the threat of proliferation with chemical, biological, and nuclear warheads continues. Two factors further increase the threat from these weapons of mass destruction: knowledge of missile technology has spread extensively, and, in recent years, many countries - some of them unfriendly to the US and its allies - have obtained short- and intermediate-range missiles. The threat posed by such missiles was amply demonstrated during the Gulf War. Thus, the need to protect US and allied forces from these weapons has never been greater. When nuclear-tipped defensive missiles, such as Sprint and Spartan, were phasedmore » out years ago, the US turned for its defense to kinetic-energy {open_quotes}kill{close_quotes} interceptors - missiles that destroy an enemy missile by striking it with lethal force and accuracy at some point in its trajectory. The Patriot missile is probably the best-known kinetic-energy (KE) interceptor in the US defensive arsenal. To counter the spreading threat of proliferation, LLNL and other laboratories have been participating in a joint program funded by the Ballistic Missile Defense Organization (BMDO), within the Department of Defense, to develop defensive missile systems. Participants are designing, testing, and certifying KE interceptors to defend against current and future missile threats. These research efforts are described.« less
Costs and trade-offs of grazer-induced defenses in Scenedesmus under deficient resource
Zhu, Xuexia; Wang, Jun; Chen, Qinwen; Chen, Ge; Huang, Yuan; Yang, Zhou
2016-01-01
The green alga Scenedesmus obliquus can form inducible defensive morphs under grazing threat. Costs and trade-offs of inducible defense are expected to accompany the benefits of defensive morphs, but are hard to detect under nutrient-sufficient experimental conditions. To test the existence of costs associated with inducible defense, we cultured S. obliquus along resource availability gradients in the presence or absence of infochemical cues from Daphnia, and measured the strength of defensive colony formation and fitness characters. Under the lowest phosphorous concentration, the expression of inducible defensive colony resulted in decreased growth rate, which provides direct evidence for physiological costs. Along the gradient reduction of phosphorous concentration or light intensity, inducible defense in S. obliquus showed a decreasing trend. However, the photosynthetic efficiency of S. obliquus was barely affected by its defense responses, suggesting that the negative correlations between resource availability and colony formation of this alga may be due to resource-based trade-offs in the allocation of limited resources. Thus, our results indicated that expression of inducible defense of S. obliquus was impaired under insufficient phosphorus or light. Furthermore, under severe phosphate deficiency, obvious physiological costs of inducible defense could be detected even though defensive colony formation also decreased significantly. PMID:26932369
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, Robert C.; Drollinger, Harold; Bullard, Thomas F.
2013-01-01
This report presents a historical evaluation of the U16a Tunnel on the Nevada National Security Site in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office and the U.S. Department of Defense, Defense Threat Reduction Agency. The U16a Tunnel was used for underground nuclear weapons effects tests in Shoshone Mountain in Area 16 of the Nevada National Security Site. Six nuclear tests were conducted in the U16a Tunnel from 1962 to 1971. These tests are Marshmallow, Gum Drop, Double Play, Ming Vase,more » Diamond Dust, and Diamond Mine. The U.S. Department of Defense Threat Reduction Agency, with participation from Lawrence Livermore National Laboratory and Las Alamos National Laboratory, sponsored the tests. Fifteen high explosives tests were also conducted at the tunnel. Two were calibration tests during nuclear testing and the remaining were U.S. Department of Defense, Defense Threat Reduction Agency tunnel defeat tests. The U16a Tunnel complex is on the top and slopes of Shoshone Mountain, encompassing an area of approximately 16.7 hectares (41.1 acres). Major modifications to the landscape are a result of three principal activities, road construction and maintenance, mining activities related to development of the tunnel complex, and site preparation for activities related to testing. Forty-seven cultural features were recorded at the portal and on the slopes of Shoshone Mountain. At the portal area, features relate to the mining, construction, testing, and general every day operational support activities within the tunnel. These include concrete foundations for buildings, equipment pads, and rail lines. Features on the slopes above the tunnel relate to tunnel ventilation, borehole drilling, and data recording. Feature types include soil-covered bunkers, concrete foundations, instrument cable holes, drill holes, and ventilation shafts. The U16a Tunnel complex is eligible to the National Register of Historic Places under criteria a and c, consideration g of 36 CFR Part 60.4 as a historic landscape. Scientific research conducted at the tunnel has made significant contributions to the broad patterns of our history, particularly in regard to the Cold War era that was characterized by competing social, economic, and political ideologies between the former Soviet Union and the United States. The tunnel also possesses distinctive construction and engineering methods for conducting underground nuclear tests. The Desert Research Institute recommends that the U16a Tunnel area be left in place in its current condition and that the U16a Tunnel historic landscape be included in the Nevada National Security Site monitoring program and monitored on a regular basis.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, Roberrt C.; Drollinger, Harold
2013-06-01
This report presents a historical evaluation of the U16a Tunnel on the Nevada National Security Site in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office and the U.S. Department of Defense, Defense Threat Reduction Agency. The U16a Tunnel was used for underground nuclear weapons effects tests in Shoshone Mountain in Area 16 of the Nevada National Security Site. Six nuclear tests were conducted in the U16a Tunnel from 1962 to 1971. These tests are Marshmallow, Gum Drop, Double Play, Ming Vase,more » Diamond Dust, and Diamond Mine. The U.S. Department of Defense Threat Reduction Agency, with participation from Lawrence Livermore National Laboratory and Las Alamos National Laboratory, sponsored the tests. Fifteen high explosives tests were also conducted at the tunnel. Two were calibration tests during nuclear testing and the remaining were U.S. Department of Defense, Defense Threat Reduction Agency tunnel defeat tests. The U16a Tunnel complex is on the top and slopes of Shoshone Mountain, encompassing an area of approximately 16.7 hectares (41.1 acres). Major modifications to the landscape are a result of three principal activities, road construction and maintenance, mining activities related to development of the tunnel complex, and site preparation for activities related to testing. Forty-seven cultural features were recorded at the portal and on the slopes of Shoshone Mountain. At the portal area, features relate to the mining, construction, testing, and general every day operational support activities within the tunnel. These include concrete foundations for buildings, equipment pads, and rail lines. Features on the slopes above the tunnel relate to tunnel ventilation, borehole drilling, and data recording. Feature types include soil-covered bunkers, concrete foundations, instrument cable holes, drill holes, and ventilation shafts. The U16a Tunnel complex is eligible to the National Register of Historic Places under criteria a and c, consideration g of 36 CFR Part 60.4 as a historic landscape. Scientific research conducted at the tunnel has made significant contributions to the broad patterns of our history, particularly in regard to the Cold War era that was characterized by competing social, economic, and political ideologies between the former Soviet Union and the United States. The tunnel also possesses distinctive construction and engineering methods for conducting underground nuclear tests. The Desert Research Institute recommends that the U16a Tunnel area be left in place in its current condition and that the U16a Tunnel historic landscape be included in the Nevada National Security Site monitoring program and monitored on a regular basis.« less
The Defense Threat Reduction Agency's Technical Nuclear Forensics Research and Development Program
NASA Astrophysics Data System (ADS)
Franks, J.
2015-12-01
The Defense Threat Reduction Agency (DTRA) Technical Nuclear Forensics (TNF) Research and Development (R&D) Program's overarching goal is to design, develop, demonstrate, and transition advanced technologies and methodologies that improve the interagency operational capability to provide forensics conclusions after the detonation of a nuclear device. This goal is attained through the execution of three focus areas covering the span of the TNF process to enable strategic decision-making (attribution): Nuclear Forensic Materials Exploitation - Development of targeted technologies, methodologies and tools enabling the timely collection, analysis and interpretation of detonation materials.Prompt Nuclear Effects Exploitation - Improve ground-based capabilities to collect prompt nuclear device outputs and effects data for rapid, complementary and corroborative information.Nuclear Forensics Device Characterization - Development of a validated and verified capability to reverse model a nuclear device with high confidence from observables (e.g., prompt diagnostics, sample analysis, etc.) seen after an attack. This presentation will outline DTRA's TNF R&D strategy and current investments, with efforts focusing on: (1) introducing new technical data collection capabilities (e.g., ground-based prompt diagnostics sensor systems; innovative debris collection and analysis); (2) developing new TNF process paradigms and concepts of operations to decrease timelines and uncertainties, and increase results confidence; (3) enhanced validation and verification (V&V) of capabilities through technology evaluations and demonstrations; and (4) updated weapon output predictions to account for the modern threat environment. A key challenge to expanding these efforts to a global capability is the need for increased post-detonation TNF international cooperation, collaboration and peer reviews.
Nano-Structured Solids and Heterogeneous Catalysts: Powerful Tools for the Reduction of CBRN Threats
NASA Astrophysics Data System (ADS)
Guidotti, M.; Rossodivita, A.; Ranghieri, M. C.
In the field of non-conventional CBRN weapons, the recent rapid development of nanotechnology and catalysis over nanosized solids provides innovative tools for the detection, protection and decontamination against these threats. By improving the efficiency of the countermeasures and by minimizing the negative effects of a deliberate use of CBRN agents, the practical application of the new technologies will readily represent a step forward in lowering the vulnerability of the civilian populations and in preventing the use of mass destruction weapons by terrorist groups or by `rogue states' supporting terrorists' activity. In such scenario, some relevant examples of nanosystems applied to the defense from non-conventional warfare agents will be here presented and commented. The key role of nanotechnology and heterogeneous catalysis for a multidisciplinary approach in counteracting CBRN threats will be highlighted too.
Issues in national missile defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Canavan, G.H.
1998-12-01
Strategic missiles and weapons are proliferating rapidly; thus, the US and its Allies are likely to face both capable bilateral threats and multilateral configurations with complex coalitions for which defenses could be essential for stability. Current hit-to-kill interceptor and radar and infrared detection, track, and discrimination technology should suffice for limited threats, but it is necessary to meet those threats in time while maintaining growth potential for the more sophisticated threats likely to follow. National Missile Defense faces a confusing array of threats, programs, and alternatives, but the technologies in development are clearly an appropriate first step towards any ofmore » them. They are likely to succeed in the near term; the challenge is to retain flexibility to provide needed options in the mid and long terms.« less
Approaching threatening stimuli cause an expansion of defensive peripersonal space.
Bufacchi, R J
2017-10-01
When sudden environmental stimuli signaling threat occur in the portion of space surrounding the body (defensive peripersonal space), defensive responses are enhanced. Recently Bisio et al. (Bisio A, Garbarini F, Biggio M, Fossataro C, Ruggeri P, Bove M. J Neurosci 37: 2415-2424, 2017) showed that a marker of defensive peripersonal space, the defensive hand-blink reflex, is modulated by the motion of the eliciting threatening stimulus. These results can be parsimoniously explained by the continuous monitoring of environmental threats, resulting in an expansion of defensive peripersonal space when threatening stimuli approach. Copyright © 2017 the American Physiological Society.
How you perceive threat determines your behavior
Fernandes, Orlando; Portugal, Liana C. L.; Alves, Rita C. S.; Campagnoli, Rafaela R.; Mocaiber, Izabela; David, Isabel P. A.; Erthal, Fátima C. S.; Volchan, Eliane; de Oliveira, Leticia; Pereira, Mirtes G.
2013-01-01
The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT) paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed toward the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during directed toward threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, directed away threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by threat stimuli directed toward the observer. In sum, our data support the concept that emotions are indeed action tendencies. PMID:24115925
ERIC Educational Resources Information Center
Holmer, Leanna L.
2014-01-01
The neurosciences have expanded our understanding of the role of the "old" brain in generating defensive reactions to threat. Because the learning and practice of management skills pose various forms of threat to would-be practitioners, the question of how individuals respond to threat and how this affects their ability to learn has also…
Approximating the Probability of Mortality Due to Protracted Radiation Exposures
2016-06-01
Probability of Fatality 22 Section 9. References Anno , G. H., G. E. McClellan, M. A. Dore, and S. J . Baum, "Biological Effects of Protracted...Defense Threat Reduction Agency 8725 John J . Kingman Road, MS-6201 Fort Belvoir, VA 22060-6201...joule ( J ) erg 1 × 10–7 joule ( J ) kiloton (kt) (TNT equivalent) 4.184 × 1012 joule ( J ) British thermal unit (Btu) (thermochemical) 1.054 350 × 10
2010-06-01
please contact: Defense Threat Reduction Agency Advanced Systems and Concepts Office 8725 John J . Kingman Road Ft. Belvoir, VA 22060-6201...familiar settings. Anthony Mawson has found that most flight behavior subsequently characterized as panic is better accounted for as “affiliative...April 2006) 163:667-73. 26 Carol S. Fullerton and Robert J . Ursano, “Psychological and Psychopathological Consequences of Disasters,” in Juan José
2010-02-01
for the program was a fiction. The senator “salute[ d ] the Commission for shooting down essentially the ‘window of vulnerability’ bugaboo that has...Bill Hostyn (ASCO) 2. TYPE OF MATERIAL: [8) PAPER D PRESENTATION D ABSTRACT D OTHER SUSPENSE: DATE: DATE: DATE: 3. OVERALL CLASSIFICATION: [8...Authority § Proprietary Information Test and Evaluation Software Documentation Critical Technology Defense Threat Reduction Agency D C
A two-dimensional neuropsychology of defense: fear/anxiety and defensive distance.
McNaughton, Neil; Corr, Philip J
2004-05-01
We present in this paper a picture of the neural systems controlling defense that updates and simplifies Gray's "Neuropsychology of Anxiety". It is based on two behavioural dimensions: 'defensive distance' as defined by the Blanchards and 'defensive direction'. Defensive direction is a categorical dimension with avoidance of threat corresponding to fear and approach to threat corresponding to anxiety. These two psychological dimensions are mapped to underlying neural dimensions. Defensive distance is mapped to neural level, with the shortest defensive distances involving the lowest neural level (periaqueductal grey) and the largest defensive distances the highest neural level (prefrontal cortex). Defensive direction is mapped to separate parallel streams that run across these levels. A significant departure from prior models is the proposal that both fear and anxiety are represented at all levels. The theory is presented in a simplified form that does not incorporate the interactions that must occur between non-adjacent levels of the system. It also requires expansion to include the dimension of escapability of threat. Our current development and these proposed future extensions do not change the core concepts originally proposed by Gray and, we argue, demonstrate their enduring value.
Yanagisawa, Kuniaki; Abe, Nobuhito; Kashima, Emiko S; Nomura, Michio
2016-03-01
Reminders of death often elicit defensive responses in individuals, especially among those with low self-esteem. Although empirical evidence indicates that self-esteem serves as a buffer against mortality threats, the precise neural mechanism underlying this effect remains unknown. We used functional magnetic resonance imaging (fMRI) to test the hypothesis that self-esteem modulates neural responses to death-related stimuli, especially functional connectivity within the limbic-frontal circuitry, thereby affecting subsequent defensive reactions. As predicted, individuals with high self-esteem subjected to a mortality threat exhibited increased amygdala-ventrolateral prefrontal cortex (VLPFC) connectivity during the processing of death-related stimuli compared with individuals who have low self-esteem. Further analysis revealed that stronger functional connectivity between the amygdala and the VLPFC predicted a subsequent decline in responding defensively to those who threaten one's beliefs. These results suggest that the amygdala-VLPFC interaction, which is modulated by self-esteem, can reduce the defensiveness caused by death-related stimuli, thereby providing a neural explanation for why individuals with high self-esteem exhibit less defensive reactions to mortality threats. (c) 2016 APA, all rights reserved).
Shuhama, R; Del-Ben, C M; Loureiro, S R; Graeff, F G
2008-04-01
A former study with scenarios conducted in Hawaii has suggested that humans share with non-human mammals the same basic defensive strategies - risk assessment, freezing, defensive threat, defensive attack, and flight. The selection of the most adaptive strategy is strongly influenced by features of the threat stimulus - magnitude, escapability, distance, ambiguity, and availability of a hiding place. Aiming at verifying if these strategies would be consistent in a different culture, 12 defensive scenarios were translated into Portuguese and adapted to the Brazilian culture. The sample consisted of male and female undergraduate students divided into two groups: 76 students, who evaluated the five dimensions of each scenario and 248 medical students, who chose the most likely response for each scenario. In agreement with the findings from studies of non-human mammal species, the scenarios were able to elicit different defensive behavioral responses, depending on features of the threat. "Flight" was chosen as the most likely response in scenarios evaluated as an unambiguous and intense threat, but with an available route of escape, whereas "attack" was chosen in an unambiguous, intense and close dangerous situation without an escape route. Less urgent behaviors, such as "check out", were chosen in scenarios evaluated as less intense, more distant and more ambiguous. Moreover, the results from the Brazilian sample were similar to the results obtained in the original study with Hawaiian students. These data suggest that a basic repertoire of defensive strategies is conserved along the mammalian evolution because they share similar functional benefits in maintaining fitness.
Neural substrates of defensive reactivity in two subtypes of specific phobia
Hilbert, Kevin; Stolyar, Veronika; Maslowski, Nina I.; Beesdo-Baum, Katja; Wittchen, Hans-Ulrich
2014-01-01
Depending on threat proximity, different defensive behaviours are mediated by a descending neural network involving forebrain (distal threat) vs midbrain areas (proximal threat). Compared to healthy subjects, it can be assumed that phobics are characterized by shortened defensive distances on a behavioural and neural level. This study aimed at characterizing defensive reactivity in two subtypes of specific phobia [snake (SP) and dental phobics (DP)]. Using functional magnetic resonance imaging (fMRI), n = 39 subjects (13 healthy controls, HC; 13 SP; 13 DP) underwent an event-related fMRI task employing an anticipation (5–10 s) and immediate perception phase (phobic pictures and matched neutral stimuli; 1250 ms) to modulate defensive distance. Although no differential brain activity in any comparisons was observed in DP, areas associated with defensive behaviours (e.g. amygdala, hippocampus, midbrain) were activated in SP. Decreasing defensive distance in SP was characterized by a shift to midbrain activity. Present findings substantiate differences between phobia types in their physiological and neural organization that can be expanded to early stages of defensive behaviours. Findings may contribute to a better understanding of the dynamic organization of defensive reactivity in different types of phobic fear. PMID:24174207
Suppressed anger, evaluative threat, and cardiovascular reactivity: a tripartite profile approach.
Jorgensen, Randall S; Kolodziej, Monika E
2007-11-01
Despite decades of theory and research implicating suppressed anger in the development of cardiovascular disorders involving cardiovascular reactivity (CVR), to date the theoretical components of low anger expression, guilt feelings over agonistic reactions, and defensive strivings to avoid social disapproval have not been used conjointly to profile suppressed anger for the prediction of CVR. The purpose of this study, then, was to cluster analyze measures of anger expression, hostility guilt, and social defensiveness to create a suppressed anger profile (low anger expression, high hostility guilt, high social defensiveness) and a non-suppressed profile from a sample of college males. Social evaluative threat may be a potent stressor for people who defensively suppress anger expression. Thus, to examine the combined effects of suppressed anger and social evaluative threat, participants, prior to telling a story to a Thematic Apperception Card (TAT), were randomly assigned to either a high-threat (story will be compared to stories created by the mentally ill) or a low-threat condition (story used to study effects of talking on cardiovascular responses). Blood pressure (BP) and heart rate (HR) were monitored during a rest period and the subsequent TAT card period. As predicted, suppressed anger males in the high-threat condition showed the highest levels of diastolic BP and HR change from the rest period. The suppressed anger group's systolic BP reactivity was independent of threat manipulation. Research implications are discussed.
An Overview of the Technical Basis of HENRE 2.0 Models
2015-08-01
Defense Threat Reduction Agency 8725 John J . Kingman Road, MS-6201 Fort Belvoir, VA 22060-6201...Agency 8725 John J . Kingman Road, Mail Stop 6201 Fort Belvoir, VA 22060-6201 DTRA J9NTSN DTRA-TR-15-070 DISTRIBUTION A. Approved for public release...10–19 joule ( J ) erg 1 × 10–7 joule ( J ) kiloton (kT) (TNT equivalent) 4.184 × 1012 joule ( J ) British thermal unit (Btu) (thermochemical) 1.054 350
2001-10-01
USING ATMOSPHERIC 137CS MEASUREMENTS AND HYSPLIT TO CONFIRM CHERNOBYL AS A SOURCE OF 137CS IN EUROPE Erik L. Swanberg1 and Steven G. Hoffert2...Veridian Systems1, Autometric2 Sponsored by Defense Threat Reduction Agency Contract No. DTRA01-99-C-0031 ABSTRACT The Chernobyl ...this 137Cs is the ground contaminated by the Chernobyl accident. The PIDC routinely uses HYSPLIT (HYbrid Single-Particle Lagrangian Integrated
Advanced Technology Acquisition Strategies of the People’s Republic of China
2010-09-01
identify, plan, and persuasively communicate what is needed in the near-term to achieve the longer-term goals inherent in the Agency’s mission. ASCO...Over several decades, Chinese leaders have pursued C DEFENSE THREAT REDUCTION AGENGY – ADVANCED SYSTEMS AND CONCEPTS OFFICE 2 what has...mathematics, astronomy , manufacturing, and many other facets of economic and cultural development. The “four great inventions” (sì dà fā míng) of
2007-06-22
PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Sandia National Laboratories,PO Box 5800,Albuquerque,NM,87103 8. PERFORMING ORGANIZATION REPORT NUMBER 9...Nancy Kay Hayden Sandia National Laboratories Albuquerque, NM June 22, 2007 Work performed for Defense Threat Reduction Agency/Advanced...Bale for sharing their experience, wisdom, insights, and time to discuss the important issues and review the work performed . I thank sponsors and
2012-10-24
ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) Defense Threat Reduction Agency 8725 John J. Kingman Road STOP 6201 Fort Belvoir, VA 22060 6201 11...Research Council Research Associateship Award at USAMRICD. We thank Angela Adkins, Alexandre Katos, Megan Lyman, Marian Nelson and Adam Swartz (USAMRICD...2Department of Clinical Investigations, Madigan Army Medical Center, 9040 Jackson Avenue, Fort Lewis, WA 98431, USA. Received: 5 March 2012 Accepted: 10
2014-03-01
Center for Contemporary Conflict,1411 Cunningham Road,Monterey,CA,93943 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING...Postgraduate School Center on Contemporary Conflict and the Defense Threat Reduction Agency. The...unlimited. U.S. Naval Postgraduate School (NPS) Center on Contemporary Conflict (CCC) Project
Observing Short-wave Infrared Atmospheric Fluorescence Near Radioactive Sources: A Feasibility Study
2014-03-17
Defense Threat Reduction Agency Ft. Belvoir, VA 22060 76-4184-32-5 MIPR HDTRA 124655 1NRC Postdoctoral Research Associate Contents 1 Introduction 1 2...a desire to measure cosmic ray effects. For example, the pioneering study of cosmic ray detection by fluorescence was by Bunner in 1967 wherein he...wavelengths, the ultra-high energy cosmic ray (UHECR) community has continued to pursue studies of the fluorescence yield from high energy particle impact on
41 CFR 60-300.22 - Direct threat defense.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Direct threat defense. 60-300.22 Section 60-300.22 Public Contracts and Property Management Other Provisions Relating to Public... DISABLED VETERANS, RECENTLY SEPARATED VETERANS, OTHER PROTECTED VETERANS, AND ARMED FORCES SERVICE MEDAL...
41 CFR 60-300.22 - Direct threat defense.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60-300.22 Section 60-300.22 Public Contracts and Property Management Other Provisions Relating to Public... DISABLED VETERANS, RECENTLY SEPARATED VETERANS, OTHER PROTECTED VETERANS, AND ARMED FORCES SERVICE MEDAL...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bri Rolston
2005-06-01
Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less
Maintaining Peace - The Threat, the Force, and the Nation
1992-04-03
that properly managed, the central theme enunciated variously by Hobbes and Locke, Rousseau and the Federalists remains valid today, namely: "As...combat, in all its forms, is a secondary by-product of the defense effort. The real product of defense is, and must remain , the production of peace...reshape the American military represents a threat to peace. 5. Global Hostilities: The threat of U.S. involvement in an armed conflict remains a distinct
Stochastic model for threat assessment in multi-sensor defense system
NASA Astrophysics Data System (ADS)
Wang, Yongcheng; Wang, Hongfei; Jiang, Changsheng
2007-11-01
This paper puts forward a stochastic model for target detecting and tracking in multi-sensor defense systems and applies the Lanchester differential equations to threat assessment in combat. The two different modes of targets tracking and their respective Lanchester differential equations are analyzed and established. By use of these equations, we could briefly estimate the loss of each combat side and accordingly get the threat estimation results, given the situation analysis is accomplished.
DOE Office of Scientific and Technical Information (OSTI.GOV)
NSTec Environmental Restoration
This Corrective Action Decision Document (CADD)/Closure Report (CR) was prepared by the Defense Threat Reduction Agency (DTRA) for Corrective Action Unit (CAU) 477, N-Tunnel Muckpile. This CADD/CR is consistent with the requirements of the Federal Facility Agreement and Consent Order (FFACO) agreed to by the State of Nevada, the U.S. Department of Energy, and the U.S. Department of Defense. Corrective Action Unit 477 is comprised of one Corrective Action Site (CAS): • 12-06-03, Muckpile The purpose of this CADD/CR is to provide justification and documentation supporting the recommendation for closure with no further action, by placing use restrictions on CAUmore » 477.« less
From Threat to Fear: The neural organization of defensive fear systems in humans
Mobbs, Dean; Marchant, Jennifer L; Hassabis, Demis; Seymour, Ben; Tan, Geoffrey; Gray, Marcus; Petrovic, Predrag; Dolan, Raymond J.; Frith, Christopher D.
2009-01-01
Post-encounter and circa-strike defensive contexts represent two adaptive responses to potential and imminent danger. In the context of a predator, the post-encounter reflects the initial detection of the potential threat, whilst the circa-strike is associated with direct predatory attack. We used fMRI to investigate the neural organization of anticipation and avoidance of artificial predators with high or low probability of capturing the subject across analogous post-encounter and circa-strike contexts of threat. Consistent with defense systems models, post-encounter threat elicited activity in forebrain areas including subgenual anterior cingulate cortex (sgACC), hippocampus and amygdala. Conversely, active avoidance during circa-strike threat increased activity in mid-dorsal ACC and midbrain areas. During the circa-strike condition, subjects showed increased coupling between the midbrain and mid-dorsal ACC and decreased coupling with the sgACC, amygdala and hippocampus. Greater activity was observed in the right pregenual ACC for high compared to low probability of capture during circa-strike threat. This region showed decreased coupling with the amygdala, insula and ventromedial prefrontal cortex. Finally, we found that locomotor errors correlated with subjective reports of panic for the high compared to low probability of capture during the circa-strike threat and these panic-related locomotor errors were correlated with midbrain activity. These findings support models suggesting that higher forebrain areas are involved in early threat responses, including the assignment and control of fear, whereas as imminent danger results in fast, likely “hard-wired”, defensive reactions mediated by the midbrain. PMID:19793982
Neural substrates of defensive reactivity in two subtypes of specific phobia.
Lueken, Ulrike; Hilbert, Kevin; Stolyar, Veronika; Maslowski, Nina I; Beesdo-Baum, Katja; Wittchen, Hans-Ulrich
2014-11-01
Depending on threat proximity, different defensive behaviours are mediated by a descending neural network involving forebrain (distal threat) vs midbrain areas (proximal threat). Compared to healthy subjects, it can be assumed that phobics are characterized by shortened defensive distances on a behavioural and neural level. This study aimed at characterizing defensive reactivity in two subtypes of specific phobia [snake (SP) and dental phobics (DP)]. Using functional magnetic resonance imaging (fMRI), n = 39 subjects (13 healthy controls, HC; 13 SP; 13 DP) underwent an event-related fMRI task employing an anticipation (5-10 s) and immediate perception phase (phobic pictures and matched neutral stimuli; 1250 ms) to modulate defensive distance. Although no differential brain activity in any comparisons was observed in DP, areas associated with defensive behaviours (e.g. amygdala, hippocampus, midbrain) were activated in SP. Decreasing defensive distance in SP was characterized by a shift to midbrain activity. Present findings substantiate differences between phobia types in their physiological and neural organization that can be expanded to early stages of defensive behaviours. Findings may contribute to a better understanding of the dynamic organization of defensive reactivity in different types of phobic fear. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.
Defense.gov Special Report: Defense Intelligence
Department of Defense Submit Search Defense intelligence is critical to the Defense Department's role in and conduct successful military and security operations that protect America. Defense Intelligence News Story Intelligence Chief Describes 'Pervasive Uncertainty' of Worldwide Threats "
41 CFR 60-250.22 - Direct threat defense.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60-250.22 Section 60-250.22 Public Contracts and Property Management Other Provisions Relating to Public... SPECIAL DISABLED VETERANS, VETERANS OF THE VIETNAM ERA, RECENTLY SEPARATED VETERANS, AND OTHER PROTECTED...
41 CFR 60-250.22 - Direct threat defense.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Direct threat defense. 60-250.22 Section 60-250.22 Public Contracts and Property Management Other Provisions Relating to Public... SPECIAL DISABLED VETERANS, VETERANS OF THE VIETNAM ERA, RECENTLY SEPARATED VETERANS, AND OTHER PROTECTED...
41 CFR 60-250.22 - Direct threat defense.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Direct threat defense. 60-250.22 Section 60-250.22 Public Contracts and Property Management Other Provisions Relating to Public... SPECIAL DISABLED VETERANS, VETERANS OF THE VIETNAM ERA, RECENTLY SEPARATED VETERANS, AND OTHER PROTECTED...
2007-03-01
unlimited. March 2007 DTRA01-03-C-0064 David C. Kocher and Julian A. Apostoaei Prepared by: SENES Oak Ridge, lnc. 102 Donner Drive Oak Ridge, TN 37830 W... 37830 8. PERFORMINGORGANIZATION REPORT NUMBER DTRA-TR-07-4 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) Defense Threat Reduction Agency N...DARE L3 Communications 11410 Isaac Newton Square North, Suite 103 Reston, VA 20190-5005 Senes Oak Ridge, Inc. 102 Donner Drive Oak Ridge, TN 37830
Medical Modeling of Particle Size Effects for CB Inhalation Hazards
2015-09-01
0:: 0 D.. w 0:: ... J <C 0 -z J : 0 w ~ Defense Threat Reduction Agency 8725 John J . Kingman Road, MS-6201 Fort Belvoir, VA 22060...DTRIAC/ J9STT, 8725 JOHN J . KINGMAN ROAD, MS-6201, FT BELVOIR, VA 22060-6201, IF YOUR ADDRESS IS INCORRECT, IF YOU WISH THAT IT BE DELETED FROM...Millage, Gene E. McClellan, Bahman Asgharian, Joshua J . Bergman, Darren R. Oldson, and Sharon A. Watson Applied Research Associates, Inc. Health
High-Energy Laser for Detection, Inspection, and Non-Destructive Testing
2011-03-21
at the gra odes. The -2 at 0.1 Hz -cm-2, and mage thre n array of beam. Th burns on pled to a to measur laser is eq micron lev ent beam ( rget...project or resulting research? Defense Threat Reduction Agency, “Compact Source of Laser -Driven Monoenergetic Gamma-Rays” --$2,982,685... LASER FOR DETECTION, INSPECTION, AND NON-DESTRUCTIVE TESTING 3) Grant/Contract Number: FA9550-07-1-0521 4) Reporting Period Start: 06/21/2007
Acquisition of a Thermophoresis Instrument for Molecular Association Thermodynamic Studies
2015-05-20
using NAMD.27 Crystallographic structures of C3d ( PDB code 1C3D) and C3d-CR2 ( PDB code 3OED) were obtained from the protein data bank ( PDB ).28 Missing...This project is funded by DTRA (Defense Threat Reduction Agency) and aims to develop new multienzyme structures for the controlled destruction of...enable detection. Pharmacophore models were developed based on known C3d-ligand interactions and information from computational analysis of structural
2007-05-01
taggants south of Mockingbird Gap and the limited number of simulants met the Agency requirements. It was recognized at that time if either situation...from attack. * A new test bed for HTD testing is proposed at Mockingbird South. Alternative one, the preferred alternative, would allow DTRA to expand...HTD tests, and explosive tests have the potential to directly injure or kill native fauna from flying debris and blast overpressure. Craters
Immobility reactions under threat: A contribution to human defensive cascade and PTSD.
Volchan, E; Rocha-Rego, V; Bastos, A F; Oliveira, J M; Franklin, C; Gleiser, S; Berger, W; Souza, G G L; Oliveira, L; David, I A; Erthal, F S; Pereira, M G; Figueira, I
2017-05-01
Violence exacts a burden on public health. Gun violence is a major trigger for motor defensive reactions in humans and post-traumatic stress disorder (PTSD) is its main psychiatric sequela. However, studies of the human defensive cascade, especially the motor reactions, are at an early stage. This review focuses on studies that employ stabilometry, a methodology that assesses whole body motor reactions, to address defensive behaviors to violence-related threats. Special attention is given to three reactions: "attentive immobility", "immobility under attack" and "tonic immobility", with emphasis on the latter - a peritraumatic reaction which has been strongly associated with the severity of PTSD. These reactions are characterized by reduced body sway and bradycardia, except tonic immobility that presents robust tachycardia. The advances made by investigations into the immobility reactions of the human defensive cascade contribute to helping to bridge the gap between human and non-human species. Furthermore, progresses in basic research to objectively monitor motor defensive reactions under threat can help to develop a dimensional, trans-diagnostic approach to PTSD. Copyright © 2017 Elsevier Ltd. All rights reserved.
2014-05-01
applicability of DOD Directive 6205.3, which they believe was made obsolete when the 2001 Quadrennial Defense Review established DOD’s emphasis on...gas masks, gloves, and boots, or biosurveillance and detection equipment in our analysis. We included in our definition of “biological threat
Assistant Secretary of Defense for Homeland Defense and Global Security
Defense for Policy ASD for Asian and Pacific Security Affairs ASD for Homeland Defense Global Security Special Operations/Low-Intensity Conflict Counternarcotics and Global Threats Stability and Humanitarian HomeOUSDP OfficesASD for Homeland Defense Global Security Assistant Secretary of Defense for Homeland
Threat prompts defensive brain responses independently of attentional control.
Pichon, Swann; de Gelder, Beatrice; Grèzes, Julie
2012-02-01
Negative emotional signals are known to influence task performance, but so far, investigations have focused on how emotion interacts with perceptual processes by mobilizing attentional resources. The attention-independent effects of negative emotional signals are less well understood. Here, we show that threat signals trigger defensive responses independently of what observers pay attention to. Participants were scanned using functional magnetic resonance imaging while watching short video clips of threatening actions and performed either color or emotion judgments. Seeing threatening actions interfered with performance in both tasks. Amygdala activation reflected both stimulus and task conditions. In contrast, threat stimuli prompted a constant activity in a network underlying reflexive defensive behavior (periaqueductal gray, hypothalamus, and premotor cortex). Threat stimuli also disrupted ongoing behavior and provoked motor conflict in prefrontal regions during both tasks. The present results are consistent with the view that emotions trigger adaptive action tendencies independently of task settings.
Fossataro, C; Gindri, P; Mezzanato, T; Pia, L; Garbarini, F
2016-06-13
Do conscious beliefs about the body affect defensive mechanisms within the body? To answer this question we took advantage from a monothematic delusion of bodily ownership, in which brain-damaged patients misidentify alien limbs as their own. We investigated whether the delusional belief that an alien hand is their own hand modulates a subcortical defensive response, such as the hand-blink reflex. The blink, dramatically increases when the threated hand is inside the defensive peripersonal-space of the face. In our between-subjects design, including patients and controls, the threat was brought near the face either by the own hand or by another person's hand. Our results show an ownership-dependent modulation of the defensive response. In controls, as well as in the patients' intact-side, the response enhancement is significantly greater when the threat was brought near the face by the own than by the alien hand. Crucially, in the patients' affected-side (where the pathological embodiment occurs), the alien (embodied) hand elicited a response enhancement comparable to that found when the threat is brought near the face by the real hand. These findings suggest the existence of a mutual interaction between our conscious beliefs about the body and the physiological mechanisms within the body.
Nuclear threat: can Europe build a common defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Buis, G.
1981-03-01
With declining credibility of American protection and continuing divisiveness among western European nations, controversy surrounds the acquisition of a nuclear force which could supply the ways and means of self-defense or just increase the military threat and cost. Defense depends on displaying a powerful, diversified, and credible nuclear armament. The author feels that Britain must be excluded from this force and problems between France and Germany and smaller countries settled before a common nuclear arms system can be set up. (DCK)
U.S. Department of Defense deems climate change a national security threat
NASA Astrophysics Data System (ADS)
Wendel, JoAnna
2014-10-01
Climate change is a "threat multiplier," according to a new report by the U.S. Department of Defense (DOD). The report, entitled 2014 Climate Change Adaptation Roadmap and released on 13 October, lays out ways in which DOD will work with other nations to combat the challenges associated with, adapt to, and mitigate climate change.
Defense.gov Special Report: Travels with Lynn - January 2011
said during his visit to Brussels, Belgium. Story Lynn: NATO Must Get Ahead of Cyber Threat BRUSSELS , Belgium, Jan. 25, 2011 - Now is the time for NATO to get ahead of the cyber threat, Deputy Defense Assault Prevention Asia-Pacific Rebalance Cyber Strategy News Today in DOD Press Advisories News Releases
DOE Office of Scientific and Technical Information (OSTI.GOV)
NSTec Environmental Restoration
This Corrective Action Decision Document (CADD)/Closure Report (CR) was prepared by the Defense Threat Reduction Agency (DTRA) for Corrective Action Unit (CAU) 478, Area 12 T-Tunnel Ponds. This CADD/CR is consistent with the requirements of the Federal Facility Agreement and Consent Order (FFACO) agreed to by the State of Nevada, the U.S. Department of Energy (DOE), and the U.S. Department of Defense. Corrective Action Unit 478 is comprised of one corrective action site (CAS): • 12-23-01, Ponds (5) RAD Area The purpose of this CADD/CR is to provide justification and documentation supporting the recommendation for closure in place with usemore » restrictions for CAU 478.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
NSTec Environmental Restoration
This Corrective Action Decision Document (CADD)/Closure Report (CR) was prepared by the Defense Threat Reduction Agency (DTRA) for Corrective Action Unit (CAU) 559, T-Tunnel Compressor/Blower Pad. This CADD/CR is consistent with the requirements of the Federal Facility Agreement and Consent Order (FFACO) agreed to by the State of Nevada, the U.S. Department of Energy, and the U.S. Department of Defense. Corrective Action Unit 559 is comprised of one Corrective Action Site (CAS): • 12-25-13, Oil Stained Soil and Concrete The purpose of this CADD/CR is to provide justification and documentation supporting the recommendation for closure in place with use restrictionsmore » for CAU 559.« less
Under Secretary of Defense for Policy > OUSDP Offices > ASD for Homeland
Defense Global Security > Defense Critical Infrastructure Program > Roles Skip to main for Asian and Pacific Security Affairs ASD for Homeland Defense Global Security DASD Defense -Intensity Conflict Counternarcotics and Global Threats Stability and Humanitarian Affairs Special Operations
32 CFR 310.22 - Non-consensual conditions of disclosure.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Section 310.22 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE... Department of Defense if the disclosure of such a list would pose a privacy or security threat. (c) Disclosures for established routine uses. (1) Records may be disclosed outside the Department of Defense...
Roos, Jason; Chue, Calvin; DiEuliis, Diane; Emanuel, Peter
The US Department of Defense (DOD) established programs to defend against chemical and biological weapons 100 years ago because military leaders understood that the operational capability of the US military is diminished when service member health is compromised. These threats to operational readiness can be from an overt attack using chemical and biological threats but may also arise from natural exposures. In the current era of rapidly emerging technologies, adversaries are not only rediscovering chemical and biological weapons; they are also displaying an increased propensity to employ them to cause strategic instability among deployed forces or nations undergoing conflict. The United States's investments in its Chemical and Biological Defense Program (CBDP) can be a critical enabler of the third offset strategy, which is a DOD initiative that seeks to maximize force capability to offset emerging threats. To realize this vision, the CBDP must make fundamental changes in acquiring and employing effective technologies so that enemy use of chemical and biological agents against US assets is no longer a viable option. Maximization of US force health status will provide a strategic advantage over theater opponents more vulnerable to operational degradation from chemical and biological threats.
NASA Astrophysics Data System (ADS)
Arkin, Ronald C.; Lyons, Damian; Shu, Jiang; Nirmal, Prem; Zafar, Munzir
2012-06-01
A crucially important aspect for mission-critical robotic operations is ensuring as best as possible that an autonomous system be able to complete its task. In a project for the Defense Threat Reduction Agency (DTRA) we are developing methods to provide such guidance, specifically for counter-Weapons of Mass Destruction (C-WMD) missions. In this paper, we describe the scenarios under consideration, the performance measures and metrics being developed, and an outline of the mechanisms for providing performance guarantees.
2007-03-01
International Seismological C -DTRA 01-00-C-0074 Centre & USGS Seismic Magnitudes PE - 462D PR- AE TA - EJ 6. AUTHOR(S) WU - DH0203 9 Paul G. Richards, John P...Defense Threat Reduction Agency 8725 John J. Kingman Road, MS 6201 "a Fort Belvoir, VA 22060-6201 ’ DTRA-TR-06-15 Discrepancies Between Prototype...0 Z March 2007 "I 20070420395 Li DTRA 01 -00-C-0074 M Paul G. Richards, et al. Prepared by: Columbia University Lamont-Doherty Earth Observatory 61
2010-06-01
validation of real-time PCR assays for the identification of Yersinia pestis. Clin Chem Lab Med 46: 1239–1244. 25. Matero P, Pasanen T , Laukkanen R ...research was supported by the Defense Threat Reduction Agency, Joint Science and Technology Office, Medical S& T Division. The funders had no role in study...QA1122-F 59-CCAAATGGAAGCACTGCCCTGTAG-39 24 61.8 54.2 105 QA1122- R 59-ATGCGGTGAGAGCCTCAGGATTC-39 23 62.1 56.5 L-413C-F 59-ACGTGGTCATGTCCGTCACAATC-39 23
Pereira, Cicero Roberto; Álvaro, José Luis; Vala, Jorge
2018-05-01
This article analyzes the ego-defensive role played by legitimation, by examining the hypothesis that threat-based justifications attenuate the negative effect on an individual's self-esteem caused by his or her becoming aware of his or her own discriminatory behavior. Across three studies (including a pilot experiment), participants who were led to believe that they had acted in a discriminatory way experienced a decrease in their self-esteem. In Study 1 ( N = 116), this effect was nullified when discrimination was justified by either symbolic or realistic threat perceptions. Study 2 ( N = 250) replicated this pattern of results and went further by showing that discrimination affects self-esteem only in more egalitarian individuals, whereas for those less egalitarian, it affects their social image. According to the ego-defensive role of legitimation, a meta-analytical integration of the results confirmed that the influence of discrimination in depressing self-esteem is moderated by threat-based justifications.
Hart, Joshua; Shaver, Phillip R; Goldenberg, Jamie L
2005-06-01
On the basis of prior work integrating attachment theory and terror management theory, the authors propose a model of a tripartite security system consisting of dynamically interrelated attachment, self-esteem, and worldview processes. Four studies are presented that, combined with existing evidence, support the prediction derived from the model that threats to one component of the security system result in compensatory defensive activation of other components. Further, the authors predicted and found that individual differences in attachment style moderate the defenses. In Studies 1 and 2, attachment threats motivated worldview defense among anxiously attached participants and motivated self-enhancement (especially among avoidant participants), effects similar to those caused by mortality salience. In Studies 3 and 4, a worldview threat and a self-esteem threat caused attachment-related proximity seeking among fearful participants and avoidance of proximity among dismissing participants. The authors' model provides an overarching framework within which to study attachment, self-esteem, and worldviews.
Hamm, Alfons O; Richter, Jan; Pané-Farré, Christiane A
2014-01-01
Unexpected, recurrent panic attacks and anxious apprehension are two distinct emotional phenomena that constitute the core symptoms for diagnosing panic disorder. Taking a neuroscience perspective the current review paper presents both epidemiological and experimental psychophysiological evidence suggesting that panic attacks can be conceptualized as an unconditioned circa defense response pattern to intense internal threat stimuli, characterized by strong autonomic surge and escape behavior and abnormal plastic changes of the brain. Anxious apprehension develops after the experience of such severe panic attacks as conditioned responses to mild body symptoms. Theoretically these conditioned fear responses can be considered as post-encounter defense characterized by increased selective attention, increased threat appraisal and defensive freezing and startle potentiation evidencing altered brain circuits evoked by mild body symptoms. Agoraphobic avoidance starts very early during the defensive cascade and can be conceived as motivated behavior driven by the incentive to be in a safe context that is under control of the individual.
2017-04-21
focusses on the policy shortfalls, organizational structure vulnerabilities, and challenges that exist in DOD. It highlights areas where...relationships within DOD, in line with traditional organizational structures adeptly addresses the current seams between kinetic and non- kinetic...Figure 2 DOD Organizational Structure http://dcmo.defense.gov/Portals/47/Documents/PDSD/201509_DoD_Organizational_Structure.pdf The majority of
DOE Office of Scientific and Technical Information (OSTI.GOV)
Morris, Christopher; Durham, J. Matthew; Guardincerri, Elena
Cosmic ray muon imaging has been studied for the past several years as a possible technique for nuclear warhead inspection and verification as part of the New Strategic Arms Reduction Treaty between the United States and the Russian Federation. The Los Alamos team has studied two different muon imaging methods for this application, using detectors on two sides and one side of the object of interest. In this report we present results obtained on single sided imaging of configurations aimed at demonstrating the potential of this technique for counting nuclear warheads in place with detectors above the closed hatch ofmore » a ballistic missile submarine.« less
Pyszczynski, T; Greenberg, J; Solomon, S
1999-10-01
Distinct defensive processes are activated by conscious and nonconscious but accessible thoughts of death. Proximal defenses, which entail suppressing death-related thoughts or pushing the problem of death into the distant future by denying one's vulnerability, are rational, threat-focused, and activated when thoughts of death are in current focal attention. Distal terror management defenses, which entail maintaining self-esteem and faith in one's cultural worldview, function to control the potential for anxiety that results from knowing that death is inevitable. These defenses are experiential, are not related to the problem of death in any semantic or logical way, and are increasingly activated as the accessibility of death-related thoughts increases, up to the point at which such thoughts enter consciousness and proximal threat-focused defenses are initiated. Experimental evidence for this analysis is presented.
Counter-Terrorism Contributions from the National Labs
NASA Astrophysics Data System (ADS)
Davis, Jay
2002-04-01
The DOD and NNSA laboratories have significant technical capabilities that can contribute to counter-terrorism and homeland security. Maximizing those contributions, however, requires that laboratory staff engage the doctrinal and operational issues of these problems as well. The broader interagency community needs support in these components of the problem as much as in the technical components. The speaker's experiences as director of the DoD Defense Threat Reduction Agency, established in 1998 to address DoD's role in defense against weapons of mass destruction in all venues, have given him a somewhat unique perspective on this problem. Examples of issues identified in scenario play at Cabinet level in the last Admistration will be given to illustrate the breadth of this problem, as will the speaker's assessment of the grand challenges in deterring use of WMD against the Homeland.
How Human Amygdala and Bed Nucleus of the Stria Terminalis May Drive Distinct Defensive Responses.
Klumpers, Floris; Kroes, Marijn C W; Baas, Johanna M P; Fernández, Guillén
2017-10-04
The ability to adaptively regulate responses to the proximity of potential danger is critical to survival and imbalance in this system may contribute to psychopathology. The bed nucleus of the stria terminalis (BNST) is implicated in defensive responding during uncertain threat anticipation whereas the amygdala may drive responding upon more acute danger. This functional dissociation between the BNST and amygdala is however controversial, and human evidence scarce. Here we used data from two independent functional magnetic resonance imaging studies [ n = 108 males and n = 70 (45 females)] to probe how coordination between the BNST and amygdala may regulate responses during shock anticipation and actual shock confrontation. In a subset of participants from Sample 2 ( n = 48) we demonstrate that anticipation and confrontation evoke bradycardic and tachycardic responses, respectively. Further, we show that in each sample when going from shock anticipation to the moment of shock confrontation neural activity shifted from a region anatomically consistent with the BNST toward the amygdala. Comparisons of functional connectivity during threat processing showed overlapping yet also consistently divergent functional connectivity profiles for the BNST and amygdala. Finally, childhood maltreatment levels predicted amygdala, but not BNST, hyperactivity during shock anticipation. Our results support an evolutionary conserved, defensive distance-dependent dynamic balance between BNST and amygdala activity. Shifts in this balance may enable shifts in defensive reactions via the demonstrated differential functional connectivity. Our results indicate that early life stress may tip the neural balance toward acute threat responding and via that route predispose for affective disorder. SIGNIFICANCE STATEMENT Previously proposed differential contributions of the BNST and amygdala to fear and anxiety have been recently debated. Despite the significance of understanding their contributions to defensive reactions, there is a paucity of human studies that directly compared these regions on activity and connectivity during threat processing. We show strong evidence for a dissociable role of the BNST and amygdala in threat processing by demonstrating in two large participant samples that they show a distinct temporal signature of threat responding as well as a discriminable pattern of functional connections and differential sensitivity to early life threat. Copyright © 2017 the authors 0270-6474/17/379645-12$15.00/0.
Toward the Development of a Sustainable Scientific Research Culture in Azerbaijan (2011-2015).
Aliyeva, Saida; Flanagan, Peter; Johnson, April; Strelow, Lisa
2016-01-01
This review especially describes the dangerous pathogens research program in Azerbaijan (AJ) funded by the US Defense Threat Reduction Agency under the Cooperative Biological Engagement Program (CBEP) from 2011 through 2015. The objectives of the CBEP are to prevent the proliferation of biological weapons; to consolidate and secure collections of dangerous pathogens in central repositories; to strengthen biosafety and biosecurity of laboratory facilities; and to improve partner nations' ability to detect, diagnose, report, and respond to outbreaks of disease caused by especially dangerous pathogens. One of the missions of the CBEP is therefore to increase the research skills and proficiency of partner country scientists. The program aims to fulfill this mission by sponsoring scientific research projects that exercise the modern diagnostic techniques available in the CBEP-engaged laboratories and the enhanced disease surveillance/control programs. To strengthen the local scientists' ability to develop research ideas, write grant proposals, and conduct research independently, in-country CBEP integrating contractor personnel have mentored scientists across AJ and conducted workshops to address technical gaps. As a result of CBEP engagement, seven research projects developed and led by AJ scientists have been funded, and five projects are currently in various stages of implementation. The Defense Threat Reduction Agency has also sponsored AJ scientist participation at international scientific conferences to introduce and integrate them into the global scientific community. The efforts summarized in this review represent the first steps in an ongoing process that will ultimately provide AJ scientists with the skills and resources to plan and implement research projects of local and regional relevance.
Niemiec, Christopher P; Brown, Kirk Warren; Kashdan, Todd B; Cozzolino, Philip J; Breen, William E; Levesque-Bristol, Chantal; Ryan, Richard M
2010-08-01
Terror management theory posits that people tend to respond defensively to reminders of death, including worldview defense, self-esteem striving, and suppression of death thoughts. Seven experiments examined whether trait mindfulness-a disposition characterized by receptive attention to present experience-reduced defensive responses to mortality salience (MS). Under MS, less mindful individuals showed higher worldview defense (Studies 1-3) and self-esteem striving (Study 5), yet more mindful individuals did not defend a constellation of values theoretically associated with mindfulness (Study 4). To explain these findings through proximal defense processes, Study 6 showed that more mindful individuals wrote about their death for a longer period of time, which partially mediated the inverse association between trait mindfulness and worldview defense. Study 7 demonstrated that trait mindfulness predicted less suppression of death thoughts immediately following MS. The discussion highlights the relevance of mindfulness to theories that emphasize the nature of conscious processing in understanding responses to threat.
Depth Perception and Defensive System Activation in a 3-D Environment
Combe, Emmanuelle; Fujii, Naotaka
2011-01-01
To survive, animals must be able to react appropriately (in temporal and behavioral terms) when facing a threat. One of the essential parameters considered by the defensive system is the distance of the threat, the “defensive distance.” In this study, we investigate the visual depth cues that could be considered as an alarm cue for the activation of the defensive system. For this purpose, we performed an active-escape pain task in a virtual three-dimensional environment. In two experiments, we manipulated the nature and consistency of different depth cues: vergence, linear perspective, and angular size. By measuring skin conductance responses, we characterized the situations that activated the defensive system. We show that the angular size of the predator was sufficient information to trigger responses from the defensive system, but we also demonstrate that vergence, which can delay the emotional response in inconsistent situations, is also a highly reliable cue for the activation of the defensive system. PMID:21941515
Operation Noble Eagle and the Use of Combat Air Patrols for Homeland Defense
2008-12-01
aviation security , together with the absence of terrorist attacks on the homeland and of no actionable intelligence indicating an imminent air threat in America. The following sub-areas were researched to help evaluate and recommend changes to the current ONE CAP policy: the history of air defense in America; U.S. air defense mistakes on 9/11 and the evolution of ONE; improvements in the intelligence community and aviation security since 9/11; specific threats to aviation and the risk of another 9/11-style attack in the United States; and the cost and
2002-01-01
catastrophic health consequences , resulting from potential exposures to industrial chemicals (Armed Forces Medical Intelligence Center, 1998). These...susceptible to damage from a toxic industrial material release. For this second component, the Consequence Assessment Tools Set (CATS) (Defense Threat...accidental toxic industrial material release, the severity of the release, and any associated consequences that might occur. These are based on estimated
Combating Terrorism: North American Aerospace Defense Command Versus Asymmetric Threats
2016-02-01
AU/ACSC/2016 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY COMBATING TERRORISM: NORTH AMERICAN AEROSPACE DEFENSE COMMAND...1 SECTION II: BACKGROUND ...........................................................................................5 - North ...v LIST OF ILLUSTRATIONS Figure 1: North American Aerospace Defense Command Radars in the 1960s
Integral Counseling and a Three-Factor Model of Defenses
ERIC Educational Resources Information Center
Pearson, Willow
2007-01-01
This article introduces 3 major factors of K. Wilber's (1999b) "all-quadrants, all-levels" model of defenses: the category of defense, the level of self development and defense, and the threat zone against which the self is defending. Through theoretical discussion and select clinical examples differentiating healthy and unhealthy expressions of…
Additive Effects of Threat-of-Shock and Picture Valence on Startle Reflex Modulation
Bublatzky, Florian; Guerra, Pedro M.; Pastor, M. Carmen; Schupp, Harald T.; Vila, Jaime
2013-01-01
The present study examined the effects of sustained anticipatory anxiety on the affective modulation of the eyeblink startle reflex. Towards this end, pleasant, neutral and unpleasant pictures were presented as a continuous stream during alternating threat-of-shock and safety periods, which were cued by colored picture frames. Orbicularis-EMG to auditory startle probes and electrodermal activity were recorded. Previous findings regarding affective picture valence and threat-of-shock modulation were replicated. Of main interest, anticipating aversive events and viewing affective pictures additively modulated defensive activation. Specifically, despite overall potentiated startle blink magnitude in threat-of-shock conditions, the startle reflex remained sensitive to hedonic picture valence. Finally, skin conductance level revealed sustained sympathetic activation throughout the entire experiment during threat- compared to safety-periods. Overall, defensive activation by physical threat appears to operate independently from reflex modulation by picture media. The present data confirms the importance of simultaneously manipulating phasic-fear and sustained-anxiety in studying both normal and abnormal anxiety. PMID:23342060
Defense Mechanisms: A Bibliography.
ERIC Educational Resources Information Center
Pedrini, D. T.; Pedrini, Bonnie C.
This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…
Air Defense: A Computer Game for Research in Human Performance.
1981-07-01
warfare (ANW) threat analysis. M’ajor elements of the threat analysis problem \\\\,erc eoibedded in an interactive air detoense game controlled by a...The game requires sustained attention to a complex and interactive "hostile" environment, provides proper experimental control of relevant variables...AD-A102 725 NAVY PERSONNEL RESEARCH AND DEVELOPMENT CENTER SAN DETC F/6 5/10 AIR DEFENSE: A COMPUTER GAME FOR RESEARCH IN HUMAN PERFORMANCE.(U) JUL
Code of Federal Regulations, 2013 CFR
2013-07-01
... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES § 236.1 Purpose. Cyber threats to DIB unclassified information systems represent an unacceptable...
Code of Federal Regulations, 2012 CFR
2012-07-01
... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES § 236.1 Purpose. Cyber threats to DIB unclassified information systems represent an unacceptable...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hoette, Trisha Marie
Throughout history, as new chemical threats arose, strategies for the defense against chemical attacks have also evolved. As a part of an Early Career Laboratory Directed Research and Development project, a systems analysis of past, present, and future chemical terrorism scenarios was performed to understand how the chemical threats and attack strategies change over time. For the analysis, the difficulty in executing chemical attack was evaluated within a framework of three major scenario elements. First, historical examples of chemical terrorism were examined to determine how the use of chemical threats, versus other weapons, contributed to the successful execution of themore » attack. Using the same framework, the future of chemical terrorism was assessed with respect to the impact of globalization and new technologies. Finally, the efficacy of the current defenses against contemporary chemical terrorism was considered briefly. The results of this analysis justify the need for continued diligence in chemical defense.« less
2012-01-01
nel from fragmenting munitions, and the addition of SAPI will successfully defend against AK-47 ball ammunition. The ESAPI and XSAPI plates were...d ) Frequency of incidents of firefights 7.62 x 39mm ball Fragmenting munitions Threat X Threat Y Threat E Threat F Threat A Threat C Threat D...the threat in Afghani- stan today is primarily fragmenting munitions, 7.62mm x 39 ball bullets, and 7.62mm x 54R ball bullets. Current body armor
Flexibility in the face of fear: Hippocampal-prefrontal regulation of fear and avoidance.
Moscarello, Justin M; Maren, Stephen
2018-02-01
Generating appropriate defensive behaviors in the face of threat is essential to survival. Although many of these behaviors are 'hard-wired', they are also flexible. For example, Pavlovian fear conditioning generates learned defensive responses, such as conditioned freezing, that can be suppressed through extinction. The expression of extinguished responses is highly context-dependent, allowing animals to engage behavioral responses appropriate to the contexts in which threats are encountered. Likewise, animals and humans will avoid noxious outcomes if given the opportunity. In instrumental avoidance learning, for example, animals overcome conditioned defensive responses, including freezing, in order to actively avoid aversive stimuli. Recent work has greatly advanced understanding of the neural basis of these phenomena and has revealed common circuits involved in the regulation of fear. Specifically, the hippocampus and medial prefrontal cortex play pivotal roles in gating fear reactions and instrumental actions, mediated by the amygdala and nucleus accumbens, respectively. Because an inability to adaptively regulate fear and defensive behavior is a central component of many anxiety disorders, the brain circuits that promote flexible responses to threat are of great clinical significance.
Code of Federal Regulations, 2014 CFR
2014-07-01
... DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES § 236.1 Purpose. Cyber threats to DIB unclassified information systems represent an unacceptable...
Homeland defense: looking back, moving forward
NASA Astrophysics Data System (ADS)
Quine, Dennis H.
2002-07-01
A concern for homeland defense has been with us since the inception of the Republic. However, it has changed in focus and emphasis depending on the nature of the threat we perceived. In the earliest decades the threat was from invasion by a Britain that still did not accept the results of the Revolutionary War. Later the focus shifted to concern about possible attack by ships, and during WW I and WW II, by submarines. With the advent of the intercontinental nuclear-armed bomber in 1950, our focus changed again. When we could be attacked by ballistic missiles after 1960, our concern focused on that threat. Now that we have seen that damaging attacks can be brought to the homeland 'under the radar screen', by terrorist operations, the focus has shifted again. We are now entering an era when we must address potential homeland attacks with weapons of mass destruction (WMD) that may be delivered by a range of means, depending on the source of the attack. In response to this full spectrum of attack modes, the U.S. has implemented a three-stage defense policy that integrates overseas 'offense' and homeland 'defense'. This framework for defense analysis and planning is likely to be with us into the indefinite future.
2015-06-01
CIPs ) We have drafted policy language that Defense Acquisition, Technology, and Logistics now is coordinating that will make it a requirement for at...least Acquisition Category I programs to identify CIPs early and for the intelligence community to monitor those and report breaches throughout the...are coming. Two important ones are the Critical Intelligence Parameters ( CIPs ) policy and the change to the System Threat Assessment Re- port (STAR
Domestic Security Cooperation: A Unified Approach to Homeland Security and Defense
2012-09-01
counter the threats to homeland security that included the Espionage Act of 1917 and the Sedition Act of 1918. National Defense Act of 1916...the threats to homeland security that included the Espionage Act of 1917 and the Sedition Act of 1918. The Espionage Act of 1917 outlawed interfering...years or both.”12 The Sedition Act of 1918 broadened this law by including the U.S. government and prohibited uttering, printing, writing, or
Hamm, Alfons O; Richter, Jan; Pané-Farré, Christiane; Westphal, Dorte; Wittchen, Hans-Ulrich; Vossbeck-Elsebusch, Anna N; Gerlach, Alexander L; Gloster, Andrew T; Ströhle, Andreas; Lang, Thomas; Kircher, Tilo; Gerdes, Antje B M; Alpers, Georg W; Reif, Andreas; Deckert, Jürgen
2016-03-01
In the current review, we reconceptualize a categorical diagnosis-panic disorder and agoraphobia-in terms of two constructs within the domain "negative valence systems" suggested by the Research Domain Criteria initiative. Panic attacks are considered as abrupt and intense fear responses to acute threat arising from inside the body, while anxious apprehension refers to anxiety responses to potential harm and more distant or uncertain threat. Taking a dimensional view, panic disorder with agoraphobia is defined with the threat-imminence model stating that defensive responses are dynamically organized along the dimension of the proximity of the threat. We tested this model within a large group of patients with panic disorder and agoraphobia (N = 369 and N = 124 in a replication sample) and found evidence that panic attacks are indeed instances of circa strike defense. This component of the defensive reactivity was related to genetic modulators within the serotonergic system. In contrast, anxious apprehension-characterized by attentive freezing during postencounter defense-was related to general distress and depressive mood, as well as to genetic modulations within the hypothalamic-pituitary-adrenal (HPA) axis. Patients with a strong behavioral tendency for active and passive avoidance responded better to exposure treatment if the therapist guides the patient through the exposure exercises. © 2016 Society for Psychophysiological Research.
USDA-ARS?s Scientific Manuscript database
Crop losses due to pathogens are a major threat to global food security. Plants employ a multilayer defense system against pathogens including use of physical barriers (cell wall), induction of hypersensitive defense response (HR), resistance (R) proteins, and synthesis of antimicrobial peptides (AM...
Department of Defense Dictionary of Military and Associated Terms
2016-02-15
05) active air defense — Direct defensive action taken to destroy, nullify, or reduce the effectiveness of hostile air and missile threats against...JP 3-60) air and missile defense — Direct [active and passive] defensive actions taken to destroy, nullify, or reduce the effectiveness of...troops especially trained to effect , following transport by air, an assault debarkation, either by parachuting or touchdown. 2. In relation to
CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 6
2012-12-01
Cyber Security Threat Definition Communicable Noncommunicable Based on Risky Behavior Coordinated Trojan horse programs Threats hidden in a...for Cyber Security Threats Cyber Security Threat Communicable Noncommunicable Risky Behaviors Coordinated Type of Intervention (at the System...types of data are breached. Further, educational materials on risky behaviors (e.g., for home Internet users) as well as recommended guide- lines for
Defense.gov Special Report: Travels With Hagel
Rhode Island More News Stories Kerry, Hagel Discuss ISIL Threat With Allies, Partners Hagel Lauds Ukraine's Forces in Meeting With Defense Minister Hagel, Afghan Defense Minister Discuss Progress, Security Spokesman: Hagel to Discuss Russia at NATO Summit News Photos Video Screen capture of Hagel in Ankara
ERIC Educational Resources Information Center
Office of Civil Defense (DOD), Washington, DC.
Civil defense is a planned, coordinated action to protect the population during any emergency whether arising from thermonuclear attack or natural disaster. The Federal Government has assumed four responsibilities--(1) to keep track of the nature of the threat which the civil defense program must meet, (2) to prepare and disseminate information…
The Schools and Civil Defense: The Fifties Revisited.
ERIC Educational Resources Information Center
Carey, Michael J.
1982-01-01
In the 1950s, students had formal bomb-threat education; civil defense training taught students where to hide and how to protect themselves. Comments of teachers and students of that era are presented along with a history of various programs and techniques used for civil defense education. (CJ)
Strategic Missile Defense & Nuclear Deterrence
NASA Astrophysics Data System (ADS)
Grego, Laura
The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions
Neuroscientific evidence for defensive avoidance of fear appeals
Kessels, Loes T E; Ruiter, Robert A C; Wouters, Liesbeth; Jansma, Bernadette M
2014-01-01
Previous studies indicate that people respond defensively to threatening health information, especially when the information challenges self-relevant goals. The authors investigated whether reduced acceptance of self-relevant health risk information is already visible in early attention allocation processes. In two experimental studies, participants were watching high- and low-threat health commercials, and at the same time had to pay attention to specific odd auditory stimuli in a sequence of frequent auditory stimuli (odd ball paradigm). The amount of attention allocation was measured by recording event-related brain potentials (i.e., P300 ERPs) and reaction times. Smokers showed larger P300 amplitudes in response to the auditory targets while watching high-threat instead of low-threat anti-smoking commercials. In contrast, non-smokers showed smaller P300 amplitudes during watching high as opposed to low threat anti-smoking commercials. In conclusion, the findings provide further neuroscientific support for the hypothesis that threatening health information causes more avoidance responses among those for whom the health threat is self-relevant. PMID:24811878
Bowen, Michael T; Kevin, Richard C; May, Matthew; Staples, Lauren G; Hunt, Glenn E; McGregor, Iain S
2013-01-01
Aggregation is a defensive strategy employed by many prey species in response to predatory threat. Our group has characterized defensive aggregation (huddling) in Rattus norvegicus in response to a ball of cat fur. In this situation some rats huddle less, and approach the threatening cue more than others (active vs. passive responders). The present study explored whether active responding is a stable phenotype associated with behaviors outside direct predatory encounters. The neural substrates of active and passive responding under predatory threat were explored using c-Fos immunohistochemistry. Finally, we examined whether the presence of conspecifics during predatory threat biases behavior towards active responding. Active and passive responding styles were found to be stable in individual rats across consecutive group exposures to cat fur, and were predicted by anxiety-like behavior in an open-field emergence test. Active responders displayed less conditioned fear in an environment associated with predatory threat, and had higher post-exposure intake of a weak sucrose solution (a test of "anhedonia"). Active responding was associated with: greater cat fur-induced activation of the accessory olfactory bulb, reflecting greater olfactory stimulation in rats actively approaching the fur; lowered activation of somatosensory cortex, reflecting reduced huddling with conspecifics; and reduced activation in the lateral septum. Social exposure to cat fur promoted active responding relative to individual exposure, and lowered c-Fos expression in the dorsomedial periaqueductal grey, medial caudate putamen and lateral habenula. We conclude that individual differences in anti-predator behavior appear stable traits with active responders having a more resilient phenotype. Social exposure to predatory threat has an acute buffering effect, subtly changing the neural and behavioral response towards threat and encouraging active responding. An association between active responding and lower c-Fos expression in the lateral septum is consistent with previous studies that highlight this region as an important neurobiological substrate of defensive aggregation.
Bowen, Michael T.; Kevin, Richard C.; May, Matthew; Staples, Lauren G.; Hunt, Glenn E.; McGregor, Iain S.
2013-01-01
Aggregation is a defensive strategy employed by many prey species in response to predatory threat. Our group has characterized defensive aggregation (huddling) in Rattus norvegicus in response to a ball of cat fur. In this situation some rats huddle less, and approach the threatening cue more than others (active vs. passive responders). The present study explored whether active responding is a stable phenotype associated with behaviors outside direct predatory encounters. The neural substrates of active and passive responding under predatory threat were explored using c-Fos immunohistochemistry. Finally, we examined whether the presence of conspecifics during predatory threat biases behavior towards active responding. Active and passive responding styles were found to be stable in individual rats across consecutive group exposures to cat fur, and were predicted by anxiety-like behavior in an open-field emergence test. Active responders displayed less conditioned fear in an environment associated with predatory threat, and had higher post-exposure intake of a weak sucrose solution (a test of “anhedonia”). Active responding was associated with: greater cat fur-induced activation of the accessory olfactory bulb, reflecting greater olfactory stimulation in rats actively approaching the fur; lowered activation of somatosensory cortex, reflecting reduced huddling with conspecifics; and reduced activation in the lateral septum. Social exposure to cat fur promoted active responding relative to individual exposure, and lowered c-Fos expression in the dorsomedial periaqueductal grey, medial caudate putamen and lateral habenula. We conclude that individual differences in anti-predator behavior appear stable traits with active responders having a more resilient phenotype. Social exposure to predatory threat has an acute buffering effect, subtly changing the neural and behavioral response towards threat and encouraging active responding. An association between active responding and lower c-Fos expression in the lateral septum is consistent with previous studies that highlight this region as an important neurobiological substrate of defensive aggregation. PMID:23922655
Is It a Dangerous World Out There? The Motivational Bases of American Gun Ownership.
Stroebe, Wolfgang; Leander, N Pontus; Kruglanski, Arie W
2017-08-01
Americans are the world's best armed citizens and public polling suggests protection/self-defense is their main reason for gun ownership. However, there is virtually no psychological research on gun ownership. The present article develops the first psychological process model of defensive gun ownership-specifically, a two-component model that considers both the antecedents and consequences of owning a gun for protection/self-defense. We demonstrate that different levels of threat construal-the specific perceived threat of assault and a diffuse threat of a dangerous world-independently predict handgun ownership; we also show how utility judgments can explain the motivated reasoning that drives beliefs about gun rights. We tested our model in two independent samples of gun owners (total N = 899), from just before and after the Orlando mass shooting. This study illustrates how social-cognitive theories can help explain what motivates Americans to own handguns and advocate for broad rights to carry and use them.
Planetary Asteroid Defense Study: Assessing and Responding to the Natural Space Debris Threat
1995-04-01
Spectrum of Natural Space Debris Effects 82 Figure 5-1. Threat is a Product of Hazard and Risk 84 Figure 5-2. Variables Affecting Threat...are perhaps the most unique family in the extra-belt region. Unlike other families who define their own orbits, the Trojans share Jupiter’s orbit...Threat. We define threat as the relationship between hazard and risk. It can be likened to a product of the two, notionally depicted in Figure 5-1
Proliferation: Threat and Response
1997-11-01
primary agent, the Defense Technology capabilities also contribute to ongoing efforts to Security Administration ( DTSA ). These efforts are focus and...Special Weapons Agency Organization DTSA Defense Technology Security BW Biological Weapons Administration BWC Biological and Toxin Weapons EPCI Enhanced
Code of Federal Regulations, 2011 CFR
2011-07-01
... crucial nature of the information; analysis of known and anticipated threats; vulnerability; and... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.40 General...
Code of Federal Regulations, 2014 CFR
2014-07-01
... crucial nature of the information; analysis of known and anticipated threats; vulnerability; and... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.40 General...
Code of Federal Regulations, 2010 CFR
2010-07-01
... crucial nature of the information; analysis of known and anticipated threats; vulnerability; and... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.40 General...
Code of Federal Regulations, 2013 CFR
2013-07-01
... crucial nature of the information; analysis of known and anticipated threats; vulnerability; and... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.40 General...
Code of Federal Regulations, 2012 CFR
2012-07-01
... crucial nature of the information; analysis of known and anticipated threats; vulnerability; and... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.40 General...
75 FR 64714 - Meeting of the Chief of Naval Operations Executive Panel
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-20
... recommendations of the Subcommittee on Navy's Role in Ballistic Missile Defense. The meeting will consist of discussions of Navy's role in ballistic missile defense, development of the global missile defense network and evolution of the growing ballistic missile threat. DATES: The meeting will be held on November 12, 2010...
Issues for Future Nuclear Arms Control
NASA Astrophysics Data System (ADS)
Davis, Jay
2011-04-01
Ratification of the New START treaty may open the door to a path of progressive negotiations that could lead to systematic reduction of the numbers of deployed and reserve nuclear weapons. Those negotiations will require more than merely resolving technical, operational and policy questions. Their success will also demand adding successively larger numbers of partners and the building of trust among parties who have not been involved in such agreements before. At some point, questions of conventional arms limitations and larger confidence building steps will inevitably arise. Jay Davis, who last year chaired an APS/POPA study of technology issues for future nuclear arms control agreements, will outline the path, opportunities, and obstacles that lie ahead. Davis was an UNSCOM inspector in Iraq after the First Gulf War and the first director of the Defense Threat Reduction Agency.
Preliminary Results from Pyroelectric Crystal Accelerator
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anderson, Tom; Edwards, Ronald; Bright, Kevin
The Nuclear Science and Engineering Research Center (NSERC), a Defense Threat Reduction Agency (DTRA) office located at the United States Military Academy (USMA), sponsors and manages cadet and faculty research in support of DTRA objectives. Cadets in the Department of Physics and Nuclear Engineering at USMA are using pyroelectric crystals to ionize and accelerate residual gas trapped inside a vacuum system. A system using two lithium tantalate crystals with associated diagnostics was designed and is now operational. X-ray energies of approximately 150 keV have been achieved. Future work will focus on developing a portable neutron generator using the D-D nuclearmore » fusion process.« less
Nonholonomic Hamiltonian Method for Meso-macroscale Simulations of Reacting Shocks
NASA Astrophysics Data System (ADS)
Fahrenthold, Eric; Lee, Sangyup
2015-06-01
The seamless integration of macroscale, mesoscale, and molecular scale models of reacting shock physics has been hindered by dramatic differences in the model formulation techniques normally used at different scales. In recent research the authors have developed the first unified discrete Hamiltonian approach to multiscale simulation of reacting shock physics. Unlike previous work, the formulation employs reacting themomechanical Hamiltonian formulations at all scales, including the continuum. Unlike previous work, the formulation employs a nonholonomic modeling approach to systematically couple the models developed at all scales. Example applications of the method show meso-macroscale shock to detonation simulations in nitromethane and RDX. Research supported by the Defense Threat Reduction Agency.
Self-Defense Distributed Engagement Coordinator
2016-02-01
its countermeasures. Whether a missile is defeated with an interceptor, undermined by a signal jammer, or diverted by a decoy, there is Self - Defense ...anti-ship threats and recommends actions to the personnel coordinating ship self - defense . This tool was recognized with a 2015 R&D 100 Award. a cost...reloading process, and may not be possible at all. The Self - Defense Distributed Engagement Coordinator (SDDEC) is designed to provide automated battle
Chemical and biological warfare. Should defenses be researched and deployed?
Orient, J M
1989-08-04
The threat of chemical and biological weapons of mass destruction has intensified because of improved delivery systems and advances in chemistry, genetics, and other sciences. Possible US responses to this threat include deterrence, defenses, and/or disarmament, including a reaffirmation of the Biological and Toxin Weapons Convention of 1972, which is now in jeopardy. This article discusses the history of chemical and biological warfare, existing and potential weapons, the proliferation of weapons and delivery systems, ways to prevent the use of these weapons, and ways to protect populations from their effects.
2015-01-01
War II. To date, neither Russia nor China has fielded an operational fifth-generation fighter similar to the U.S. F-22 or F-35.11 In a direct ... Direct Defense Against Antiaccess and Area Denial Threats Is Desirable and Feasible David Ochmanek A mid the seemingly unrelenting welter of security...military forces have, from the perspec- tive of the United States, been moving in an unfavorable direction over the past decade or more. This realization
Consequence Management - Ready or Not?
2003-04-07
Defense will have sufficient capability and be ready to respond to a Weapons of Mass Destruction/ Effects attack. An effective consequence management...Defense adopts the National Military Strategy and its consequence management approach, it must identify Weapons of Mass Destruction/ Effects threats...that the Department of Defense: develop Weapons of Mass Destruction/ Effects performance standards for response assets; implement a consequence
Maneuver Warfare in Cyberspace
1997-01-01
government departments and agencies; (2) National security and military strategies must outline a response to the threats and opportunities of cyber ... warfare ; and (3) the Department of Defense’s offensive and defensive responsibilities, parameters, and capabilities for strategic information warfare need
2016-06-10
DODIN) is being threatened by state actors, non-state actors, and continuous hacking and cyber-attacks. These threats against the network come in a...variety of forms; physical attacks from radio jamming, logical cyber threats from hacking , or a combination of both physical and logical attacks. Each...year the number of hacking attacks is increasing. Corporations like Symantec publish annual reports on cyber threats and provide tips for best
Anticipation of interoceptive threat in highly anxiety sensitive persons.
Melzig, Christiane A; Michalowski, Jaroslaw M; Holtz, Katharina; Hamm, Alfons O
2008-10-01
Anticipatory anxiety plays a major role in the etiology of panic disorder. Although anticipatory anxiety elicited by expectation of interoceptive cues is specifically relevant for panic patients, it has rarely been studied. Using a population analogue in high fear of such interoceptive arousal sensations (highly anxiety sensitive persons) we evaluated a new experimental paradigm to assess anticipatory anxiety during anticipation of interoceptive (somatic sensations evoked by hyperventilation) and exteroceptive (electric shock) threat. Symptom reports, autonomic arousal, and defensive response mobilization (startle eyeblink response) were monitored during threat and matched safe conditions in 26 highly anxiety sensitive persons and 22 controls. The anticipation of exteroceptive threat led to a defensive and autonomic mobilization as indexed by a potentiation of the startle response and an increase in skin conductance level in both experimental groups. During interoceptive threat, however, only highly anxiety sensitive persons but not the controls exhibited a startle response potentiation as well as autonomic activation. The anticipation of a hyperventilation procedure thus seems a valid paradigm to investigate anticipatory anxiety elicited by interoceptive cues in the clinical context.
Defining the public health threat of food fraud.
Spink, John; Moyer, Douglas C
2011-01-01
Food fraud, including the more defined subcategory of economically motivated adulteration, is a food risk that is gaining recognition and concern. Regardless of the cause of the food risk, adulteration of food is both an industry and a government responsibility. Food safety, food fraud, and food defense incidents can create adulteration of food with public health threats. Food fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm. Economically motivated adulteration may be just that-economically motivated-but the food-related public health risks are often more risky than traditional food safety threats because the contaminants are unconventional. Current intervention systems are not designed to look for a near infinite number of potential contaminants. The authors developed the core concepts reported here following comprehensive research of articles and reports, expert elicitation, and an extensive peer review. The intent of this research paper is to provide a base reference document for defining food fraud-it focuses specifically on the public health threat-and to facilitate a shift in focus from intervention to prevention. This will subsequently provide a framework for future quantitative or innovative research. The fraud opportunity is deconstructed using the criminology and behavioral science applications of the crime triangle and the chemistry of the crime. The research provides a food risk matrix and identifies food fraud incident types. This project provides a starting point for future food science, food safety, and food defense research. Food fraud, including the more defined subcategory of economically motivated adulteration, is a food protection threat that has not been defined or holistically addressed. The terrorist attacks of September 11, 2001, led to the development of food defense as an autonomous area of study and a new food protection discipline. As economically motivated adulteration grows in scope, scale, and awareness, it is conceivable that food fraud will achieve the same status as an autonomous concept, between food safety and food defense. This research establishes a starting point for defining food fraud and identifying the public health risks. © 2011 Institute of Food Technologists®
A cognitive and economic decision theory for examining cyber defense strategies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bier, Asmeret Brooke
Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participantsmore » interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.« less
The science, technology, and politics of ballistic missile defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coyle, Philip E.
America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billionmore » per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.« less
The science, technology, and politics of ballistic missile defense
NASA Astrophysics Data System (ADS)
Coyle, Philip E.
2014-05-01
America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about 10 billion per year, and proposes to add about 5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.
Advanced nanoelectronic architectures for THz-based biological agent detection
NASA Astrophysics Data System (ADS)
Woolard, Dwight L.; Jensen, James O.
2009-02-01
The U.S. Army Research Office (ARO) and the U.S. Army Edgewood Chemical Biological Center (ECBC) jointly lead and support novel research programs that are advancing the state-of-the-art in nanoelectronic engineering in application areas that have relevance to national defense and security. One fundamental research area that is presently being emphasized by ARO and ECBC is the exploratory investigation of new bio-molecular architectural concepts that can be used to achieve rapid, reagent-less detection and discrimination of biological warfare (BW) agents, through the control of multi-photon and multi-wavelength processes at the nanoscale. This paper will overview an ARO/ECBC led multidisciplinary research program presently under the support of the U.S. Defense Threat Reduction Agency (DTRA) that seeks to develop new devices and nanoelectronic architectures that are effective for extracting THz signatures from target bio-molecules. Here, emphasis will be placed on the new nanosensor concepts and THz/Optical measurement methodologies for spectral-based sequencing/identification of genetic molecules.
Space, our next frontier; Proceedings of the conference, Dallas, TX, June 7, 8, 1984
DOE Office of Scientific and Technical Information (OSTI.GOV)
Musgrave, G.
1985-01-01
The present conference on space development encompasses space commercialization, legislative, legal, and insurance-related factors in current space programs, political aspects of space militarization and governmental control, the military future uses of space and their consequences, command and control issues arising in space, economic influences on space policy, and recent developments in space solar power generation concepts. Attention is given to public opinion surveys concerning the scientific, military, and economic uses of space, the Leasecraft orbital industrial infrastructure concept, capitalism and democracy in space development, the current status of space law on commercialization topics, the nature of Ballistic Missile Defense, themore » Soviet Space threat, the High Frontier concept for space defense, lunar solar power systems, solar power satellites, and the utilization of lunar resources for the reduction of lunar base construction costs. Such specific technical issues as microgravity crystal growth and directional solidification, electrophoresis operations for pharmaceuticals, and technical barriers to commercial access to space, are also noted.« less
Defense Threat Reduction Agency Radiochemical Needs
NASA Astrophysics Data System (ADS)
Walsh, Michael A. R.; Velazquez, Daniel L.
2009-08-01
The United States Government (USG) first developed nuclear forensics-related capabilities to analyze radiological and nuclear materials, including underground nuclear test debris and interdicted materials. Nuclear forensics is not a new mission for Department of Defense (DoD). The department's existing nuclear forensics capability is the result of programs that span six (6) decades and includes activities to assess foreign nuclear weapons testing activities, monitor and verify nuclear arms control treaties, and to support intelligence and law enforcement activities. Today, nuclear forensics must support not only weapons programs and nuclear smuggling incidents, but also the scientific analysis and subsequent attribution of terrorists' use of radiological or nuclear materials/devices. Nuclear forensics can help divulge the source of origin of nuclear materials, the type of design for an interdicted or detonated device, as well as the pathway of the materials or device to the incident. To accomplish this mission, the USG will need trained radiochemists and nuclear scientists to fill new positions and replace the retiring staff.
Kim, D J; Lee, A S; Yttredahl, A A; Gómez-Rodríguez, R; Anderson, B J
2017-06-14
To understand the behavioral consequences of intermittent anticipatory stress resulting from threats without accompanying physiological challenges, we developed a semi-naturalistic rodent housing and foraging environment that can include threats that are unpredictable in timing. Behavior is automatically recorded while rats forage for food or water. Over three weeks, the threats have been shown to elicit risk assessment behaviors, increase defensive burying and increase adrenal gland weight. To identify brain regions activated by this manipulation, we measured cytochrome c oxidase (COX), which is tightly coupled to neural activity. Adolescent male Sprague-Dawley rats were randomly assigned to control (CT) or unpredictable threat/stress (ST) housing conditions consisting of two tub cages, one with food and another with water, separated by a tunnel. Over three weeks (P31-P52), the ST group received randomly timed (probability of 0.25), simultaneous presentations of ferret odor, an abrupt light, and sound at the center of the tunnel. The ST group had consistently fewer tunnel crossings than the CT group, but similar body weights. Group differences in COX activity were detected in regions implicated in the control of defensive burying. There was an increase in COX activity in the hypothalamic premammillary dorsal nucleus (PMD) and lateral septum (LS), whereas a decrease was observed in the periaqueductal gray (PAG) and CA3 region of the hippocampus. There were no significant differences in the anterior cingulate cortex, prefrontal cortex, striatum or motor cortex. The sites with changes in metabolic capacity are candidates for the sites of plasticity that may underlie the behavioral adaptations to intermittent threats. Copyright © 2017 IBRO. Published by Elsevier Ltd. All rights reserved.
Rubin, Mark
2018-01-01
Terror management theory (TMT) proposes that thoughts of death trigger a concern about self-annihilation that motivates the defense of cultural worldviews. In contrast, uncertainty theorists propose that thoughts of death trigger feelings of uncertainty that motivate worldview defense. University students (N = 414) completed measures of the chronic fear of self-annihilation and existential uncertainty as well as the need for closure. They then evaluated either a meaning threat stimulus or a control stimulus. Consistent with TMT, participants with a high fear of self-annihilation and a high need for closure showed the greatest dislike of the meaning threat stimulus, even after controlling for their existential uncertainty. Contrary to the uncertainty perspective, fear of existential uncertainty showed no significant effects.
Lisjak, Monika; Lee, Angela Y; Gardner, Wendi L
2012-09-01
This research examines how people respond when a commercial brand they identify with is threatened. Across four studies, the authors found that among participants who identified with a brand, a threat to the brand elicited the same responses as a threat to the self. Specifically, participants with low implicit self-esteem defended the brand when the self was activated, unlike their high implicit self-esteem counterparts. In addition, brand defense was reduced when individuals had the opportunity to affirm a valued aspect of their self-concept. These findings suggest that when a brand that people identify with is threatened, they may defend the brand to preserve the integrity of the self. More broadly, these findings are consistent with the notion that brands may be included into the extended self-concept, which supports William James's original ideas concerning the breadth and heterogeneity of the self.
The ecology of human fear: survival optimization and the nervous system
Mobbs, Dean; Hagan, Cindy C.; Dalgleish, Tim; Silston, Brian; Prévost, Charlotte
2015-01-01
We propose a Survival Optimization System (SOS) to account for the strategies that humans and other animals use to defend against recurring and novel threats. The SOS attempts to merge ecological models that define a repertoire of contextually relevant threat induced survival behaviors with contemporary approaches to human affective science. We first propose that the goal of the nervous system is to reduce surprise and optimize actions by (i) predicting the sensory landscape by simulating possible encounters with threat and selecting the appropriate pre-encounter action and (ii) prevention strategies in which the organism manufactures safe environments. When a potential threat is encountered the (iii) threat orienting system is engaged to determine whether the organism ignores the stimulus or switches into a process of (iv) threat assessment, where the organism monitors the stimulus, weighs the threat value, predicts the actions of the threat, searches for safety, and guides behavioral actions crucial to directed escape. When under imminent attack, (v) defensive systems evoke fast reflexive indirect escape behaviors (i.e., fight or flight). This cascade of responses to threat of increasing magnitude are underwritten by an interconnected neural architecture that extends from cortical and hippocampal circuits, to attention, action and threat systems including the amygdala, striatum, and hard-wired defensive systems in the midbrain. The SOS also includes a modulatory feature consisting of cognitive appraisal systems that flexibly guide perception, risk and action. Moreover, personal and vicarious threat encounters fine-tune avoidance behaviors via model-based learning, with higher organisms bridging data to reduce face-to-face encounters with predators. Our model attempts to unify the divergent field of human affective science, proposing a highly integrated nervous system that has evolved to increase the organism's chances of survival. PMID:25852451
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nichols, James W., LTC
2000-09-15
These proceedings contain papers prepared for the 22nd Annual DoD/DOE Seismic Research Symposium: Planning for Verification of and Compliance with the Comprehensive Nuclear-Test-Ban Treaty (CTBT), held 13-15 September 2000 in New Orleans, Louisiana. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), Air Force Technical Applications Center (AFTAC), Department of Defense (DoD), US Army Space and Missile Defense Command, Defense Special Weapons Agency (DSWA), and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate,more » and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.« less
Guam: U.S. Defense Deployments
2013-11-15
Guam. Deputy Assistant Secretary of Defense for Asian and Pacific Security Affairs Michael Schiffer added later that there would need to be parallel...maintain unit cohesion and operational readiness. In answer to Mr. Forbes’s question of whether the Air-Sea Battle Concept was ready, Schiffer ...officials have tied the buildup to North Korea’s threat. Deputy Assistant Secretary of Defense for East Asia Michael Schiffer testified to Congress
Adaptation of Porter’s Five Forces Model to Risk Management
2010-07-01
The external forces—new entrants, bargaining power of buyers and suppliers, and substitutes—are shown as the threats acting on the industry. FIGURE 2...Planned Actual FIGURE 3. PORTER’S FIVE FORCES MODEL Industry Competitors Intensity of Rivalry Suppliers Buyers Bargaining Power of Suppliers Bargaining... Power of Buyers New Entrants Threat of New Entrants Substitutes Threat of Substitutes 3 7 9 | A Publication of the Defense Acquisition
Threat visibility modulates the defensive brain circuit underlying fear and anxiety.
Rigoli, Francesco; Ewbank, Michael; Dalgleish, Tim; Calder, Andrew
2016-01-26
Recent theories distinguish anxiety from fear in the brain. Anxiety is associated with activation in ventromedial prefrontal cortex and hippocampus, while fear is associated with activation in periaqueductal gray, with amygdala involved in processing aspects of both emotional responses. These theories propose that the amount of information available about threat determines which of the two defensive responses is elicited, with fear and anxiety associated with well-defined and uncertain threats respectively. However, a direct test of this hypothesis is lacking. Here we provide such a test using fMRI to record participants' brain activity while they performed a computer-based task which required to press a button to move an artificial agent to a target position while an artificial predator chased the agent. In one condition (associated with fear) the predator was visible, while in another condition (associated with anxiety) the predator was invisible. Ventromedial prefrontal cortex, hippocampus, and amygdala showed increased activity when the predator was invisible compared to visible, while the opposite effect was observed in periaqueductal gray. We also observed that participants with high but not low trait-anxiety showed an hippocampal activation with invisible threat at an earlier time stage during the trial. These findings help clarify the neural mechanisms that underlie different defensive emotions and shed light on how these mechanisms may contribute to exaggerated anxiety. Copyright © 2015 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.
TC4 Observing Campaign: An Operational Test of NASA Planetary Defense Network
NASA Astrophysics Data System (ADS)
Reddy, V.; Kelley, M. S.; Landis, R. R.
Impacts due to near-Earth objects ( 90% near-Earth asteroids, or NEAs, and 10% comets) are one of the natural hazards that can pose a great risk to life on Earth, but one that can potentially be mitigated, if the threat is detected with sufficient lead-time. While the probability of such an event is low, the outcome is so catastrophic that we are well justified in investing a modest effort to minimize this threat. Historically, asteroid impacts have altered the course of evolution on the Earth. In 2013 the Chelyabinsk meteor over Russia, which injured over 1600 people and caused $30M in damages, reinforced the importance of detecting and characterizing small NEAs that pose a greater threat than most large NEAs discovered so far. The NASA Planetary Defense Coordination Office (PDCO) was established to ensure the early detection, tracking and characterization of potentially hazardous objects (PHOs) and is the lead office for providing timely and accurate communications and coordination of U.S. Government planning for response to an actual impact threat. In an effort to test the operational readiness of all entities critical to planetary defense, the NASA PDCO is supporting a community-led exercise. The target of this exercise is 2012 TC4, a 20- meter diameter asteroid that is currently expected to pass by the Earth over Antarctica on Oct. 12, 2017 at a distance of only 2.3 Earth radii. The goal of the TC4 Observing Campaign is to recover, track, and characterize 2012 TC4 as a potential impactor in order to exercise the entire Planetary Defense system from observations, modeling, prediction, and communication. The paper will present an overview of the campaign and summarize early results from the exercise.
48 CFR 904.7003 - Disclosure of foreign ownership, control, or influence.
Code of Federal Regulations, 2010 CFR
2010-10-01
... undue risk to the common defense and security through the possible compromise of that information or material. If the DOE determines that such a threat or potential threat exists, the contracting officer... the DOE to obtain information about FOCI which is sufficient to help the Department determine whether...
Neuroscientific evidence for defensive avoidance of fear appeals.
Kessels, Loes T E; Ruiter, Robert A C; Wouters, Liesbeth; Jansma, Bernadette M
2014-04-01
Previous studies indicate that people respond defensively to threatening health information, especially when the information challenges self-relevant goals. The authors investigated whether reduced acceptance of self-relevant health risk information is already visible in early attention allocation processes. In two experimental studies, participants were watching high- and low-threat health commercials, and at the same time had to pay attention to specific odd auditory stimuli in a sequence of frequent auditory stimuli (odd ball paradigm). The amount of attention allocation was measured by recording event-related brain potentials (i.e., P300 ERPs) and reaction times. Smokers showed larger P300 amplitudes in response to the auditory targets while watching high-threat instead of low-threat anti-smoking commercials. In contrast, non-smokers showed smaller P300 amplitudes during watching high as opposed to low threat anti-smoking commercials. In conclusion, the findings provide further neuroscientific support for the hypothesis that threatening health information causes more avoidance responses among those for whom the health threat is self-relevant. © 2014 The Authors. International Journal of Psychology published by John Wiley © Sons Ltd on behalf of International Union of Psychological Science.
2016-05-01
M.S. (2013). Exploring first responder preferences and opinions about handheld radiation detectors. International Journal of Industrial and Systems...International Journal of Industrial Ergonomics, 42(1), 17-24. DISTRIBUTION LIST DTRA-TR-16-51 DL-1 DEPARTMENT OF DEFENSE DEFENSE THREAT
Aegis International and Ballistic Missile Defense: A New Interoperability Network
2011-06-01
the 1950’s and 1960s ( NIKE Hercules, Sentinel, Safeguard, Site Defense, etc.). The objectives have been pursued by a centralized organization (the...from land. This means greater geographic flexibility, greater survivability and greater scalability in response to an evolving threat. That’s
Using Motivational Interviewing to reduce threats in conversations about environmental behavior
Klonek, Florian E.; Güntner, Amelie V.; Lehmann-Willenbrock, Nale; Kauffeld, Simone
2015-01-01
Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI) — an intervention aimed at increasing intrinsic motivation — can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group). We coded agents verbal threats and recipients’ verbal expressions of motivation. Recipients also rated agents’ level of confrontation and empathy (i.e., cognitive reactions). As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients’ expressed motivation (i.e., reasons to change). Contrary to our expectations, we found no relation between change agents’ verbal threats and change recipients’ verbally expressed self-defenses (i.e., sustain talk). Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations. PMID:26257676
Using Motivational Interviewing to reduce threats in conversations about environmental behavior.
Klonek, Florian E; Güntner, Amelie V; Lehmann-Willenbrock, Nale; Kauffeld, Simone
2015-01-01
Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals' self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI) - an intervention aimed at increasing intrinsic motivation - can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group). We coded agents verbal threats and recipients' verbal expressions of motivation. Recipients also rated agents' level of confrontation and empathy (i.e., cognitive reactions). As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients' expressed motivation (i.e., reasons to change). Contrary to our expectations, we found no relation between change agents' verbal threats and change recipients' verbally expressed self-defenses (i.e., sustain talk). Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.
THREAT ANTICIPATION AND DECEPTIVE REASONING USING BAYESIAN BELIEF NETWORKS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Allgood, Glenn O; Olama, Mohammed M; Lake, Joe E
Recent events highlight the need for tools to anticipate threats posed by terrorists. Assessing these threats requires combining information from disparate data sources such as analytic models, simulations, historical data, sensor networks, and user judgments. These disparate data can be combined in a coherent, analytically defensible, and understandable manner using a Bayesian belief network (BBN). In this paper, we develop a BBN threat anticipatory model based on a deceptive reasoning algorithm using a network engineering process that treats the probability distributions of the BBN nodes within the broader context of the system development process.
Learning to Mow Grass: IDF Adaptations to Hybrid Threats
2017-05-25
lie on a spectrum from tactical techniques to wholesale paradigm shift.7 This study examines military adaptations in the case of the Israeli Defense...against the hybrid threat in three case studies spanning the Second Lebanon War in 2006, Operation Cast Lead in 2008, and Operation Protective Edge in...hybrid threat in three case studies spanning the Second Lebanon War in 2006, Operation Cast Lead in 2008, and Operation Protective Edge in 2014. The
Report of the Defense Science Board Task Force on Defense Biometrics
2007-03-01
certificates, crypto variables, and encoded biometric indices. The Department of Defense has invested prestige and resources in its Common Access Card (CAC...in turn, could be used to unlock an otherwise secret key or crypto variable which would support the remote authentication. A new key variable...The PSA for biometrics should commission development of appropriate threat model(s) and assign responsibility for maintaining currency of the model
THE MYTH OF THE RUSSIAN EXISTENTIAL THREAT
2016-04-01
According to Sam Perlo-Freeman, director of the Stockholm International Peace Research Institute , “In terms of military capabilities, the US and NATO will...defense companies since the Reagan administration. The Russian Audit Chamber reported to the Duma Defense Commission in 2012, “30 percent of the defense...ambiguous and not fully known. General Philip Breedlove, Supreme Allied Commander Europe, testified to Congress in April of 2015, “We cannot fully grasp
Semantic Web and Inferencing Technologies for Department of Defense Systems
2014-10-01
contact report for a specific type of aircraft . Intra-domain-specific metadata in the threat data domain might be used to categorize the contact...DEFENSE SYSTEMS by Duane Davis October 2014 Approved for public release; distribution is unlimited Prepared for: The NPS Center for Multi-INT...TITLE AND SUBTITLE Semantic Web and Inferencing Technologies for Department of Defense Systems 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c
Defense AT and L. Volume 41, Number 4
2012-08-01
From R&D, begun before World War II, came deck- piercing bombs that destroyed enemy ships at Midway; Naval gunfire that devastated beach defenses...detection means , working with intelligence agencies to target threat materials requiring detection. For example, 80 percent of IEDs use certain homemade...propellant may seem Defense AT&L: July–August 2012 14 insignificant, but to energetics experts it means launching missiles will be harder to detect, thus
1988-01-01
these threats are not merely isolated occurrences. Terrorism is increasingly transnacional and state-supported. Drug trafficking is increasingly...deter- rence and defense through their presence abroad and by our capability to deploy them from the continental United States (CONUS) to crisis areas
Defensive platform size and survivability. [Platform survivability
DOE Office of Scientific and Technical Information (OSTI.GOV)
Canavan, Gregory H.
1988-06-01
This report discusses the survivability of space platforms, concentrating on space based kinetic energy interceptors. It evaluates the efficacy of hardening, maneuver, self-defense, and deception in extending the survivability of platforms of varying sizes to expected threats, concluding that they should be adequate in the near and mid terms.
DefenseLink Feature: Travels with Gates
Robert M. Gates said. Story Gates Connects NATO Afghanistan Effort With Terror Threat in Europe MUNICH , Germany, Feb. 10, 2008 - The war on terror in Afghanistan is Europe's war, too, Defense Secretary Robert M ministers during meetings in Vilnius, Lithuania. Story Pakistan Understands Terror Danger VILNIUS, Lithuania
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-23
... (DHS), Science and Technology, Protected Repository for the Defense of Infrastructure Against Cyber... the Defense of Infrastructure against Cyber Threats (PREDICT) program, and is a revision of a... operational data for use in cyber security research and development through the establishment of distributed...
Strategy for the Long Haul. Special Operations Forces: Future Challenges and Opportunities
2008-01-01
College, 2006); and David Tucker and Chris- topher Lamb , “Restructuring Special Operations Forces for Emerging Threats, NDU Strategic Forum, January...Secretary of Defense Gates, SOCOM commander Admiral Eric Olson, and Assistant Secretary of Defense for SOLIC/IC Michael Vickers. See: Stew Mag- nuson
Fear and the Defense Cascade: Clinical Implications and Management.
Kozlowska, Kasia; Walker, Peter; McLean, Loyola; Carrive, Pascal
2015-01-01
Evolution has endowed all humans with a continuum of innate, hard-wired, automatically activated defense behaviors, termed the defense cascade. Arousal is the first step in activating the defense cascade; flight or fight is an active defense response for dealing with threat; freezing is a flight-or-fight response put on hold; tonic immobility and collapsed immobility are responses of last resort to inescapable threat, when active defense responses have failed; and quiescent immobility is a state of quiescence that promotes rest and healing. Each of these defense reactions has a distinctive neural pattern mediated by a common neural pathway: activation and inhibition of particular functional components in the amygdala, hypothalamus, periaqueductal gray, and sympathetic and vagal nuclei. Unlike animals, which generally are able to restore their standard mode of functioning once the danger is past, humans often are not, and they may find themselves locked into the same, recurring pattern of response tied in with the original danger or trauma. Understanding the signature patterns of these innate responses--the particular components that combine to yield the given pattern of defense-is important for developing treatment interventions. Effective interventions aim to activate or deactivate one or more components of the signature neural pattern, thereby producing a shift in the neural pattern and, with it, in mind-body state. The process of shifting the neural pattern is the necessary first step in unlocking the patient's trauma response, in breaking the cycle of suffering, and in helping the patient to adapt to, and overcome, past trauma.
NASA Astrophysics Data System (ADS)
Usikov, Denis A.
2013-09-01
The 2007 Planetary Defense Conference recommends "to provide or enhance Internet sites to show how threats evolve and to illustrate possible action scenarios". Thereby, establishment of informational and communicational AsteroidAware web-site with the exact, authentic data about the past and the present of Earth's impact events will assist in achievement of positive results and progress in different directions on political, international, social and scientific levels. Expanded ICT's capabilities for popularization of planetary defense can help in resolving the problem of low public interest. The project's primary intent lies in popularizing the concept of planetary defenses and attracting attention to the potential dangers that threaten the Earth from outer space. The result of the efforts falling into the boundaries of this project would be an increased amount of social participation in the process of developing solutions for and increasing awareness of potential collisions between various astral bodies and the Earth. The project is also aimed at creating a foundation for the interaction between scientists and executives from around the world to facilitate international efforts of searching for fitting measures towards lowering threat levels and developing strategies revolving around united actions against potential threats.
Technologies for distributed defense
NASA Astrophysics Data System (ADS)
Seiders, Barbara; Rybka, Anthony
2002-07-01
For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.
Plante, Courtney N; Roberts, Sharon E; Snider, Jamie S; Schroy, Catherine; Reysen, Stephen; Gerbasi, Kathleen
2015-06-01
We investigated how group distinctiveness threats affect essentialist beliefs about group membership in a stigmatized fan community. An experiment conducted on 817 members of the fan community revealed that highly identified fans who perceived significant stigmatization were the most likely to endorse essentialist beliefs about group membership when exposed to a distinctiveness threat via comparison to a highly similar (vs. dissimilar) outgroup. These results bridge essentialism research and research on distinctiveness threat by demonstrating the mutability of group essentialism beliefs as a defensive response to distinctiveness threats. Implications for future research are discussed. © 2014 The British Psychological Society.
In the face of fear: Anxiety sensitizes defensive responses to fearful faces
Grillon, Christian; Charney, Danielle R.
2011-01-01
Fearful faces readily activate the amygdala. Yet, whether fearful faces evoke fear is unclear. Startle studies show no potentiation of startle by fearful faces, suggesting that such stimuli do not activate defense mechanisms. However, the response to biologically relevant stimuli may be sensitized by anxiety. The present study tested the hypothesis that startle would not be potentiated by fearful faces in a safe context, but that startle would be larger during fearful faces compared to neutral faces in a threat-of-shock context. Subjects viewed fearful and neutral faces in alternating periods of safety and threat of shock. Acoustic startle stimuli were presented in the presence and absence of the faces. Startle was transiently potentiated by fearful faces compared to neutral faces in the threat periods. This suggests that although fearful faces do not prompt behavioral mobilization in an innocuous context, they can do so in an anxiogenic one. PMID:21824155
10 CFR 62.25 - Criteria for a Commission determination.
Code of Federal Regulations, 2014 CFR
2014-01-01
... emergency access create a serious and immediate threat to the public health and safety or the common defense and security. (b) In making the determination that a serious and immediate threat exists to the public... § 62.23 of this part, the Commission will consider the criteria contained in the Commission's Policy...
10 CFR 62.25 - Criteria for a Commission determination.
Code of Federal Regulations, 2013 CFR
2013-01-01
... emergency access create a serious and immediate threat to the public health and safety or the common defense and security. (b) In making the determination that a serious and immediate threat exists to the public... § 62.23 of this part, the Commission will consider the criteria contained in the Commission's Policy...
10 CFR 62.25 - Criteria for a Commission determination.
Code of Federal Regulations, 2011 CFR
2011-01-01
... emergency access create a serious and immediate threat to the public health and safety or the common defense and security. (b) In making the determination that a serious and immediate threat exists to the public... § 62.23 of this part, the Commission will consider the criteria contained in the Commission's Policy...
10 CFR 62.25 - Criteria for a Commission determination.
Code of Federal Regulations, 2012 CFR
2012-01-01
... emergency access create a serious and immediate threat to the public health and safety or the common defense and security. (b) In making the determination that a serious and immediate threat exists to the public... § 62.23 of this part, the Commission will consider the criteria contained in the Commission's Policy...
Wilhelm, Frank H; Rattel, Julina A; Wegerer, Melanie; Liedlgruber, Michael; Schweighofer, Simon; Kreibig, Sylvia D; Kolodyazhniy, Vitaliy; Blechert, Jens
2017-12-01
Sex differences in emotional reactivity have been studied primarily for negative but less so for positive stimuli; likewise, sex differences in the psychophysiological response-patterning during such stimuli are poorly understood. Thus, the present study examined sex differences in response to negative/positive and high/low arousing films (classified as threat-, loss-, achievement-, and recreation-related, vs. neutral films), while measuring 18 muscular, autonomic, and respiratory parameters. Sex differences emerged for all films, but were most prominent for threat-related films: Despite equivalent valence and arousal ratings, women displayed more facial-muscular and respiratory responding than men and pronounced sympathetic activation (preejection period, other cardiovascular and electrodermal measures), while men showed coactivated sympathetic/parasympathetic responding (including increased respiratory sinus arrhythmia). This indicates a prototypical threat-related defense response in women, while men showed a pattern of sustained orienting, which can be understood as a shift toward less threat proximity in the defense cascade model. Clinical implications are discussed within a socio-evolutionary framework. Copyright © 2017 Elsevier B.V. All rights reserved.
Metalaxyl Effects on Antioxidant Defenses in Leaves and Roots of Solanum nigrum L.
de Sousa, Alexandra; AbdElgawad, Hamada; Asard, Han; Pinto, Ana; Soares, Cristiano; Branco-Neves, Simão; Braga, Teresa; Azenha, Manuel; Selim, Samy; Al Jaouni, Soad; Fidalgo, Fernanda; Teixeira, Jorge
2017-01-01
Overuse of pesticides has resulted in environmental problems, threating public health through accumulation in food chains. Phytoremediation is a powerful technique to clean up contaminated environments. However, it is necessary to unravel the metabolic mechanisms underlying phytoremediation in order to increase the efficiency of this process. Therefore, growth, physiological and biochemical responses in leaves and roots of Solanum nigrum L. exposed to the commonly used fungicide metalaxyl were investigated. This species shows characteristics that make it valuable as a potential tool for the remediation of organic pollutants. We found that once inside the plant, metalaxyl altered carbon metabolism, which resulted in a reduction of growth and lower biomass accumulation due to impairment of carbohydrate production (total soluble sugar, starch, rubisco) and increased photorespiration (glycolate oxidase, Gly/Ser ratio). A significant increase of antioxidant defenses (polyphenols, flavonoids, tocopherols, ascorbate, glutathione, superoxide dismutase, catalase, peroxidases, monodehydroascorbate- and dehydroascorbate reductase, gluthatione reductase) kept reactive oxygen species (ROS) levels under control (superoxide anion) leaving cell membranes undamaged. The results suggest that enhancing carbon assimilation and antioxidant capacity may be target parameters to improve this species’ phytoremediation capacities. Highlights • Metalaxyl inhibits growth by reducing photosynthesis and inducing photorespiration • Elevated antioxidant defenses protect metalaxyl-treated plants from oxidative damage • Ascorbate and glutathione are key antioxidants in metalaxyl tolerance. PMID:29250085
DOE Office of Scientific and Technical Information (OSTI.GOV)
Peglow, S.G.
We feel that the concept of intercepting a fractionated threat from a tactical ballistic missile is potentially feasible and would have very high payoff for the defense. Many other concepts have been suggested to solve this problem, although they have mostly been more futuristic approaches, e.g. aircrafty based lasers. We also believe that current technologies are not likely to be adequate for the expected types of very small submunition payloads, especially in the presence of relatively simple countermeasures. The MEDUSA concept, or its clones, may very well provide a vehicle for the study of less stressing threats, e.g. separating warheadsmore » and provide a lethality enhancement for non-deployed payloads. An opportunity also exists to investigate alternative technologies, such as the explosively-formed ``disk`` idea. The use of high-precision, limited field-of-view sensor-fuzed munitions is a subject of interest in other Defense Department programs and may have application to the important area of theater missile defense.« less
NASA Astrophysics Data System (ADS)
Hussein, Alaa; Rozenheck, Oshri; Entrena Utrilla, Carlos Manuel
2016-09-01
Throughout recorded history, hundreds of Earth impacts have been reported, with some catastrophic localized consequences. Based on the International Space University (ISU) Planetary Defense project named READI, we address the impact event problem by giving recommendations for the development of a planetary defense program. This paper reviews the current detection and tracking techniques and gives a set of recommendations for a better preparation to shield Earth from asteroid and cometary impacts. We also extend the use of current deflection techniques and propose a new compilation of those to deflect medium-sized potentially hazardous objects (PHOs). Using an array of techniques from high-energy lasers to defensive missiles, we present a set of protective layers to defend our planet. The paper focused on threats with a short warning period from discovery to impact with Earth, within few years.
Maturation of the Asteroid Threat Assessment Project
NASA Technical Reports Server (NTRS)
Arnold, J. O..; Burkhard, C. D.
2017-01-01
As described at IPPW 12 [1], NASA initiated a new research activity focused on Planetary Defense (PD) on October 1, 2014. The overarching function of the Asteroid Threat Assessment Project (ATAP) is to provide capabilities to assess impact damage of any Near-Earth Object (NEO) that could inflict on the Earth. The activity includes four interrelated efforts: Initial Conditions (at the atmospheric entry interface); Entry Modeling (energy deposition in the atmosphere); Hazards (on the surface including winds, over pressures, thermal exposures, craters, tsunami and earthquakes) and Risk (physics-based). This paper outlines progress by ATAP and highlights achievements that are complimentary to activities of interest to the International Planetary Probe community. The ATAPs work is sponsored by NASAs Planetary Defense Coordination Office (PDCO), a part of the agency's Science Mission Directorate [1] Arnold, J. O., et. al., Overview of a New NASA Activity Focused on Planetary Defense, IPPW 12 Cologne Germany, June 15-19. 2015.
Heterogeneous Defensive Naval Weapon Assignment To Swarming Threats In Real Time
2016-03-01
threat Damage potential of target t if it hits the ship [integer from 0 to 3] _ ttarget phit Probability that target t hits the ship [probability...secondary weapon systems on target t [integer] _ tsec phit Probability that secondary weapon systems launched from target t hit the ship...pairing. These parameters are calculated as follows: 310 _ _t t tpriority target threat target phit = × × (3.1) 3_ 10 _ _t t tsec priority sec
The DTIC Review; Volume 3 Number 4. Antimissile Defense: Strategic Interceptor
1997-12-01
threat by pursuing policies and initiatives designed to both prevent and limit this aggression. Plans to improve the interception of missiles will...to this threat by pursuing policies and initiatives designed to both prevent and limit it. Plans to improve the interception of missiles will depend...the 21st Century, it must be able to deter adversaries possessing or planning to possess WMD. If not, threats of WMD use by adversaries will prevent
An Expert System For Multispectral Threat Assessment And Response
NASA Astrophysics Data System (ADS)
Steinberg, Alan N.
1987-05-01
A concept has been defined for an automatic system to manage the self-defense of a combat aircraft. Distinctive new features of this concept include: a. the flexible prioritization of tasks and coordinated use of sensor, countermeasures, flight systems and weapons assets by means of an automated planning function; b. the integration of state-of-the-art data fusion algorithms with event prediction processing; c. the use of advanced Artificial Intelligence tools to emulate the decision processes of tactical EW experts. Threat Assessment functions (a) estimate threat identity, lethality and intent on the basis of multi-spectral sensor data, and (b) predict the time to critical events in threat engagements (e.g., target acquisition, tracking, weapon launch, impact). Response Management functions (a) select candidate responses to reported threat situations; (b) estimate the effects of candidate actions on survival; and (c) coordinate the assignment of sensors, weapons and countermeasures with the flight plan. The system employs Finite State Models to represent current engagements and to predict subsequent events. Each state in a model is associated with a set of observable features, allowing interpretation of sensor data and adaptive use of sensor assets. Defined conditions on state transitions allow prediction of times to critical future states and are used in planning self-defensive responses, which are designed either to impede a particular state transition or to force a transition to a lower threat state.
2017-01-01
annual investment of about $2.5 billion. The study also recommended that the Department of Defense enhance its ab ility to perform the kinds of broad...homeland fundamentally change the nature of the problem to one of strategic deterrence and that the spirit of the terms of reference was more...adversary investments in regional, precision attack cruise and ballistic threaten that foundation, investments that have dramatically increased both
2007-01-01
cost of defense and the value of insurance against threats purchased by those costs. But a large fraction of the public debate at this time was...happen. One extreme we could ask of people is basically to self- insure . Let them bear the cost of things to happen. Th at’s a pretty powerful incentive...instruments KEYNOTE ADDRESS 11 2006 DEFENSE ECONOMICS CONFERENCE that can be used to shift risk burdens, and the use of insurance and pricing of
Countering MANPADS: study of new concepts and applications: part two
NASA Astrophysics Data System (ADS)
Maltese, Dominique; Vergnolle, Jean-François; Aragones, Julien; Renaudat, Mathieu
2007-04-01
The latest events of ground-to-air Man Portable Air Defense (MANPAD) attacks against aircraft have revealed a new threat both for military and civilian aircraft. Consequently, the implementation of protecting systems (i.e. Directed Infra Red Counter Measure - DIRCM) in order to face IR guided missiles turns out to be now inevitable. In a near future, aircraft will have to possess detection, tracking, identification, targeting and jamming capabilities to face MANPAD threats. Besides, Multiple Missiles attacks become more and more current scenarios to deal with. In this paper, a practical example of DIRCM systems under study at SAGEM DEFENSE & SECURITY Company is presented. The article is the continuation of a previous SPIE one. Self-protection solutions include built-in and automatic locking-on, tracking, identification and laser jamming capabilities, including defeat assessment. Target Designations are provided by a Missile Warning System. Targets scenarios including multiple threats are considered to design systems architectures. In a first step, the article reminds the context, current and future threats (IR seekers of different generations...), and scenarios for system definition. Then, it focuses on potential self-protection systems under study at SAGEM DEFENSE & SECURITY Company. Different strategies including target identification, multi band laser and active imagery have been previously studied in order to design DIRCM System solutions. Thus, results of self-protection scenarios are provided for different MANPAD scenarios to highlight key problems to solve. Data have been obtained from simulation software modeling full DIRCM systems architectures on technical and operational scenarios (parametric studies).
Nonholonomic Hamiltonian Method for Molecular Dynamics Simulations of Reacting Shocks
NASA Astrophysics Data System (ADS)
Fahrenthold, Eric; Bass, Joseph
2015-06-01
Conventional molecular dynamics simulations of reacting shocks employ a holonomic Hamiltonian formulation: the breaking and forming of covalent bonds is described by potential functions. In general these potential functions: (a) are algebraically complex, (b) must satisfy strict smoothness requirements, and (c) contain many fitted parameters. In recent research the authors have developed a new noholonomic formulation of reacting molecular dynamics. In this formulation bond orders are determined by rate equations and the bonding-debonding process need not be described by differentiable functions. This simplifies the representation of complex chemistry and reduces the number of fitted model parameters. Example applications of the method show molecular level shock to detonation simulations in nitromethane and RDX. Research supported by the Defense Threat Reduction Agency.
2011-03-04
Research, the Defense Threat Reduction Agency, and the Department of Energy. DAD is indebted to the Robert Ramsay Endowment of the University of Alabama...Schmidt, M. W., Baldridge, K. K., Boatz, J.A., Elbert, S.T., Gordon , M.S., Jensen, J.H., Koseki, S., Matsunaga, N., Nguyen, K.A., Su, S., Windus, T.L...Dupuis, M., Montgomery, J.A.; J. Comput. Chem., 1993, 14, 1347-1363.; Gordon , M. S., Schmidt, M. W., pp. 1167-1189, in "Theory and Applications of
USDA-ARS?s Scientific Manuscript database
Pierce’s disease (PD), caused by the xylem-dwelling pathogen Xylella fastidiosa (X.f.), is a serious threat to grape production. The effects of X.f. infection six months post-inoculation on defense-associated proteins and phenolic compounds found in xylem sap and tissue were evaluated. Defense-assoc...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harvey, H.
1988-09-01
In introducing this group of articles on nonoffensive defense the author notes that the prospect of nuclear disarmament in Europe is boosting ideas, which have been around for a decade, from theory to politics. This special section of articles looks at an emerging theory that may reduce reliance on nuclear weapons by bringing stability to the conventional standoff in central Europe. The idea is to rearrange conventional forces so that they can defend but not attack. Under such monikers as nonoffensive defense (the main term used in these articles), nonprovocative defense, defensive defense, reasonable sufficiency, and mutual defensive superiority, thesemore » proposals suggest that nations can restructure weapons, personnel, and strategy to assure their own military security without posing a threat to other nations. 5 refs.« less
Freedom of racist speech: Ego and expressive threats.
White, Mark H; Crandall, Christian S
2017-09-01
Do claims of "free speech" provide cover for prejudice? We investigate whether this defense of racist or hate speech serves as a justification for prejudice. In a series of 8 studies (N = 1,624), we found that explicit racial prejudice is a reliable predictor of the "free speech defense" of racist expression. Participants endorsed free speech values for singing racists songs or posting racist comments on social media; people high in prejudice endorsed free speech more than people low in prejudice (meta-analytic r = .43). This endorsement was not principled-high levels of prejudice did not predict endorsement of free speech values when identical speech was directed at coworkers or the police. Participants low in explicit racial prejudice actively avoided endorsing free speech values in racialized conditions compared to nonracial conditions, but participants high in racial prejudice increased their endorsement of free speech values in racialized conditions. Three experiments failed to find evidence that defense of racist speech by the highly prejudiced was based in self-relevant or self-protective motives. Two experiments found evidence that the free speech argument protected participants' own freedom to express their attitudes; the defense of other's racist speech seems motivated more by threats to autonomy than threats to self-regard. These studies serve as an elaboration of the Justification-Suppression Model (Crandall & Eshleman, 2003) of prejudice expression. The justification of racist speech by endorsing fundamental political values can serve to buffer racial and hate speech from normative disapproval. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Two-Component Additive Manufacturing of Nanothermite by Reactive Inkjet Printing
NASA Astrophysics Data System (ADS)
Murray, Allison; Novotny, Whitney; Fleck, Trevor; Gunduz, Emre; Son, Steven; Chiu, George; Rhoads, Jeffrey
2017-06-01
To broaden the type of energetic materials that can be selectively deposited and improve the safety of their deposition, this work demonstrates the use of combinatorial inkjet printing for the selective deposition of energetic material. Two inert colloidal suspensions of nano-aluminum and nano-copper (II) oxide in dimethylformamide (DMF) with polyvinylpyrrolidone (PVP) were sequentially deposited on a substrate using piezoelectric inkjet printing. By depositing the materials at the same location, in situ mixing produced a reactive nanothermite. This process was continued to produce layers of nanothermite until the desired quantity of material was deposited. Samples with precise geometric control and high fidelity energetic performance were achieved. This work proves the feasibility of reactive inkjet printing as a means for depositing energetic materials from two largely-inert suspensions. In doing so, it opens the doors for safe material handling and the development of a wide array of energetic materials that were previously deemed incompatible with inkjet printing. This research is supported by the U.S. Department of Defense, Defense Threat Reduction Agency through Grant No. HDTRA1-15-1-0010.
DOE Office of Scientific and Technical Information (OSTI.GOV)
NSTec Environmental Restoration
This Corrective Action Decision Document/Closure Report (CADD/CR) was prepared by the Defense Threat Reduction Agency (DTRA) for Corrective Action Unit (CAU) 383, Area 12 E-Tunnel Sites, which is the joint responsibility of DTRA and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This CADD/CR is consistent with the requirements of the Federal Facility Agreement and Consent Order (FFACO) agreed to by the State of Nevada, the DOE, and the U.S. Department of Defense. Corrective Action Unit 383 is comprised of three Corrective Action Sites (CASs) and two adjacent areas: • CAS 12-06-06, Muckpile •more » CAS 12-25-02, Oil Spill • CAS 12-28-02, Radioactive Material • Drainage below the Muckpile • Ponds 1, 2, and 3 The purpose of this CADD/CR is to provide justification and documentation to support the recommendation for closure with no further corrective action, by placing use restrictions at the three CASs and two adjacent areas of CAU 383.« less
Threat Based Risk Assessment for Enterprise Networks
2016-02-15
served as the program chair of the Research in Attacks, Intrusions , and Defenses workshop; the Neural Information Processing Systems (NIPS) annual...Threat- Based Risk Assessment for Enterprise Networks Richard P. Lippmann and James F. Riordan Protecting enterprise networks requires...include aids for the hearing impaired, speech recognition, pattern classification, neural networks , and cybersecurity. He has taught three courses
Drone Defense System Architecture for U.S. Navy Strategic Facilities
2017-09-01
evaluation and weapons assignment (TEWA) to properly address threats. This report follows a systems engineering process to develop a software architecture...C-UAS requires a central system to connect these new and existing systems. The central system uses data fusion and threat evaluation and weapons...30 Table 6. Decision Type Descriptions .......................................................................40 Table 7
Everybody's Scared--But Life Goes On: Coping, Defense and Action in the Face of Nuclear Threat.
ERIC Educational Resources Information Center
Haste, Helen
1989-01-01
Presents model of sequence of processes by which people deal with recurrent fears about nuclear war, drawing on risk perception and stress paradigms. Shows activism to be but one coping mechanism rather than the logical outcome of effective coping. Discusses implications for psychologists concerned about nuclear threat. (Author/NB)
ERIC Educational Resources Information Center
Aurigemma, Salvatore
2013-01-01
Information and information systems have become embedded in the fabric of contemporary organizations throughout the world. As the reliance on information technology has increased, so too have the threats and costs associated with protecting organizational information resources. To combat potential information security threats, organizations rely…
Determination of High-Speed Multiple Threat Using Kalman Filter Analysis of Maritime Movement
2015-06-01
Ownship, in the blue circle, has destroyed a threat Figure 9. ship, as represented with the red line... destroyed and still arriving when the ship is destroyed ...defenses of a given target. These kinds of attacks are typically used against High Value Assets (HVA), destroyers or larger. While it would be easy
DOE Office of Scientific and Technical Information (OSTI.GOV)
Roseman, Mallory; Zikry, Fareeda
Lawrence Livermore National Laboratory’s Center for Global Security Research hosted a workshop to investigate why some consistently predicted threats from science and technology (S&T) have not manifested with the impacts to international security as forecasted. During the workshop, “Dogs That Haven’t Barked: Towards an Understanding of the Absence of Expected Technological Threats,” participants used two specific cases to focus the discussion: biotechnology and man-portable air defense systems (MANPADS).
2017-04-20
the time and effort placed forward by both Dr. Greg Miller and Mr. Michael Bennett as part of the research thesis team and as advisors on this...defensive units are comprised of various individual positions. Linebackers, safeties, defensive lineman, corners, etc. Each player excels at his...position, trains to very specific guidelines based on his unique skill sets, and uses mentors that give the player the best guidance in becoming the best
2016-02-16
into areas where there is no access to maritime platforms. Sea-based interceptor platforms have the ability to intercept targets at each stage of the...argues that the most efficient concept for integrating active defense weapon systems is a multi- layered architecture with redundant intercept ...faster data transfer and will prevent data loss. The need for almost 100% interception successes is increasing as the threat becomes more
Strain Rate Behavior of HTPB-Based Magnetorheological Materials
NASA Astrophysics Data System (ADS)
Stoltz, Chad; Seminuk, Kenneth; Joshi, Vasant
2013-06-01
It is of particular interest to determine whether the mechanical properties of binder systems can be manipulated by adding ferrous or Magnetostrictive particulates. Strain rate response of two HTPB/Fe (Hydroxyl-terminated Polybutadiene/Iron) compositions under electromagnetic fields has been investigated using a Split Hopkinson Pressure bar arrangement equipped with aluminum bars. Two HTPB/Fe compositions were developed, the first without plasticizer and the second containing plasticizer. Samples were tested with and without the application of a 0.01 Tesla magnetic field coil. Strain gauge data taken from the Split Hopkinson Pressure bar has been used to determine what mechanical properties were changed by inducing a mild electromagnetic field onto each sample. The data reduction method to obtain stress-strain plots included dispersion corrections for deciphering minute changes due to compositional alterations. Data collected from the Split Hopkinson Pressure bar indicate changes in the Mechanical Stress-Strain curves and suggest that the impedance of a binder system can be altered by means of a magnetic field. We acknowledge the Defense Threat Reduction Agency for funding.
An end-to-end approach to developing biological and chemical detector requirements
NASA Astrophysics Data System (ADS)
Teclemariam, Nerayo P.; Purvis, Liston K.; Foltz, Greg W.; West, Todd; Edwards, Donna M.; Fruetel, Julia A.; Gleason, Nathaniel J.
2009-05-01
Effective defense against chemical and biological threats requires an "end-to-end" strategy that encompasses the entire problem space, from threat assessment and target hardening to response planning and recovery. A key element of the strategy is the definition of appropriate system requirements for surveillance and detection of threat agents. Our end-to-end approach to venue chem/bio defense is captured in the Facilities Weapons of Mass Destruction Decision Analysis Capability (FacDAC), an integrated system-of-systems toolset that can be used to generate requirements across all stages of detector development. For example, in the early stage of detector development the approach can be used to develop performance targets (e.g., sensitivity, selectivity, false positive rate) to provide guidance on what technologies to pursue. In the development phase, after a detector technology has been selected, the approach can aid in determining performance trade-offs and down-selection of competing technologies. During the application stage, the approach can be employed to design optimal defensive architectures that make the best use of available technology to maximize system performance. This presentation will discuss the end-to-end approach to defining detector requirements and demonstrate the capabilities of the FacDAC toolset using examples from a number of studies for the Department of Homeland Security.
ERIC Educational Resources Information Center
Clark, Thomas
1998-01-01
Finds that managers were more likely to recommend that environmental remediation proposals receive priority for funding when they read proposals written in candid language than when they read proposals written in legally defensible language. Shows that threats and a negative tone are highly persuasive in internal environmental compliance reports.…
Law & psychiatry: imposed insanity defenses and political crimes.
Appelbaum, Paul S
2013-01-01
Anders Breivik's murder of 77 people in Norway in 2011 led to an unusual clash of interests. With conflicting psychiatric reports regarding his sanity, prosecutors argued that Breivik should be found not guilty by reason of insanity, whereas the defense strongly maintained that he was sane and responsible for his actions. Imposing an insanity defense on an unwilling defendant pits societal interests in fair adjudications against the right of defendants to control their defense. For crimes with political motivations, an imposed insanity verdict discredits the perpetrator and may distract the public from the threats posed by extreme political views.
Mogg, Karin; Waters, Allison M.; Bradley, Brendan P.
2017-01-01
Attention bias modification (ABM) aims to reduce anxiety by reducing attention bias (AB) to threat; however, effects on anxiety and AB are variable. This review examines 34 studies assessing effects of multisession-ABM on both anxiety and AB in high-anxious individuals. Methods include ABM-threat-avoidance (promoting attention-orienting away from threat), ABM-positive-search (promoting explicit, goal-directed attention-search for positive/nonthreat targets among negative/threat distractors), and comparison conditions (e.g., control-attention training combining threat-cue exposure and attention-task practice without AB-modification). Findings indicate anxiety reduction often occurs during both ABM-threat-avoidance and control-attention training; anxiety reduction is not consistently accompanied by AB reduction; anxious individuals often show no pretraining AB in orienting toward threat; and ABM-positive-search training appears promising in reducing anxiety. Methodological and theoretical issues are discussed concerning ABM paradigms, comparison conditions, and AB assessment. ABM methods combining explicit goal-directed attention-search for nonthreat/positive information and effortful threat-distractor inhibition (promoting top-down cognitive control during threat-cue exposure) warrant further evaluation. PMID:28752017
NDAA, RAND Corporation researchers conducted literature reviews, collected and analyzed publicly available and classified data and information , and conducted interviews with subject-matter experts....The National Defense Authorization Act (NDAA) for Fiscal Year 2017, Section 1276, requires an independent assessment directed by the Chairman of the...form of a report, to be delivered to the congressional defense committees. The NDAA requires several specific assessments , including the threat posed to
1995-07-01
necessary. As John Naisbitt observed in his 1982 book Megatrends , ...with the coming of the infor- mation society, we have for the first time an economy...information in the hands of many. —John Naisbitt Megatrends As the Defense Technical Information Center moves forward into the last decade of the...Gulf War, for example, Iraq’s leader, Saddam Hussein, threatened to use biological or biochemical warfare. To defend against this threat, the U.S
Overview of Accelerator Applications for Security and Defense
Antolak, Arlyn J.
2015-01-01
Particle accelerators play a key role in a broad set of defense and security applications including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat for developing a radiological dispersal device and be used to produce isotopes for medical, industrial, and re-search purposes. Lastly, we present an overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security.
Air Defense Options for Taiwan: An Assessment of Relative Costs and Operational Benefits
2016-01-01
and analyzes them in comparison to current People’s Liberation Army ( PLA ) capabilities. It begins with a description of the PLA air- power threat and... PLA ) to easily counter. Still, air defense in a major war is only one possible category of demands for Taiwan’s air defenses. A variety of more-limited...high, the PLA could check Taiwan’s fighter aircraft if it chose. However, in coercive scenarios that feature very constrained use of force, Taiwan’s
2015-07-01
sharing, the Pathosphere.org open-system architecture is now deployed and available on the Amazon cloud . The site has over 100 users from...SUPPLEMENTARY NOTES 14. ABSTRACT: To generate accurate and actionable disease data that can be integrated into the broader Department of Defense...PREFACE The work described in this report was authorized under the Joint United States Forces Korea Portal and Integrated Threat Recognition
Arms control and The President's Strategic Defense Initiative
NASA Astrophysics Data System (ADS)
Bon, J. J.
1985-04-01
The President's Strategic Defense Initiative (SDI) provides the hope for eliminating the threat from ballistic missiles. This study evaluates the impact of SDI on existing and future arms control agreements. Because new or modified space-related treaties are a probable result of the SDI, this study concludes that the best single strategy for arms control negotiations is to preserve overall US interests and maintain open technological options vice severely limiting any space technology that might some day become part of a space-based defensive system.
ERIC Educational Resources Information Center
Díaz-Mataix, Lorenzo; Piper, Walter T.; Schiff, Hillary C.; Roberts, Clark H.; Campese, Vincent D.; Sears, Robert M.; LeDoux, Joseph E.
2017-01-01
The creation of auditory threat Pavlovian memory requires an initial learning stage in which a neutral conditioned stimulus (CS), such as a tone, is paired with an aversive one (US), such as a shock. In this phase, the CS acquires the capacity of predicting the occurrence of the US and therefore elicits conditioned defense responses.…
NASA Technical Reports Server (NTRS)
Bailey, Brandon
2015-01-01
Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)
2014-10-01
maneuver • Traditional “ Brick and Mortar ” training models – Difficult to train regularly due to logistics/budget restrictions – Doesn’t scale...complexity, scenario, location , and resources available • Scalable 4-cell planning construct – Exercise Control (White Cell) – Threat Emulation (Red...business impact) • Collaborative effort Trusted Agents ( SMEs ) – Threats – Cyber defense capabilities – Policies and procedures – Project and/or
Changing of the Guard: Nation Building and the United States Military
2010-06-01
under the constant threat of a nuclear exchange with its arch- rival. The resultant fear produced an abnormally influential defense establishment that...a threat previous administrations referenced to justify deficit spending for the purpose of maintaining an abnormally strong military during a time...more easily convinced to take on a broader range of missions. 71 Barlow describes the fractious state
Heuristic automation for decluttering tactical displays.
St John, Mark; Smallman, Harvey S; Manes, Daniel I; Feher, Bela A; Morrison, Jeffrey G
2005-01-01
Tactical displays can quickly become cluttered with large numbers of symbols that can compromise effective monitoring. Here, we studied how heuristic automation can aid users by intelligently "decluttering" the display. In a realistic simulated naval air defense task, 27 experienced U.S. Navy users monitored a cluttered airspace and executed defensive responses against significant threats. An algorithm continuously evaluated aircraft for their levels of threat and decluttered the less threatening ones by dimming their symbols. Users appropriately distrusted and spot-checked the automation's assessments, and decluttering had very little effect on which aircraft were judged as significantly threatening. Nonetheless, decluttering improved the timeliness of responses to threatening aircraft by 25% as compared with a baseline display with no decluttering; it was especially beneficial for threats in more peripheral locations, and 25 of 27 participants preferred decluttering. Heuristic automation, when properly designed to guide users' attention by decluttering less important objects, may prove valuable in many cluttered monitoring situations, including air traffic management, crisis team management, and tactical situation awareness in general.
Rationality Validation of a Layered Decision Model for Network Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wei, Huaqiang; Alves-Foss, James; Zhang, Du
2007-08-31
We propose a cost-effective network defense strategy built on three key: three decision layers: security policies, defense strategies, and real-time defense tactics for countering immediate threats. A layered decision model (LDM) can be used to capture this decision process. The LDM helps decision-makers gain insight into the hierarchical relationships among inter-connected entities and decision types, and supports the selection of cost-effective defense mechanisms to safeguard computer networks. To be effective as a business tool, it is first necessary to validate the rationality of model before applying it to real-world business cases. This paper describes our efforts in validating the LDMmore » rationality through simulation.« less
Unmanned and Unattended Response Capability for Homeland Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
BENNETT, PHIL C.
2002-11-01
An analysis was conducted of the potential for unmanned and unattended robotic technologies for forward-based, immediate response capabilities that enables access and controlled task performance. The authors analyze high-impact response scenarios in conjunction with homeland security organizations, such as the NNSA Office of Emergency Response, the FBI, the National Guard, and the Army Technical Escort Unit, to cover a range of radiological, chemical and biological threats. They conducted an analysis of the potential of forward-based, unmanned and unattended robotic technologies to accelerate and enhance emergency and crisis response by Homeland Defense organizations. Response systems concepts were developed utilizing new technologiesmore » supported by existing emerging threats base technologies to meet the defined response scenarios. These systems will pre-position robotic and remote sensing capabilities stationed close to multiple sites for immediate action. Analysis of assembled systems included experimental activities to determine potential efficacy in the response scenarios, and iteration on systems concepts and remote sensing and robotic technologies, creating new immediate response capabilities for Homeland Defense.« less
Lamontagne, Steven J; Olmstead, Mary C; Menard, Janet L
2016-11-01
Both the lateral septum (LS) and anterior hypothalamus (AHA) regulate behavioural defense. We tested whether those two interconnected structures act in serial in that regard. Infusions of the GABAA agonist muscimol into one side of the LS and the contralateral (but not ipsilateral) AHA suppressed rats' burying in the shock-probe test whereas none of our muscimol infusion approaches altered their open-arm avoidance in the elevated plus-maze. These results suggest that the LS-AHA circuit serves a specialized role in defensive responses towards discrete, localizable threat stimuli but not towards potential threats. Copyright © 2016 Elsevier B.V. All rights reserved.
Fear and the Defense Cascade: Clinical Implications and Management
Kozlowska, Kasia; Walker, Peter; McLean, Loyola; Carrive, Pascal
2015-01-01
Abstract Evolution has endowed all humans with a continuum of innate, hard-wired, automatically activated defense behaviors, termed the defense cascade. Arousal is the first step in activating the defense cascade; flight or fight is an active defense response for dealing with threat; freezing is a flight-or-fight response put on hold; tonic immobility and collapsed immobility are responses of last resort to inescapable threat, when active defense responses have failed; and quiescent immobility is a state of quiescence that promotes rest and healing. Each of these defense reactions has a distinctive neural pattern mediated by a common neural pathway: activation and inhibition of particular functional components in the amygdala, hypothalamus, periaqueductal gray, and sympathetic and vagal nuclei. Unlike animals, which generally are able to restore their standard mode of functioning once the danger is past, humans often are not, and they may find themselves locked into the same, recurring pattern of response tied in with the original danger or trauma. Understanding the signature patterns of these innate responses—the particular components that combine to yield the given pattern of defense—is important for developing treatment interventions. Effective interventions aim to activate or deactivate one or more components of the signature neural pattern, thereby producing a shift in the neural pattern and, with it, in mind-body state. The process of shifting the neural pattern is the necessary first step in unlocking the patient’s trauma response, in breaking the cycle of suffering, and in helping the patient to adapt to, and overcome, past trauma. PMID:26062169
Molecular Evidence of Sexual Transmission of Ebola Virus
Mate, S.E.; Kugelman, J.R.; Nyenswah, T.G.; Ladner, J.T.; Wiley, M.R.; Cordier-Lassalle, T.; Christie, A; Schroth, G.P.; Gross, S.M.; Davies-Wayne, G.J.; Shinde, S.A.; Murugan, R.; Sieh, S.B.; Badio, M.; Fakoli, L.; Taweh, F.; de Wit, E.; van Doremalen, N.; Munster, V.J.; Pettitt, J.; Prieto, K.; Humrighouse, B.W.; Ströher, U.; DiClaro, J.W.; Hensley, L.E.; Schoepp, R.J.; Safronetz, D.; Fair, J.; Kuhn, J.H.; Blackley, D.J.; Laney, A.S.; Williams, D.E.; Lo, T.; Gasasira, A.; Nichol, S.T.; Formenty, P.; Kateh, F.N.; De Cock, K.M.; Bolay, F.; Sanchez-Lockhart, M.; Palacios, G.
2016-01-01
Summary A suspected case of sexual transmission from a male survivor of Ebola virus disease (EVD) to his female partner (the patient in this report) occurred in Liberia in March 2015. Ebola virus (EBOV) genomes assembled from blood samples from the patient and a semen sample from the survivor were consistent with direct transmission. The genomes shared three substitutions that were absent from all other Western African EBOV sequences and that were distinct from the last documented transmission chain in Liberia before this case. Combined with epidemiologic data, the genomic analysis provides evidence of sexual transmission of EBOV and evidence of the persistence of infective EBOV in semen for 179 days or more after the onset of EVD. (Funded by the Defense Threat Reduction Agency and others.) PMID:26465384
Wake Island Supplemental Environmental Assessment
2007-02-01
operations, the oxidizer transfer system would be flushed with water . This operation is expected to yield approximately 5 grams (0.2 ounces) of nitric...Defense System (BMDS) to provide a defensive capability for the U.S., its deployed forces, friends, and allies from ballistic missile threats. The...infrastructure, land use, physical resources, noise, socioeconomics, transportation, and water resources. MDA determined that six of the thirteen resource
Self-Defense Education: Five Steps for Developing Awareness and Prevention Tactics
ERIC Educational Resources Information Center
Banks, Aaron L.
2010-01-01
The incorporation of a self-defense unit of study within secondary physical education programs is becoming commonplace in 21st-century curricula. The threat of crime to oneself, one's belongings, or one's home is very real and is a particular concern to youths, because teens and young adults experience the highest rates of crime as reported by the…
2016-02-11
directed.36 Protected systems operating on secure networks will weigh into the adversaries calculus of risk and cost of their actions versus this... calculus deterring them from attack. Our extended defense with forts and lookouts searching outside the perimeter providing current intelligence of any...Last accessed 30 January 2016). 51 Phil Stewart , U.S. Defense Chief says pre-emptive action possible over cyber threat, Oct 11, 2012, http
Electrical Potential of Leaping Eels
Catania, Kenneth C.
2017-01-01
When approached by a large, partially submerged conductor, electric eels (Electrophorus electricus) will often defend themselves by leaping from the water to directly shock the threat. Presumably, the conductor is interpreted as an approaching terrestrial or semiaquatic animal. In the course of this defensive behavior, eels first make direct contact with their lower jaw and then rapidly emerge from the water, ascending the conductor while discharging high-voltage volleys. In this study, the equivalent circuit that develops during this behavior was proposed and investigated. First, the electromotive force and internal resistance of four electric eels were determined. These values were then used to estimate the resistance of the water volume between the eel and the conductor by making direct measurements of current with the eel and water in the circuit. The resistance of the return path from the eel's lower jaw to the main body of water was then determined, based on voltage recordings, for each electric eel at the height of the defensive leap. Finally, the addition of a hypothetical target for the leaping defense was considered as part of the circuit. The results suggest the defensive behavior efficiently directs electrical current through the threat, producing an aversive and deterring experience by activating afferents in potential predators. PMID:28651251
Defense Against Threat. Threat Recognition and Analysis Project
1975-09-01
but clustering around it ( land affecting it) are other action structures of different character, now entering strongly on the world scene...seeks .o cap ur ^^’^^try to gestalts of cognition and affect , ^[Jj^ f c!anrPr or country, that put the signature of...TRAMSPORT 8, PETROL PRODUCTS 7.*, USR 27, JAP 18, IND Ik, - FRUITS +NUTS Ik, NATURAL GAS 17, LAMBSKINS 12, USR 30, PAK
Sea Swat: A Littoral Combat Ship for Sea Base Defense
2003-12-01
183 a) DEFINITION... 183 b) THREAT TO SEA BASE........................................................................... 183 c...AND AFFF SYSTEM LOOPS........................................................... 126 FIGURE 69. FIREMAIN AND AFFF SYSTEM NOTIONAL LAYOUT
Grillon, Christian; Franco-Chaves, Jose A.; Mateus, Camilo F.; Ionescu, Dawn F.; Zarate, Carlos A.
2013-01-01
According to the emotion-context insensitivity (ECI) hypothesis, major depressive disorder (MDD) is associated with a diminished ability to react emotionally to positive stimuli and with blunting of defensive responses to threat. That defensive responses are blunted in MDD seems inconsistent with the conceptualization and diagnostic nosology of MDD. The present study tested the ECI hypothesis in MDD using a threat of shock paradigm. Twenty-eight patients with MDD (35.5±10.4 years) were compared with 28 controls (35.1±7.4 years). Participants were exposed to three conditions: no shock, predictable shock, and unpredictable shock. Startle magnitude was used to assess defensive responses. Inconsistent with the ECI hypothesis, startle potentiation to predictable and unpredictable shock was not reduced in the MDD group. Rather, MDD patients showed elevated startle throughout testing as well as increased contextual anxiety during the placement of the shock electrodes and in the predictable condition. A regression analysis indicated that illness duration and Beck depression inventory scores explained 37% (p<.005) of the variance in patients’ startle reactivity. MDD is not associated with emotional blunting but rather enhanced defensive reactivity during anticipation of harm. These results do not support a strong version of the ECI hypothesis. Understanding the nature of stimuli or situations that lead to blunted or enhanced defensive reactivity will provide better insight into dysfunctional emotional experience in MDD. PMID:23951057
Common Infrastructure for Neo Scientific and Planetary Defense Missions
NASA Technical Reports Server (NTRS)
Adams, Robert; Wilks, Rodney
2009-01-01
While defending the Earth against collisions with asteroids and comets has garnered increasing attention over the past few decades, our knowledge of the threats and methods of mitigation remain inadequate. There exists a considerable gap in knowledge regarding the size, composition, location, internal structure and formation of near earth asteroids and comets. Although estimates have been made, critical experiments have not yet been conducted on the effectiveness of various proposed mitigation techniques. Closing this knowledge gap is of interest to both the planetary defense and planetary science communities. Increased scientific knowledge of asteroid and comet composition and structure can confirm or advance current theories about the formation of the solar system. This proposal suggests a joint effort between these two communities to provide an economical architecture that supports multiple launches of characterization and mitigation payloads with minimal response time. The science community can use this architecture for characterization missions of opportunity when multiple scientific targets or targets of uncommon scientific value present themselves, while the planetary defense community would be able to fire characterization or mitigation payloads at targets that present a threat to the Earth. Both communities would benefit from testing potential mitigation techniques, which would reveal information on the internal structure of asteroids and comets. In return, the Earth would have the beginnings of a viable response system should an impact threat prove real in the near future.
Animal models of 'anxiety': where next?
Rodgers, R J
1997-11-01
Numerous procedures have been developed to facilitate preclinical research on the behavioural pharmacology of anxiety and, as a result of this application, are often referred to as animal models of 'anxiety'. This is an unfortunate misnomer, not only because of the apparent inability of many tests to detect novel anxiolytics consistently, but also because the term implies that anxiety is a unitary emotion. Such difficulties have arisen largely as a consequence of test development strategies which, by emphasizing pharmacological (i.e. benzodiazepine) validation, have yielded models predictive of a specific type of anxiolytic activity. The present review argues that the refinement of existing tests as well as the development of new procedures requires urgent attention to the much neglected issue of behavioural validation. From an evolutionary perspective, normal human anxiety may be conceptualized as a repertoire of defence reactions tailored to meet different forms of threats, and disorders of anxiety as the inappropriate activation or exaggeration of these usually adaptive response patterns. In this context, consideration of the defensive reactions typically observed in our animal models reveals substantially greater commonality in the behavioural effects of benzodiazepine and 5-HT1A anxiolytics than would otherwise be apparent. Therefore, with the exception of the conventional plus-maze paradigm (discussed at some length), better correspondence is seen in tests involving unconditioned response to potential threat (e.g. social interaction, distress vocalizations and light/dark exploration) than in tests of conditioned fear reactions. Even within the latter grouping, however, greater commonality is seen in procedures based on reactions to proximal threat (e.g. freezing, startle, ultrasonic vocalizations, burying) than those involving reactions to distal threat (e.g. avoidance/flight). Significantly, very similar findings have been reported in tests specifically designed to study defensive reactions (e.g. rat and mouse defence test batteries) or which incorporate a more detailed knowledge of defence into established procedures (e.g. ethological plus-maze and defensive burying paradigms). Furthermore, recent evidence also suggests that drugs with proved clinical efficacy in panic attacks/panic disorder have reliably stronger effects on flight responses than other components of the defensive repertoire. It is concluded that a focus on defensive behaviour patterns improves test validity (predictive/face/construct), offers a more rational basis for test selection in drug development programmes, and provides a firmer theoretical framework for future methodological and therapeutic advance.
2010-04-28
Base Critical Infrastructure Protection Conference (DIBCIP) “Risk Reduction & Mitigation in the Defense Industrial Base ” April 26-28, 2010...Philadelphia, PA Agenda Tuesday, April 27, 2010 Keynote Address: The Economic Crisis and Its Impact on the DIB: Defense Industrial Base Forecasts 2010...Ms. Nancy Pomerleau, Exercise Director, Partnership Outreach Division, DHS-IP DIB 2010 DIB CIP DEFENSE INDUSTRIAL BASE CRITICAL
Sarkar, Abhijit; Singh, Aditya Abha; Agrawal, Shashi Bhushan; Ahmad, Altaf; Rai, Shashi Pandey
2015-05-01
For the past few decades continuous increase in the levels of tropospheric ozone (O3) concentrations is posing to be a threat for agricultural productivity. Two high yielding tropical rice cultivars (Malviya dhan 36 and Shivani) were evaluated against different concentrations of O3 under field conditions. Experimental design included filtered chambers, non-filtered chambers having ambient O3 and 10 and 20ppb elevated O3 above the ambient. Study was conducted to assess differential response if any in induction of antioxidative defense system, genome stability, leaf proteome, yield and quality of the product in both the test cultivars. Superoxide dismutase (SOD), catalase (CAT), peroxidase (POD), ascorbate peroxidase (APX), and glutathione reductase (GR) were induced under ambient and elevated levels of O3. Native polyacrylamide gel electrophoresis (PAGE) of SOD, CAT and POD also displayed increased enzymatic activity along with associated alterations in specific isoforms. Ascorbic acid, thiols and phenolics were also stimulated at ambient and elevated O3. Structural alterations in DNA of rice plants due to O3 affecting its genome template stability (GTS) was examined using RAPD technique. 2-D PAGE revealed 25 differential spots in Malviya dhan 36 and 36 spots in Shivani after O3 treatment with reductions in RuBisCO subunits. Reductions in yield and change in the quality of grains were also noticed. Copyright © 2015 Elsevier Inc. All rights reserved.
1980-12-05
planning process. Do the positive attributes of high complexity weapons outweigh their negative qualities’ What effect does our investment in...account for the future consequences of current decisions. We advocate increased budgets because we perceive a growing threat, yet at the same time we...Defense and therefore should not be construed as reflecting an official position of the Department. Thi3 dn .,ment has been opproved for public
2010-04-01
technology centric operations such as computer network attack and computer network defense. 3 This leads to the question of whether the US military is... information and infrastructure. For the purpose of military operations, CNO are divided into CNA, CND, and computer network exploitation (CNE) enabling...of a CNA if they take undesirable action,” 21 and from a defensive stance in CND, “providing information about non-military threat to computers in
Assessment of Ukranian National Defense Policy
2012-03-09
Romanian- Slovakian-Hungarian engineer battalion “Tisa”, as a rapid reaction force with the mission of natural disaster relief in the Carpathian region...threats (Army’s multifunctional NBC protection and engineer units) and experience of their using ( Chernobyl nuclear plant in 1986, humanitarian...man-made disasters was exemplified by the 2011 nuclear catastrophe in Japan. Moreover, based on the results of the Strategic Defense Review in Ukraine
Testing of Ruggedized Antibodies within a Lateral Flow Immunoassay
2017-10-01
Roy Thompson RESEARCH AND TECHNOLOGY DIRECTORATE Kelley Betts LEIDOS Gunpowder, MD 21010-0068 Randy Hofmann EXCET, INC. Springfield, VA 22150-2519 Hsiu...average 1 h per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and...on the work performed at ECBC in collaboration with the Defense Advanced Research Projects Agency, Antibody Technology Program and the Defense Threat
Security from Within: Independent Review of the Washington Navy Yard Shooting
2013-11-01
2012 report, the Defense Science Board (DSB) Task Force reviewing the Fort Hood shooting recommended “a threat management approach employing...mental health research findings into clinical practice. 103 The field of implementation science offers several models for establishing and supporting...December 29, 2008, http://www.dhs.gov/xlibrary/assets/privacy/privacy_policyguide_2008-01.pdf. 47 Defense Science Board. “Task Force Report
Theater Missile Defenses and U.S. Foreign Policy
1992-01-01
Tactical Missile Defense Initiative, which have as primary objectives the following: (A) The development of deployable and rapidly relocatable...countries as having some form of ballistic missile. Missiles are not only growing in numbers, but also in capabilities. In an even more disturbing trend...are advantageous in that they offer a specific counter to a growing threat that has until now gone unanswered without inherently increasing the
Estimation of Critical Population Support Requirements.
1984-05-30
VA 22160 W.U. 4921H 11. CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE Federal Emergency Management Agency May 30, 1984 Industrial Protection...ensure the availability of industrial production required to support the population, maintain defense capabilities and perform command and control ...the population, maintain national defense capabilities and perform command and control activi- ties during a national emergency such as a threat of a
77 FR 271 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-04
... Threat Reduction Agency, 1680 Texas Street SE., Kirtland Air Force Base, Albuquerque, NM 87117-5669... Threat Reduction Agency, 1680 Texas Street SE., Kirtland Air Force Base, Albuquerque, NM 87117-5669...
State Defense Force Improvement Act
Rep. Wilson, Joe [R-SC-2
2009-01-06
House - 01/12/2010 Referred to the Subcommittee on Terrorism, Unconventional Threats and Capabilities. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
DOE Office of Scientific and Technical Information (OSTI.GOV)
Geelhood, Bruce D.; Wogman, Ned A.
In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear war-heads to include radiation dispersal devices (RDD) or “dirty” bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials enter-ing our borders ismore » considered. The radiation and other signatures of potential nuclear and radio-logical threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Geelhood, Bruce D.; Wogman, Ned A.
In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or ''dirty'' bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials entering our borders is considered. Themore » radiation and other signatures or potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.« less
Optimal Predator Risk Assessment by the Sonar-Jamming Arctiine Moth Bertholdia trigona
Corcoran, Aaron J.; Wagner, Ryan D.; Conner, William E.
2013-01-01
Nearly all animals face a tradeoff between seeking food and mates and avoiding predation. Optimal escape theory holds that an animal confronted with a predator should only flee when benefits of flight (increased survival) outweigh the costs (energetic costs, lost foraging time, etc.). We propose a model for prey risk assessment based on the predator's stage of attack. Risk level should increase rapidly from when the predator detects the prey to when it commits to the attack. We tested this hypothesis using a predator – the echolocating bat – whose active biosonar reveals its stage of attack. We used a prey defense – clicking used for sonar jamming by the tiger moth Bertholdia trigona– that can be readily studied in the field and laboratory and is enacted simultaneously with evasive flight. We predicted that prey employ defenses soon after being detected and targeted, and that prey defensive thresholds discriminate between legitimate predatory threats and false threats where a nearby prey is attacked. Laboratory and field experiments using playbacks of ultrasound signals and naturally behaving bats, respectively, confirmed our predictions. Moths clicked soon after bats detected and targeted them. Also, B. trigona clicking thresholds closely matched predicted optimal thresholds for discriminating legitimate and false predator threats for bats using search and approach phase echolocation – the period when bats are searching for and assessing prey. To our knowledge, this is the first quantitative study to correlate the sensory stimuli that trigger defensive behaviors with measurements of signals provided by predators during natural attacks in the field. We propose theoretical models for explaining prey risk assessment depending on the availability of cues that reveal a predator's stage of attack. PMID:23671686
Secured network sensor-based defense system
NASA Astrophysics Data System (ADS)
Wei, Sixiao; Shen, Dan; Ge, Linqiang; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe
2015-05-01
Network sensor-based defense (NSD) systems have been widely used to defend against cyber threats. Nonetheless, if the adversary finds ways to identify the location of monitor sensors, the effectiveness of NSD systems can be reduced. In this paper, we propose both temporal and spatial perturbation based defense mechanisms to secure NSD systems and make the monitor sensor invisible to the adversary. The temporal-perturbation based defense manipulates the timing information of published data so that the probability of successfully recognizing monitor sensors can be reduced. The spatial-perturbation based defense dynamically redeploys monitor sensors in the network so that the adversary cannot obtain the complete information to recognize all of the monitor sensors. We carried out experiments using real-world traffic traces to evaluate the effectiveness of our proposed defense mechanisms. Our data shows that our proposed defense mechanisms can reduce the attack accuracy of recognizing detection sensors.
The Forgotten Tundra: America’s Greatest Terrorist Threat
2013-02-15
threats that use Canada’s progressive immigration laws as a means of furthering their cause. Each year Canada accepts over 260,000 new immigrants to its...system, immigration laws , infrequent prosecutions and light sentences had turned the country into “a favored destination for terrorists”.10 In a 2003...other federal, state, local and tribal law enforcement entities along the northern border. These law enforcement officers form a layered defense
HIV/AIDS: A Nontraditional Security Threat for AFRICOM
2008-05-22
Infectious Disease Threat, estimates, “Sub-Saharan Africa will remain the region most affected by the global infectious disease phenomenon--accounting for...nearly one-half of infectious disease-caused deaths worldwide.”24 Elbe notes that these estimates were provided by the U.S. Defense Intelligence...national security of those states because, “military organizations are anchors of for Economics and Global Issues, NIE 99-17D, “The Global Infectiou
Recommended E3 HEMP Heave Electric Field Waveform for the Critical Infrastructures. Volume 2
2017-07-31
OF THE COMMISSION TO ASSESS THE THREAT TO THE UNITED STATES FROM ELECTROMAGNETIC PULSE (EMP) ATTACK The cover photo depicts Fishbowl Starfish...Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack. The Commission was established by Congress in the FY2001 National...Department of Defense E electric field EMP electromagnetic pulse EPRI Electric Power Research Institute FERC Federal Energy Regulatory Commission GMD
Strategic Changes for the Fire Service in the Post - 9/11 Era
2007-09-01
or position of the Department of Defense or the U.S. Government. 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release...failed networks disrupted–that have been achieved, our strategic position continues to slip. The ideology of jihad is spreading. A new generation of...not take the threat seriously. The global jihadist threat, personified by al Qaeda, has demonstrated that it is determined, unwavering, and patient
Kessels, Loes T E; Ruiter, Robert A C; Jansma, Bernadette M
2010-07-01
Previous studies indicate that people respond defensively to threatening health information, especially when the information challenges self-relevant goals. The authors investigated whether reduced acceptance of self-relevant health risk information is already visible in early attention processes, that is, attention disengagement processes. In a randomized, controlled trial with 29 smoking and nonsmoking students, a variant of Posner's cueing task was used in combination with the high-temporal resolution method of event-related brain potentials (ERPs). Reaction times and P300 ERP. Smokers showed lower P300 amplitudes in response to high- as opposed to low-threat invalid trials when moving their attention to a target in the opposite visual field, indicating more efficient attention disengagement processes. Furthermore, both smokers and nonsmokers showed increased P300 amplitudes in response to the presentation of high- as opposed to low-threat valid trials, indicating threat-induced attention-capturing processes. Reaction time measures did not support the ERP data, indicating that the ERP measure can be extremely informative to measure low-level attention biases in health communication. The findings provide the first neuroscientific support for the hypothesis that threatening health information causes more efficient disengagement among those for whom the health threat is self-relevant. PsycINFO Database Record (c) 2010 APA, all rights reserved.
Why Nuclear Forensics Needs New Plasma Chemistry Data
NASA Astrophysics Data System (ADS)
Rose, T.; Armstrong, M.; Chernov, A.; Crowhurst, J.; Dai, Z.; Knight, K.; Koroglu, B.; Radousky, H.; Stavrou, E.; Weisz, D.; Zaug, J.; Azer, M.; Finko, M.; Curreli, D.
2016-10-01
The mechanisms that control the distribution of radionuclides in fallout after a nuclear detonation are not adequately constrained. Current capabilities for assessing post-detonation scenarios often rely on empirical observations and approximations. Deeper insight into chemical condensation requires a coupled experimental, theoretical, and modeling approach. The behavior of uranium during plasma condensation is perplexing. Two independent methods are being developed to investigate gas phase uranium chemistry and speciation during plasma condensation: (1) laser-induced breakdown spectroscopy and (2) a unique steady-state ICP flow reactor. Both methods use laser absorption spectroscopy to obtain in situ data for vapor phase molecular species as they form. We are developing a kinetic model to describe the relative abundance of uranium species in the evolving plasma. Characterization of the uranium-oxygen system will be followed by other chemical components, including `carrier' materials such as silica. The goal is to develop a semi-empirical model to describe the chemical fractionation of uranium during fallout formation. Prepared by LLNL under Contract DE-AC52-07NA27344. This project was sponsored in part by the Department of the Defense, Defense Threat Reduction Agency, under Grant Number HDTRA1-16-1-0020.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wetovsky, Marvin A.; Patterson, Eileen F.; Sandoval, Marisa N.
These proceedings contain papers prepared for the Monitoring Research Review 2011: Ground-Based Nuclear Explosion Monitoring Technologies, held 13-15 September, 2011 in Tucson, Arizona. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO), National Science Foundation (NSF), and other invited sponsors. The scientific objectives of the research are to improve the United States' capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is tomore » provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.« less
Experimental Investigation of Molecular Species Formation in Metal Plasmas During Laser Ablation
NASA Astrophysics Data System (ADS)
Radousky, H.; Crowhurst, J.; Rose, T.; Armstrong, M.; Stavrou, E.; Zaug, J.; Weisz, D.; Azer, M.; Finko, M.; Curreli, D.
2016-10-01
Atomic and molecular spectra on metal plasmas generated by laser ablation have been measured using single, nominally 6-7 ns pulses at 1064 nm, and with energies less than 50 mJ. The primary goal for these studies is to constrain the physical and chemical mechanisms that control the distribution of radionuclides in fallout after a nuclear detonation. In this work, laser emission spectroscopy was used to obtain in situdata for vapor phase molecular species as they form in a controlled oxygen atmosphere for a variety of metals such as Fe, Al, as well as preliminary results for U. In particular, the ablation plumes created from these metals have been imaged with a resolution of 10 ns, and it is possible to observe the expansion of the plume out to 0.5 us. These data serve as one set of inputs for a semi-empirical model to describe the chemical fractionation of uranium during fallout formation. Prepared by LLNL under Contract DE-AC52-07NA27344. This project was sponsored by the Department of the Defense, Defense Threat Reduction Agency, under Grant Number HDTRA1-16-1-0020.
Niermann, Hannah C M; Figner, Bernd; Tyborowska, Anna; van Peer, Jacobien M; Cillessen, Antonius H N; Roelofs, Karin
2017-08-01
The Hypothalamic-Pituitary-Adrenal (HPA)-axis plays an important role in the expression of defensive freezing. Adaptive freezing reactivity, characterized by an immediate increase in acute stress and timely termination upon threat offset or need to act, is essential for adequate stress coping. Blunted HPA-axis activity in animals is associated with blunted freezing reactivity and internalizing symptoms. Despite their potential relevance, it remains unknown whether these mechanisms apply to humans and human psychopathology. Using a well-established method combining electrocardiography and posturography, we assessed freezing before, immediately after, and one hour after a stress induction in 92 human adolescents. In line with animal models, human adolescents showed stress-induced freezing, as quantified by relative reductions in heart rate and body sway after, as compared to before, stress. Moreover, relatively lower basal cortisol was associated with reduced stress-induced freezing reactivity (i.e., less immediate freezing and less recovery). Path analyses showed that decreased freezing recovery in individuals with reduced cortisol levels was associated with increased levels of internalizing symptoms. These findings suggest that reduced freezing recovery may be a promising marker for the etiology of internalizing symptoms. Copyright © 2017 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chavez, Francesca C.; Mendius, E. Louise
These proceedings contain papers prepared for the 25th Seismic Research Review -- Nuclear Explosion Monitoring: Building the Knowledge Base, held 23-25 September, 2003 in Tucson, Arizona. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as wellmore » as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.« less
Proceedings of the 26th Seismic Research Review: Trends in Nuclear Explosion Monitoring
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chavez, Francesca C; Benson, Jody; Hanson, Stephanie
These proceedings contain papers prepared for the 26th Seismic Research Review: Trends in Nuclear Explosion Monitoring, held 21-23 September, 2004 in Orlando, Florida. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users,more » an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.« less
Looming animate and inanimate threats: the response of the amygdala and periaqueductal gray.
Coker-Appiah, Dionne S; White, Stuart F; Clanton, Roberta; Yang, Jiongjong; Martin, Alex; Blair, R J R
2013-01-01
Looming stimuli are processed as threatening and activate basic neural defense systems. However, it is unclear how animacy information modulates this response. Participants (N = 25) viewed threatening or neutral images that were either animate (animals) or inanimate (objects) and which either approached (loomed) or receded from the participant. The amygdala was responsive to emotional, animacy, and looming information (particularly to looming threats and looming animate stimuli). Periaqueductal gray was also sensitive to emotional information and particularly responsive to looming threats. The data are interpreted within category-specific models of the amygdala and temporal cortex.
Digital tripwire: a small automated human detection system
NASA Astrophysics Data System (ADS)
Fischer, Amber D.; Redd, Emmett; Younger, A. Steven
2009-05-01
A low cost, lightweight, easily deployable imaging sensor that can dependably discriminate threats from other activities within its field of view and, only then, alert the distant duty officer by transmitting a visual confirmation of the threat would provide a valuable asset to modern defense. At present, current solutions suffer from a multitude of deficiencies - size, cost, power endurance, but most notably, an inability to assess an image and conclude that it contains a threat. The human attention span cannot maintain critical surveillance over banks of displays constantly conveying such images from the field. DigitalTripwire is a small, self-contained, automated human-detection system capable of running for 1-5 days on two AA batteries. To achieve such long endurance, the DigitalTripwire system utilizes an FPGA designed with sleep functionality. The system uses robust vision algorithms, such as a partially unsupervised innovative backgroundmodeling algorithm, which employ several data reduction strategies to operate in real-time, and achieve high detection rates. When it detects human activity, either mounted or dismounted, it sends an alert including images to notify the command center. In this paper, we describe the hardware and software design of the DigitalTripwire system. In addition, we provide detection and false alarm rates across several challenging data sets demonstrating the performance of the vision algorithms in autonomously analyzing the video stream and classifying moving objects into four primary categories - dismounted human, vehicle, non-human, or unknown. Performance results across several challenging data sets are provided.
Richter, Jan; Hamm, Alfons O; Pané-Farré, Christiane A; Gerlach, Alexander L; Gloster, Andrew T; Wittchen, Hans-Ulrich; Lang, Thomas; Alpers, Georg W; Helbig-Lang, Sylvia; Deckert, Jürgen; Fydrich, Thomas; Fehm, Lydia; Ströhle, Andreas; Kircher, Tilo; Arolt, Volker
2012-09-15
The learning perspective of panic disorder distinguishes between acute panic and anxious apprehension as distinct emotional states. Following animal models, these clinical entities reflect different stages of defensive reactivity depending upon the imminence of interoceptive or exteroceptive threat cues. The current study tested this model by investigating the dynamics of defensive reactivity in a large group of patients with panic disorder and agoraphobia (PD/AG). Three hundred forty-five PD/AG patients participated in a standardized behavioral avoidance test (being entrapped in a small, dark chamber for 10 minutes). Defense reactivity was assessed measuring avoidance and escape behavior, self-reports of anxiety and panic symptoms, autonomic arousal (heart rate and skin conductance), and potentiation of the startle reflex before and during exposure of the behavioral avoidance test. Panic disorder and agoraphobia patients differed substantially in their defensive reactivity. While 31.6% of the patients showed strong anxious apprehension during this task (as indexed by increased reports of anxiety, elevated physiological arousal, and startle potentiation), 20.9% of the patients escaped from the test chamber. Active escape was initiated at the peak of the autonomic surge accompanied by an inhibition of the startle response as predicted by the animal model. These physiological responses resembled the pattern observed during the 34 reported panic attacks. We found evidence that defensive reactivity in PD/AG patients is dynamically organized ranging from anxious apprehension to panic with increasing proximity of interoceptive threat. These data support the learning perspective of panic disorder. Copyright © 2012 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.
Commercial-Aircraft Protection System
NASA Astrophysics Data System (ADS)
Case, Russell L., Jr.; Wolff, Peter H.
2004-09-01
Recent world events have identified needs for a commercial aircraft defense system against Man-Portable Air Defense Systems (MANPADS), such as SA-7 and Stinger shoulder launched surface-to-air missiles. Technical challenges include target detection, identification and countermeasures. Political and societal challenges include cost, time to deployment, ground and air safety, and reliability. These challenges, as well as many others, have been met and overcome with the development of Thor Systems' Commercial-Aircraft Protection System (C-APS). C-APS makes use of commercial technology such as radar and infrared sensors with a laser-based countermeasure. Unlike adapted military systems, C-APS detects the threat long before the military versions by employing a 360 degree hemispherical scan, identifying the threat with an infrared sensor and employing a directed laser to not only deflect the target but to permanently disable its seeker. Enhanced capabilities include multiple threat elimination and closed-loop technology for kill verification. All of this is accomplished with development costs less than half that required to convert military technology, manufacturing costs significantly less than competitive products, and a maintenance cycle coincident with standard FAA requirements, which are significantly longer than current systems.
Learning to Adapt to Asymmetric Threats
2005-08-01
College, Carlisle, PA, September 2003. Book, Howard, “Gauge your Awareness,” Inside the Mind of the Leader, January 2004, pp. 32 Bourke , Canice...biblio/b-explrn.htm, February 8, 2005. Lambakis, Steven J., “Reconsidering Asymmetric Warfare,” JFQ, issue 36, Spring 2005. Latour, Sharon M., (USAF...Sword: What if Sun Tzu and John Boyd did a National Defense Review?,” Washington, DC, Center for Defense Information, February 2003. Riedel, Sharon L
Passive automatic anti-piracy defense system of ships
NASA Astrophysics Data System (ADS)
Szustakowski, M.; Życzkowski, M.; Ciurapiński, W.; Karol, M.; Kastek, M.; Stachowiak, R.; Markowski, P.
2013-10-01
The article describes the technological solution for ship self-defense against pirate attacks. The paper presents the design solutions in the field of direct physical protection. All the solutions are connected with the latest optoelectronic and microwave systems and sensors to detect, recognize and the threat posed by pirates. In particular, tests of effectiveness and the detection-range of technology demonstrator developed by a team of authors were carried out.
Strategy to Improve Naval Shipbuilding Industry Self-Reliance in Indonesia
2017-12-01
investment in the defense industry sector. As the biggest archipelagic country in the world, Indonesia’s demand for maritime technology is high . It...the growth of the maritime industry around the country. However, the naval shipbuilding industry carries high risk and requires high capital for...the high threat level with the region, India and South Korea give more attention to national security by providing a higher budget for defense
Arms and alliance in Japanese public opinion
DOE Office of Scientific and Technical Information (OSTI.GOV)
Umemoto, T.
1985-01-01
This thesis analyzes the transformation of Japanese public opinion concerning the nation's security posture during the past decade. Until the early 1970s, the peculiar strength of a neutralist-pacifist outlook among the Japanese people, which arose in large part from the absence of a serious external threat severely encumbered Tokyo's defense efforts in the context of the alliance with the United States. In particular, such state of domestic opinion gave rise to what the author has elected to call the institutionalized constraints - limitations deriving from constitutional interpretation, the Three Non-Nuclear Principles, and the Three Principles on Weapons Exports - onmore » the scope of such endeavors. It moreover prepared the condition for the Government's adoption of restrictive military buildup policies in the National Defense Program Outline. Over the past decade, however, as Japan's security environment has deteriorated with the growth of the putative Soviet threat, and as the United States and China have come to expect greater Japanese defense efforts, the climate of opinion within Japan has gradually shifted in favor of a security posture based on the Mutual Security Treaty (MST) and the Self-Defense Forces (SDFs). Opinion polls have come to indicate solid popular approval of maintenance of armament and participation in alliance.« less
Electrical Potential of Leaping Eels.
Catania, Kenneth C
2017-01-01
When approached by a large, partially submerged conductor, electric eels (Electrophorus electricus) will often defend themselves by leaping from the water to directly shock the threat. Presumably, the conductor is interpreted as an approaching terrestrial or semiaquatic animal. In the course of this defensive behavior, eels first make direct contact with their lower jaw and then rapidly emerge from the water, ascending the conductor while discharging high-voltage volleys. In this study, the equivalent circuit that develops during this behavior was proposed and investigated. First, the electromotive force and internal resistance of four electric eels were determined. These values were then used to estimate the resistance of the water volume between the eel and the conductor by making direct measurements of current with the eel and water in the circuit. The resistance of the return path from the eel's lower jaw to the main body of water was then determined, based on voltage recordings, for each electric eel at the height of the defensive leap. Finally, the addition of a hypothetical target for the leaping defense was considered as part of the circuit. The results suggest the defensive behavior efficiently directs electrical current through the threat, producing an aversive and deterring experience by activating afferents in potential predators. © 2017 The Author(s) Published by S. Karger AG, Basel.
NASA Astrophysics Data System (ADS)
Zhang, Ju; Jackson, Thomas; Balachandar, Sivaramakrishnan
2015-06-01
We will develop a computational model built upon our verified and validated in-house SDT code to provide improved description of the multiphase blast wave dynamics where solid particles are considered deformable and can even undergo phase transitions. Our SDT computational framework includes a reactive compressible flow solver with sophisticated material interface tracking capability and realistic equation of state (EOS) such as Mie-Gruneisen EOS for multiphase flow modeling. The behavior of diffuse interface models by Shukla et al. (2010) and Tiwari et al. (2013) at different shock impedance ratio will be first examined and characterized. The recent constrained interface reinitialization by Shukla (2014) will then be developed to examine if conservation property can be improved. This work was supported in part by the U.S. Department of Energy and by the Defense Threat Reduction Agency.
Implementation of the International Health Regulations (2005) Through Cooperative Bioengagement
Standley, Claire J.; Sorrell, Erin M.; Kornblet, Sarah; Fischer, Julie E.; Katz, Rebecca
2015-01-01
Cooperative bioengagement efforts, as practiced by U.S. government-funded entities, such as the Defense Threat Reduction Agency’s Cooperative Biological Engagement Program, the State Department’s Biosecurity Engagement Program, and parallel programs in other countries, exist at the nexus between public health and security. These programs have an explicit emphasis on developing projects that address the priorities of the partner country as well as the donor. While the objectives of cooperative bioengagement programs focus on reducing the potential for accidental or intentional misuse and/or release of dangerous biological agents, many partner countries are interested in bioengagement as a means to improve basic public health capacities. This article examines the extent to which cooperative bioengagement projects address public health capacity building under the revised International Health Regulations and alignment with the Global Health Security Agenda action packages. PMID:26528463
NASA Astrophysics Data System (ADS)
Weatherford, Charles; Gebremedhin, Daniel
2016-03-01
A new and efficient way of evolving a solution to an ordinary differential equation is presented. A finite element method is used where we expand in a convenient local basis set of functions that enforce both function and first derivative continuity across the boundaries of each element. We also implement an adaptive step size choice for each element that is based on a Taylor series expansion. The method is applied to solve for the eigenpairs of the one-dimensional soft-coulomb potential and the hard-coulomb limit is studied. The method is then used to calculate a numerical solution of the Kohn-Sham differential equation within the local density approximation is presented and is applied to the helium atom. Supported by the National Nuclear Security Agency, the Nuclear Regulatory Commission, and the Defense Threat Reduction Agency.
Characterization of PM2.5 Dust Emissions from Training/Testing Range Operations
2008-08-01
impaction on vegetation, terrain irregularities, and other surfaces. However, the observed decrease in concentration at 2 m can be due to dispersion or...Mock Urban Setting Test (MUST), an atmospheric dispersion test funded by the Defense Threat Reduction Agency. 14, 15 The site was located at 1310 m...400 mesh powder (< 38 μm) fraction, and dispersed into a laboratory resuspension chamber with size‐selective filter outlets to generate filters for
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kips, Ruth; Lindvall, Rachel; Eppich, Gary
Representatives from the U.S. Department of Energy’s Office of Nuclear Smuggling Detection and Deterrence (NSDD) visited the Kazakhstan Institute of Nuclear Physics (INP) to discuss the results and conclusions of a joint sample analysis (CUP-2 uranium ore concentrate) between LLNL, INP and the Japan Atomic Energy Agency (JAEA) (Fig. 1). The U.S. delegation also met with the newly-appointed Director-General of the INP (S. Sakhiyev) who expressed his continued support for this collaboration. On the last day of the visit, the delegation toured the new medical isotope production facilities (which is expected to begin operation in a few months), as wellmore » as INP’s Nuclear Security Training Center (co-funded by DOE, the Defense Threat Reduction Initiative (DTRA) and the Kazakhstan government). Construction of the Nuclear Security Training Center is expected to be completed by the end of 2016.« less
Nano/micromotors for security/defense applications. A review.
Singh, Virendra V; Wang, Joseph
2015-12-14
The new capabilities of man-made micro/nanomotors open up considerable opportunities for diverse security and defense applications. This review highlights new micromotor-based strategies for enhanced security monitoring and detoxification of chemical and biological warfare agents (CBWA). The movement of receptor-functionalized nanomotors offers great potential for sensing and isolating target bio-threats from complex samples. New mobile reactive materials based on zeolite or activated carbon offer considerable promise for the accelerated removal of chemical warfare agents. A wide range of proof-of-concept motor-based approaches, including the detection and destruction of anthrax spores, 'on-off' nerve-agent detection or effective neutralization of chemical warfare agents have thus been demonstrated. The propulsion of micromotors and their corresponding bubble tails impart significant mixing that greatly accelerates such detoxification processes. These nanomotors will thus empower sensing and destruction where stirring large quantities of decontaminating reagents and controlled mechanical agitation are impossible or undesired. New technological breakthroughs and greater sophistication of micro/nanoscale machines will lead to rapid translation of the micromotor research activity into practical defense applications, addressing the escalating threat of CBWA.
Nano/micromotors for security/defense applications. A review
NASA Astrophysics Data System (ADS)
Singh, Virendra V.; Wang, Joseph
2015-11-01
The new capabilities of man-made micro/nanomotors open up considerable opportunities for diverse security and defense applications. This review highlights new micromotor-based strategies for enhanced security monitoring and detoxification of chemical and biological warfare agents (CBWA). The movement of receptor-functionalized nanomotors offers great potential for sensing and isolating target bio-threats from complex samples. New mobile reactive materials based on zeolite or activated carbon offer considerable promise for the accelerated removal of chemical warfare agents. A wide range of proof-of-concept motor-based approaches, including the detection and destruction of anthrax spores, `on-off' nerve-agent detection or effective neutralization of chemical warfare agents have thus been demonstrated. The propulsion of micromotors and their corresponding bubble tails impart significant mixing that greatly accelerates such detoxification processes. These nanomotors will thus empower sensing and destruction where stirring large quantities of decontaminating reagents and controlled mechanical agitation are impossible or undesired. New technological breakthroughs and greater sophistication of micro/nanoscale machines will lead to rapid translation of the micromotor research activity into practical defense applications, addressing the escalating threat of CBWA.
Turkey’s Response to Threats of Weapons of Mass Destruction
2001-12-01
categories of unconventional weapons and was prepared to invest enormous financial and human resources to achieve this goal. 5 Iraqi attempts to seek...Ministry of Defense White Paper of 2001 defines “Religious Fundementalism ” among the internal threats directed against Turkey’s security in the post...Therefore, Syria will likely continue to develop an extensive chemical and biological weapons arsenal and will also invest in upgrading the accuracy of
The Russian Perception of the NATO Aerospace Threat: Could It Lead to Preemption
2016-09-01
64 | Air & Space Power Journal The Russian Perception of the NATO Aerospace Threat Could It Lead to Preemption? Lt Col Thomas R. McCabe, USAFR...authoritative Russian military writings and spokesmen have repeatedly declared that the aerospace sphere, where air and space combine into a single...air and space capability, especially its airfields, aircraft, and aerospace defenses.36 Another key objective, as previously noted, may be a
2008-05-22
2-4 to 2-5. 15 Gregory Fontenot, “Seeing Red: Building a Red Team Capability for the Blue Force,” Military Review 85, no. 5 (2005): 7. 5 U.S...44 Slim, 551. 45 Ronald Lewin, Slim: The Standardbearer (London: Leo Cooper, Ltd.; Octopus Publishing Group, 1976), 79. Lewin notes...protecting his regime against other opportunistic external and internal threats.168 The result of Saddam’s threat analysis was his “ ring ” defense
Ship Underwater Threat Response System (SUTRS): A Feasibility Study of Organic Mine Point-Defense
2012-09-01
by implementing and testing the design until a final product has been established that addresses (and has been traced throughout to) the...The assumptions used to evaluate those TPMs are as follows: • The threshold Probability of Success for the total system should be 90% survival...Threat Response System xviii TOA Table of Allowance TPM Technical Performance Measures TTP Tactics Techniques and Procedures U.S. United
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.
2013-02-01
On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-artmore » work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.« less
The Warning System in Disaster Situations: A Selective Analysis.
DISASTERS, *WARNING SYSTEMS), CIVIL DEFENSE, SOCIAL PSYCHOLOGY, REACTION(PSYCHOLOGY), FACTOR ANALYSIS, CLASSIFICATION, STATISTICAL DATA, TIME ... MANAGEMENT PLANNING AND CONTROL, DAMAGE, CONTROL SYSTEMS, THREAT EVALUATION, DECISION MAKING, DATA PROCESSING, COMMUNICATION SYSTEMS, NUCLEAR EXPLOSIONS
Countering MANPADS: study of new concepts and applications
NASA Astrophysics Data System (ADS)
Maltese, Dominique; Robineau, Jacques; Audren, Jean-Thierry; Aragones, Julien; Sailliot, Christophe
2006-05-01
The latest events of ground-to-air Man Portable Air Defense (MANPAD) attacks against aircraft have revealed a new threat both for military and civilian aircraft. Consequently, the implementation of Protecting systems (i.e. Directed InfraRed Counter Measure - DIRCM) in order to face IR guided missiles turns out to be now inevitable. In a near future, aircraft will have to possess detection, tracking, targeting and jamming capabilities to face single and multiple MANPAD threats fired in short-range scenarios from various environments (urban sites, landscape...). In this paper, a practical example of a DIRCM system under study at SAGEM DEFENSE & SECURITY company is presented. The self-protection solution includes built-in and automatic locking-on, tracking, identification and laser jamming capabilities, including defeat assessment. Target Designations are provided by a Missile Warning System. Multiple Target scenarios have been considered to design the system architecture. The article deals with current and future threats (IR seekers of different generations...), scenarios and platforms for system definition. Plus, it stresses on self-protection solutions based on laser jamming capability. Different strategies including target identification, multi band laser, active imagery are described. The self-protection system under study at SAGEM DEFENSE & SECURITY company is also a part of this chapter. Eventually, results of self-protection scenarios are provided for different MANPAD scenarios. Data have been obtained from a simulation software. The results highlight how the system reacts to incoming IR-guided missiles in short time scenarios.
1981-01-19
a " high -low" mix of high performance ...meet the common threat. 86 Considerable progress is being made. Last year, Japanese ships and aircraft performed very capably in a joint naval exercise... high school graduates, however, does not mean that a high school diploma is necessarily a predictor of on-the-job performance in the military.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Antolak, Arlyn J.
Particle accelerators play a key role in a broad set of defense and security applications including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat for developing a radiological dispersal device and be used to produce isotopes for medical, industrial, and re-search purposes. Lastly, we present an overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security.
2003-09-01
armor would provide both individual and commander a continuous medical status report. Edible vaccines genetically engineered into food could deliver...Defense economic opportunities; transition from the familiar Cold War threat to one that is non-nodal, more pervasive, and often nonstate, nonde...The Role of Technology in Transformation The military that was developed to fight the Cold War in a bi- polar world must transform to meet current and
Rep. Connolly, Gerald E. [D-VA-11
2009-07-24
House - 01/12/2010 Referred to the Subcommittee on Terrorism, Unconventional Threats and Capabilities. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Implicit self-esteem compensation: automatic threat defense.
Rudman, Laurie A; Dohn, Matthew C; Fairchild, Kimberly
2007-11-01
Four experiments demonstrated implicit self-esteem compensation (ISEC) in response to threats involving gender identity (Experiment 1), implicit racism (Experiment 2), and social rejection (Experiments 3-4). Under conditions in which people might be expected to suffer a blow to self-worth, they instead showed high scores on 2 implicit self-esteem measures. There was no comparable effect on explicit self-esteem. However, ISEC was eliminated following self-affirmation (Experiment 3). Furthermore, threat manipulations increased automatic intergroup bias, but ISEC mediated these relationships (Experiments 2-3). Thus, a process that serves as damage control for the self may have negative social consequences. Finally, pretest anxiety mediated the relationship between threat and ISEC (Experiment 3), whereas ISEC negatively predicted anxiety among high-threat participants (Experiment 4), suggesting that ISEC may function to regulate anxiety. The implications of these findings for automatic emotion regulation, intergroup bias, and implicit self-esteem measures are discussed. (c) 2007 APA, all rights reserved.
Shoulder Launched Missiles (A.K.A. MANPADS): The Ominous Threat to Commercial Aviation
2006-12-01
global trade and just-in-time delivery, along with its leadership status in the world’s largest industry , travel and tourism , make it even more...vulnerability to shoulder launched missiles, also known as MANPADS (Man Portable Air Defense Systems). This industry sustains the flow of goods...that “a credible threat to the viability of America’s commercial airline industry could have profound effects on the nation’s economy and on
Defense.gov - Special Report: Travels with Gates
learned in its crackdown against a leftist insurgency and drug-trafficking cartels, provides a model for Caribbean Basin Security Initiative aimed at curbing drug trafficking and other trans-border threats. Story
Defense.gov - Special Report: Travels with Gates
Mexico City to strengthen the U.S.-Mexico military partnership in the fight against drug cartels there the Mexican government fight drug-trafficking cartels and other security threats. Secretary of State
Griebel, G; Rodgers, R J; Perrault, G; Sanger, D J
1999-05-01
Compounds varying in selectivity as 5-HT1A receptor antagonists have recently been reported to produce anxiolytic-like effects comparable to those of benzodiazepines in the mouse elevated plus-maze procedure. In view of the potential clinical significance of these findings, the present experiments compared the behavioural effects of diazepam (0.5-3.0 mg/kg) with those of several non-selective 5-HT1A receptor antagonists [NAN-190, 0.1-3.0 mg/kg, MM-77, 0.03-1.0 mg/kg, (S)-UH-301, 0.3-3.0 mg/kg and pindobind-5-HT1A, 0.03-1.0 mg/kg], and three selective 5-HT1A receptor antagonists (WAY100635, 0.01-3.0 mg/kg, p-MPPI, 0.1-3.0 mg/kg and SL88.0338, 0.3-3.0 mg/kg) in the mouse defence test battery (MDTB). In this well-validated anxiolytic screening test, Swiss mice are directly confronted with a natural threat (a rat) as well as situations associated with this threat. Primary measures taken during and after rat confrontation were flight, risk assessment (RA), defensive threat/attack and escape attempts. Diazepam significantly decreased flight reactions after the rat was introduced into the runway, reduced RA activities of mice chased by the rat, increased RA responses displayed when subjects were constrained in a straight alley and reduced defensive upright postures and biting upon forced contact. All the selective 5-HT1A receptor antagonists and NAN-190 also reduced flight, RA in the chase test, and defensive threat and attack behaviours. (S)-UH-301 and pindobind-5-HT1A reduced RA in the chase test, but only partially modified defensive threat and attack. Unlike the other drugs tested, MM-77 produced significant effects only at doses which also markedly reduced spontaneous locomotor activity, suggesting a behaviourally non-specific action. In contrast to diazepam, the 5-HT1A receptor ligands failed to affect RA in the straight alley test. Following removal of the rat from the test area, only diazepam and (S)-UH-301 reduced escape behaviour (contextual defence) at doses which did not decrease locomotion. Overall, the present findings indicate that except for one RA behaviour and escape responses, the 5-HT1A receptor ligands studied modified the same defensive behaviours as diazepam, suggesting potential therapeutic efficacy in the management of anxiety disorders. However, the magnitude of the effects of the 5-HT1A compounds on defence was generally smaller than that of the benzodiazepine. As all of the 5-HT1A compounds tested in this series share antagonistic activity in models of postsynaptic 5-HT1A receptor function, it is proposed that this action accounts for their effects on defence.
2016-02-16
for future threats and challenges. In the Ground Based Missile Warning and Space Surveillance mission set, this means developing...Warning and Space Surveillance for North America .43 For 45 years, Clear AFS was solely an Active Duty remote assignment. That was up until 2006 when the ...National Guard and Homeland Defense activities. § 901 provides a definition for the term “homeland defense activity” and it
Active-passive bistatic surveillance for long range air defense
NASA Astrophysics Data System (ADS)
Wardrop, B.; Molyneux-Berry, M. R. B.
1992-06-01
A hypothetical mobile support receiver capable of working within existing and future air defense networks as a means to maintain essential surveillance functions is considered. It is shown how multibeam receiver architecture supported by digital signal processing can substantially improve surveillance performance against chaff and jamming threats. A dual-mode support receiver concept is proposed which is based on the state-of-the-art phased-array technology, modular processing in industry standard hardware and existing networks.
The Aegis BMD Global Enterprise: A High End Maritime Partnership
2016-04-13
have been dealing with ballistic-missile defense through the alliance’s Active Layered Theatre Ballistic Missile Defence (ALTBMD) program and, since...Defense Agency (MDA) budgets.18 The twenty-fifth test— designated Flight Test Mission (FTM) 15—occurred on 15 April 2011, when the MDA conducted the...original design , which focused on short- and medium-range threats. The LV-2 had flown in two previous BMD live-fire tests but had not been hit—until FTM
Sustaining and Enhancing the US Militarys Technology Edge
2016-01-01
www.congress . gov /bill/114th-congress/house-bill/1735/text. 14. Michael J. Sullivan, Defense Acquisitions: Observations on Whether or Not the Service Chief...Washington, DC: Gov - ernment Accountability Office, May 2010), http://www.gao.gov/new.items/d10522.pdf. 16. The first offset refers to the threat of massive...Defense Advanced Research Projects Agency and previously as a general counsel at NASA and as an USAF judge advocate. He explained the history of
America Promises to Come Back: Our New National Security Strategy
1991-10-23
Captain Larry Seaquist, U.S. Navy, Office of the Principal Deputy Under Secretary of Defense (Strategy and Resources); Vice Admiral James Service...to be primarily based on U.S. forces in being. Under the new national security strategy, deterrence of the Soviet threat will largely be based upon a...Cheney’s IISS remarks were followed by I. Lewis "Scooter" Libby, Principal Deputy Under Secretary of Defense (Strategy and Resources), who provided
Self-Affirmation Theory and Performance Feedback: When Scoring High Makes You Feel Low.
Velez, John A; Hanus, Michael D
2016-12-01
Video games have a wide variety of benefits for players. The current study examines how video games can also increase players' willingness to internalize important but threatening self-information. Research suggests that negative information regarding a valued self-image evokes defensive strategies aimed at dismissing or discrediting the source of information. Self-Affirmation Theory proposes that affirming or bolstering an important self-image unrelated to the previous threat can be an effective strategy for reducing defensiveness. Participants in the current study completed a fictitious intelligence test and received negative or no feedback, followed by 15 minutes of video game play that resulted in positive or no feedback. Results suggest that participants who valued video game success as part of their identity exhibited less defensive strategies in the form of increased test credibility ratings and lower self-perceptions of intelligence. This suggests that performing well on a video game is an affirmational resource for players whose identities are contingent upon such success. However, results also indicate that players who did not value video game success but received positive video game feedback exhibited more defensive reactions to the negative intelligence test feedback. This suggests that while players who value video game success as part of their identity may reap benefits from video game play after a self-threat, those who do not value such success may experience more harmful effects.
To authorize the Secretary of Defense to establish a fellowship program regarding neuroscience.
Rep. Sestak, Joe [D-PA-7
2009-03-16
House - 05/22/2009 Referred to the Subcommittee on Terrorism, Unconventional Threats and Capabilities. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Missile Defense: A New Media Campaign
2002-04-09
plan is inadequate for engendering support for deploying a BMD system. This paper will focus on a new marketing strategy and plan. The arguments of opponents of MD, the threat, and a new strategy will all be discussed.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-05
... flexibility and responsiveness to meet today's evolving world conditions and threats to national defense and security. The PEIS will analyze the proposed action's impacts upon the natural, cultural, and manmade...
Patient care in a biological safety level-4 (BSL-4) environment.
Marklund, LeRoy A
2003-06-01
The greatest threats to America's public health include accidental importation of deadly diseases by international travelers and the release of biologic weapons by our adversaries. The greatest failure is unpreparedness because international travel and dispersion of biologic agents by our enemies are inevitable. An effective medical defense program is the recommended deterrent against these threats. The United States has a federal response plan in place that includes patient care and patient transport by using the highest level of biologic containment: BSL-4. The DoD has the capability to provide intensive care for victims infected with highly infectious yet unknown biologic agents in an environment that protects the caregiver while allowing scientists to study the characteristics of these new agents and assess the effectiveness of treatment. Army critical care nurses are vital in the biologic medical defense against unidentified infectious diseases, accidental occupational exposures, or intentional dispersion of weaponized biologic agents. Research that carefully advances healthcare using BSL-4 technology addresses the challenges of the human element of BSL-4 containment patient care, and BSL-4 patient transport enhances our nation's ability to address the emerging biologic threats we confront in the future.
SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harris, S.; Dunn, D.
2010-09-07
Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risksmore » of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.« less
New technology for early detection of health threats
NASA Astrophysics Data System (ADS)
Southern, Šárka O.; Lilienthal, Gerald W.
2008-04-01
Governmental agencies charged with protecting the health of the population and agriculture have several main strategic objectives including the detection of harmful agents, the identification of vulnerable biological targets, the prediction of health outcomes and the development of countermeasures. New technologies are urgently needed in several critical areas of bio-chemical defense: economical and minimally invasive biosensors for field use in humans and other species important for agriculture and infrastructure, universal analytical platforms for broad-based, early warnings of threats and technologies guiding the development of countermeasures. A new technology called Stress Response Profiling (SRP) was recently developed by the Gaia Medical Institute. SRP provides a universal analytical platform for monitoring health status based on measurements of physiological stress. The platform is implemented through handheld devices that can be used for noninvasive detection of early-stage health problems. This paper summarizes SRP features, advantages and potential benefits for critical areas of homeland defense.
Defensive zeal and the uncertain self: what makes you so sure?
McGregor, Ian; Marigold, Denise C
2003-11-01
In Studies 1-3, undergraduates with high self-esteem (HSEs) reacted to personal uncertainty-threats with compensatory conviction about unrelated issues and aspects of the self. In Study 1 HSEs reacted to salience of personal dilemmas with increased implicit conviction about self-definition. In Study 2 they reacted to the same uncertainty-threat with increased explicit conviction about social issues. In Study 3, HSEs (particularly defensive HSEs, i.e., with low implicit self-esteem; C. H. Jordan, S. J. Spencer, & M. P. Zanna, 2003) reacted to uncertainty about a personal relationship with compensatory conviction about social issues. For HSEs in Study 4, expressing convictions about social issues decreased subjective salience of dilemma-related uncertainties that were not related to the social issues. Compensatory conviction is viewed as a mode of repression, akin to reaction formation, that helps keep unwanted thoughts out of awareness.
HALL, BRIAN J.; HOBFOLL, STEVAN E.; CANETTI, DAPHNA; JOHNSON, ROBERT J.; GALEA, SANDRO
2011-01-01
A study examining the effects of terrorism on a national sample of 1,136 Jewish adults was conducted in Israel via telephone surveys, during the Second Intifada. The relationship between reports of positive changes occurring subsequent to terrorism exposure (i.e., Benefit finding), posttraumatic stress disorder (PTSD) symptom severity, and negative outgroup attitudes toward Palestinian citizens of Israel (PCI) was examined. Benefit finding was related to greater PTSD symptom severity. Further, Benefit finding was related to greater threat perception of PCI and ethnic exclusionism of PCI. Findings were consistent with hypotheses derived from theories of outgroup bias and support the anxiety buffering role of social affiliation posited by terror management theory. This study suggests that benefit finding may be a defensive coping strategy when expressed under the conditions of ongoing terrorism and external threat. PMID:22058603
Martin, Meredith J; Davies, Patrick T; MacNeill, Leigha A
2014-04-29
Navigating the ubiquitous conflict, competition, and complex group dynamics of the peer group is a pivotal developmental task of childhood. Difficulty negotiating these challenges represents a substantial source of risk for psychopathology. Evolutionary developmental psychology offers a unique perspective with the potential to reorganize the way we think about the role of peer relationships in shaping how children cope with the everyday challenges of establishing a social niche. To address this gap, we utilize the ethological reformulation of the emotional security theory as a guide to developing an evolutionary framework for advancing an understanding of the defense strategies children use to manage antagonistic peer relationships and protect themselves from interpersonal threat (Davies and Sturge-Apple, 2007). In this way, we hope to illustrate the value of an evolutionary developmental lens in generating unique theoretical insight and novel research directions into the role of peer relationships in the development of psychopathology.
Klumpers, Floris; Heitland, Ivo; Oosting, Ronald S; Kenemans, J Leon; Baas, Johanna M P
2012-02-01
The serotonin transporter (SERT) plays a crucial role in anxiety. Accordingly, variance in SERT functioning appears to constitute an important pathway to individual differences in anxiety. The current study tested the hypothesis that genetic variation in SERT function is associated with variability in the basic reflex physiology of defense. Healthy subjects (N=82) were presented with clearly instructed cues of shock threat and safety to induce robust anxiety reactions. Subjects carrying at least one short allele for the 5-HTTLPR polymorphism showed stronger fear-potentiated startle compared to long allele homozygotes. However, short allele carriers showed no deficit in the downregulation of fear after the offset of threat. These results suggest that natural variation in SERT function affects the magnitude of defensive reactions while not affecting the capacity for fear regulation. Copyright © 2011 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Ma, Chung; Li, Xiaopu; Lu, Jiwei; Poon, Joseph; Comes, Ryan; Devaraj, Arun; Spurgeon, Steven
Amorphous ferrimagetic TbFeCo and TbSmFeCo thin films are found to exhibit strong perpendicular magnetic anisotropy. Self exchange bias effect and bi-stable magneto-resistance states are observed near compensation temperature by magnetic hysteresis loop, anomalous Hall effect and transverse magneto-resistance measurements. Atom probe tomography, scanning transmission electron microscopy, and energy dispersive spectroscopy mapping have revealed two nanoscale amorphous phases with different Tb concentration distributed within the amorphous films. The observed exchange anisotropy originates from the exchange interaction between the two nanoscale amorphous phases. Exchange bias effect is used for increasing stability in spin valves and magnetic tunneling junctions. This study opens up a new platform for using amorphous ferrimagnetic thin films that require no epitaxial growth in nanodevices.. The work was supported by the Defense Threat Reduction Agency Grant and the U.S. Department of Energy.
Pyroelectric Crystal Accelerator In The Department Of Physics And Nuclear Engineering At West Point
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gillich, Don; Kovanen, Andrew; Anderson, Tom
The Nuclear Science and Engineering Research Center (NSERC), a Defense Threat Reduction Agency (DTRA) office located at the United States Military Academy (USMA), sponsors and manages cadet and faculty research in support of DTRA objectives. The NSERC has created an experimental pyroelectric crystal accelerator program to enhance undergraduate education at USMA in the Department of Physics and Nuclear Engineering. This program provides cadets with hands-on experience in designing their own experiments using an inexpensive tabletop accelerator. This device uses pyroelectric crystals to ionize and accelerate gas ions to energies of {approx}100 keV. Within the next year, cadets and faculty atmore » USMA will use this device to create neutrons through the deuterium-deuterium (D-D) fusion process, effectively creating a compact, portable neutron generator. The double crystal pyroelectric accelerator will also be used by students to investigate neutron, x-ray, and ion spectroscopy.« less
PINS Testing and Modification for Explosive Identification
DOE Office of Scientific and Technical Information (OSTI.GOV)
E.H. Seabury; A.J. Caffrey
2011-09-01
The INL's Portable Isotopic Neutron Spectroscopy System (PINS)1 non-intrusively identifies the chemical fill of munitions and sealed containers. PINS is used routinely by the U.S. Army, the Defense Threat Reduction Agency, and foreign military units to determine the contents of munitions and other containers suspected to contain explosives, smoke-generating chemicals, and chemical warfare agents such as mustard and nerve gas. The objects assayed with PINS range from softball-sized M139 chemical bomblets to 200 gallon DOT 500X ton containers. INL had previously examined2 the feasibility of using a similar system for the identification of explosives, and based on this proof-of-principle test,more » the development of a dedicated system for the identification of explosives in an improvised nuclear device appears entirely feasible. INL has been tasked by NNSA NA-42 Render Safe Research and Development with the development of such a system.« less
Carbachol-induced agonistic behavior in cats: aggressive or defensive response.
Brudzyński, S M
1981-01-01
The effects of intrahypothalamic carbachol microinjections were investigated in unprovoked cats. The carbachol evoked mydriasis, attention, vocalization, and piloerection, i.e. features of a typical defense were usually concomitant in evoked response, while the clear-cut aggressive or escape patterns appeared only once. No basic differences were observed in the set of manifestations induced by low (1-2.5 micrograms) and high (20-40 micrograms) doses of carbachol, and from left and right hypothalamus as well as from medial and lateral portion of the hypothalamus. It is concluded that carbachol-induced response does not represent an aggressive pattern but corresponds to the cats defense and threat behavior.
Eye movement responses to health messages on cigarette packages
2012-01-01
Background While the majority of the health messages on cigarette packages contain threatening health information, previous studies indicate that risk information can trigger defensive reactions, especially when the information is self-relevant (i.e., smokers). Providing coping information, information that provides help for quitting smoking, might increase attention to health messages instead of triggering defensive reactions. Methods Eye-movement registration can detect attention preferences for different health education messages over a longer period of time during message exposure. In a randomized, experimental study with 23 smoking and 41 non-smoking student volunteers, eye-movements were recorded for sixteen self-created cigarette packages containing health texts that presented either high risk or coping information combined with a high threat or a low threat smoking-related photo. Results Results of the eye movement data showed that smokers tend to spend more time looking (i.e., more unique fixations and longer dwell time) at the coping information than at the high risk information irrespective of the content of the smoking-related photo. Non-smokers tend to spend more time looking at the high risk information than at the coping information when the information was presented in combination with a high threat smoking photo. When a low threat photo was presented, non-smokers paid more attention to the coping information than to the high risk information. Results for the smoking photos showed more attention allocation for low threat photos that were presented in combination with high risk information than for low threat photos in combination with coping information. No attention differences were found for the high threat photos. Conclusions Non-smokers demonstrated an attention preference for high risk information as opposed to coping information, but only when text information was presented in combination with a high threat photo. For smokers, however, our findings suggest more attention allocation for coping information than for health risk information. This preference for coping information is not reflected in current health messages to motivate smokers to quit smoking. Coping information should be more frequently implemented in health message design to increase attention for these messages and thus contribute to effective persuasion. PMID:22583956
Eye movement responses to health messages on cigarette packages.
Kessels, Loes T E; Ruiter, Robert A C
2012-05-14
While the majority of the health messages on cigarette packages contain threatening health information, previous studies indicate that risk information can trigger defensive reactions, especially when the information is self-relevant (i.e., smokers). Providing coping information, information that provides help for quitting smoking, might increase attention to health messages instead of triggering defensive reactions. Eye-movement registration can detect attention preferences for different health education messages over a longer period of time during message exposure. In a randomized, experimental study with 23 smoking and 41 non-smoking student volunteers, eye-movements were recorded for sixteen self-created cigarette packages containing health texts that presented either high risk or coping information combined with a high threat or a low threat smoking-related photo. Results of the eye movement data showed that smokers tend to spend more time looking (i.e., more unique fixations and longer dwell time) at the coping information than at the high risk information irrespective of the content of the smoking-related photo. Non-smokers tend to spend more time looking at the high risk information than at the coping information when the information was presented in combination with a high threat smoking photo. When a low threat photo was presented, non-smokers paid more attention to the coping information than to the high risk information. Results for the smoking photos showed more attention allocation for low threat photos that were presented in combination with high risk information than for low threat photos in combination with coping information. No attention differences were found for the high threat photos. Non-smokers demonstrated an attention preference for high risk information as opposed to coping information, but only when text information was presented in combination with a high threat photo. For smokers, however, our findings suggest more attention allocation for coping information than for health risk information. This preference for coping information is not reflected in current health messages to motivate smokers to quit smoking. Coping information should be more frequently implemented in health message design to increase attention for these messages and thus contribute to effective persuasion.
Radioactive threat detection using scintillant-based detectors
NASA Astrophysics Data System (ADS)
Chalmers, Alex
2004-09-01
An update to the performance of AS&E's Radioactive Threat Detection sensor technology. A model is presented detailing the components of the scintillant-based RTD system employed in AS&E products aimed at detecting radiological WMD. An overview of recent improvements in the sensors, electrical subsystems and software algorithms are presented. The resulting improvements in performance are described and sample results shown from existing systems. Advanced and future capabilities are described with an assessment of their feasibility and their application to Homeland Defense.
The Engineering Design of Intelligent Protective Textiles and Clothing
NASA Astrophysics Data System (ADS)
Park, Sungmee; Jayaraman, Sundaresan
Terrorism has been on the rise in the past decade and continues to disrupt everyday life in many parts of the world. Protection against such threats is therefore critical for preserving peace and security around the world. In particular, the safety of defense personnel engaged in confronting and responding to such threats must be ensured. Since textiles and clothing are pervasive and are always "on" the soldier, they can serve as an excellent infrastructure or platform for such individual protection systems.
1994-03-01
and target annotated. The threat rings . . . lots of them . . . the wing commander . . . the chaplain reading from the Bible... this was real...Meanwhile, the OPT was already working the next mission. We updated the threat rings , chose a minimum risk route, coordinated defense suppression and...Prove it, Intel! You can’t prove it because you have no imagery backup for electronic intelligence. Okay then, let’s penetrate that ring to mini
The New World Order: Implications for Army Policy and Force Structure
1992-04-06
AD-A249 431 The mmsw expmeud in tWe paper in~ on of the autor anid do not neaariY reflhct the views Of the NDuenat o( Defense ot any of its qu~ia...Pennsylvania 17013 DISTRIBUTION STATEMENT A: Approved for public release; distribution is unlimited. The views expressed In this paper 4rt th§@ S Ef author...of threats to its survival from sources as diverse as foreign invasion to internal rebellion. An exhaustive list of past threats and remote future
The Strategic Context for Assessing Long Range Offense and Active Defense.
1986-10-27
such Europeans do not really think that there is much of a Soviet nuclear threat to Western Europe, but d. hink that there is an American threat--or at...American military innovation has slowed down. It has been clear for many years that continuing references to a quantitative strategic arms race...have for a long time called for renewed efforts to " slow down the rate of weapons innovation" and "hence to reduce the frequency of introduction of
2013-06-14
ever-evolving contemporary nature of external and internal threats to the safety and security of the American homeland, it becomes increasingly...Major Justin P. Hurt, 146 pages. With the ever-evolving contemporary nature of external and internal threats to the safety and security of the American...HAZMAT Hazardous Materials HRF Homeland Response Force HSPD Homeland Security Presidential Directive JFHQ Joint Force
He, Alex Jingwei
2014-12-01
Defensive medicine describes physicians' behavioral response to threats from medical malpractice litigation. Previous studies have found widespread practice of defensive medicine that is responsible for the global escalation of health care costs. Defying the traditional explanations, this study, with a case of a Chinese city, reveals that in a country where medical malpractice lawsuits are rare, physicians' self-perceived threats from patients may constitute a major reason for defensive practices. Defensive behaviors in the Chinese context mainly take the form of overprescribing diagnostic tests, procedures and drugs. The existing literature tends to explain this in terms of Chinese doctors' desire to supplement their low incomes. Behind this is a series of misaligned incentives deeply embedded in the Chinese health system. Using a cross-sectional survey of physicians, this study shows that overprescription in Chinese hospitals is driven not only by hard economic incentives, but also by doctors' motive of avoiding disputes with patients. The survey was carried out in Shenzhen City, in December 2013. A sample containing 504 licensed physicians was drawn by random sampling. Descriptive analyses identified significant dissatisfaction with income and workload as well as severe tensions between doctors and patients. Drawing from the literature on defensive medicine, multivariate analysis revealed that physicians' previous experience of medical disputes is significantly associated with defensive behaviors, particularly overprescription. Low income continued to be a critical predictor, reinforcing the target income hypothesis and suggesting the resilience of perverse economic incentives. This study sheds fresh light on China's recent health policy reforms by highlighting the critical impact of the doctor-patient relationship. The effort to contain health care costs must progress on two fronts, mitigating the tensions between doctors and patients while still reforming the remuneration scheme cautiously to enable physicians to respond to right incentives. Copyright © 2014 Elsevier Ltd. All rights reserved.
DE-STARLITE: A directed energy planetary defense mission
NASA Astrophysics Data System (ADS)
Kosmo, Kelly; Pryor, Mark; Lubin, Philip; Hughes, Gary B.; O'Neill, Hugh; Meinhold, Peter; Suen, Jonathan; Riley, Jordan; Griswold, Janelle; Cook, Brianna V.; Johansson, Isabella E.; Zhang, Qicheng; Walsh, Kevin; Melis, Carl; Kangas, Miikka; Bible, Johanna; Motta, Caio; Brashears, Travis; Mathew, Shana; Bollag, Justin
2014-09-01
This paper presents the motivation behind and design of a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. The proposed system is called DE-STARLITE for Directed Energy System for Targeting of Asteroids and ExploRation - LITE as it is a small, stand-on unit of a larger standoff DE-STAR system. Pursuant to the stand-on design, ion engines will propel the spacecraft from low-Earth orbit (LEO) to the near-Earth asteroid (NEA). During laser ablation, the asteroid itself becomes the "propellant"; thus a very modest spacecraft can deflect an asteroid much larger than would be possible with a system of similar mission mass using ion beam deflection (IBD) or a gravity tractor. DE-STARLITE is capable of deflecting an Apophis-class (325 m diameter) asteroid with a 15-year targeting time. The mission fits within the rough mission parameters of the Asteroid Redirect Mission (ARM) program in terms of mass and size and has much greater capability for planetary defense than current proposals and is readily scalable to the threat. It can deflect all known threats with sufficient warning.
Defense Waste Processing Facility Process Enhancements
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bricker, Jonathan
2010-11-01
Jonathan Bricker provides an overview of process enhancements currently being done at the Defense Waste Processing Facility (DWPF) at SRS. Some of these enhancements include: melter bubblers; reduction in water use, and alternate reductant.
Wägele, Heike; Klussmann-Kolb, Annette
2005-01-01
Background In general shell-less slugs are considered to be slimy animals with a rather dull appearance and a pest to garden plants. But marine slugs usually are beautifully coloured animals belonging to the less-known Opisthobranchia. They are characterized by a large array of interesting biological phenomena, usually related to foraging and/or defence. In this paper our knowledge of shell reduction, correlated with the evolution of different defensive and foraging strategies is reviewed, and new results on histology of different glandular systems are included. Results Based on a phylogeny obtained by morphological and histological data, the parallel reduction of the shell within the different groups is outlined. Major food sources are given and glandular structures are described as possible defensive structures in the external epithelia, and as internal glands. Conclusion According to phylogenetic analyses, the reduction of the shell correlates with the evolution of defensive strategies. Many different kinds of defence structures, like cleptocnides, mantle dermal formations (MDFs), and acid glands, are only present in shell-less slugs. In several cases, it is not clear whether the defensive devices were a prerequisite for the reduction of the shell, or reduction occurred before. Reduction of the shell and acquisition of different defensive structures had an implication on exploration of new food sources and therefore likely enhanced adaptive radiation of several groups. PMID:15715915
Directed energy missions for planetary defense
NASA Astrophysics Data System (ADS)
Lubin, Philip; Hughes, Gary B.; Eskenazi, Mike; Kosmo, Kelly; Johansson, Isabella E.; Griswold, Janelle; Pryor, Mark; O'Neill, Hugh; Meinhold, Peter; Suen, Jonathan; Riley, Jordan; Zhang, Qicheng; Walsh, Kevin; Melis, Carl; Kangas, Miikka; Motta, Caio; Brashears, Travis
2016-09-01
Directed energy for planetary defense is now a viable option and is superior in many ways to other proposed technologies, being able to defend the Earth against all known threats. This paper presents basic ideas behind a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. A conceptual philosophy called DE-STAR, which stands for Directed Energy System for Targeting of Asteroids and exploration, is an orbiting stand-off system, which has been described in other papers. This paper describes a smaller, stand-on system known as DE-STARLITE as a reduced-scale version of DE-STAR. Both share the same basic heritage of a directed energy array that heats the surface of the target to the point of high surface vapor pressure that causes significant mass ejection thus forming an ejection plume of material from the target that acts as a rocket to deflect the object. This is generally classified as laser ablation. DE-STARLITE uses conventional propellant for launch to LEO and then ion engines to propel the spacecraft from LEO to the near-Earth asteroid (NEA). During laser ablation, the asteroid itself provides the propellant source material; thus a very modest spacecraft can deflect an asteroid much larger than would be possible with a system of similar mission mass using ion beam deflection (IBD) or a gravity tractor. DE-STARLITE is capable of deflecting an Apophis-class (325 m diameter) asteroid with a 1- to 15-year targeting time (laser on time) depending on the system design. The mission fits within the rough mission parameters of the Asteroid Redirect Mission (ARM) program in terms of mass and size. DE-STARLITE also has much greater capability for planetary defense than current proposals and is readily scalable to match the threat. It can deflect all known threats with sufficient warning.
Electrically Detected Study of Variable Range Hopping in Silicon Nitrides
NASA Astrophysics Data System (ADS)
Waskiewicz, Ryan; Mutch, Michael; Lenahan, Patrick; King, Sean
Electrically detected magnetic resonance (EDMR) offers greatly improved sensitivity over conventional electron paramagnetic resonance (EPR) studies in semiconductor/insulator systems; in EDMR measurements, one observes EPR via changes in device currents which are spin-dependent. In our study, we observe EDMR via spin-dependent trap assisted tunneling (SDTAT) via variable range hopping (VRH) through stoichiometric silicon nitride dielectric films. In these films, leakage current effectively changes at resonance. In our study, we have investigated the EDMR response as a function of dielectric electric field and temperature for films of various thicknesses. We believe that these measurements allow us to identify the defects responsible for transport in such these thin films using EDMR and to some extent measure the distances between the defects. The separation between the defects can, at least in principle, be measured using the recently demonstrated half-field EDMR response and we can also count total number of spins responsible for transport through dielectric films. Although we present results only on silicon nitride thin films, we believe that the approach utilized will be widely applicable to other dielectric films in which electronic transport is of interest. This project is sponsored in part by Intel Corporation and in part by the Department of Defense, Defense Threat Reduction Agency under Grant Number HDTRA1-16-0008.
Europium-Doped Lanthanum Hafnate Nanoparticles: Structure, Photoluminescence, and Radioluminescence
NASA Astrophysics Data System (ADS)
Wahid, Kareem; Pokhrel, Madhab; Mao, Yuanbing
Due to their novel physical properties, nanostructured phosphors are of interest for radiation-based imaging and therapeutics. Herein, the structural and luminescent properties of europium-doped lanthanum hafnate (La2Hf2O7:xmol%Eu3+, x = 0 - 35) nanoparticles are investigated for use as scintillators. X-ray diffraction, Raman spectroscopy, and scanning electron microscopy confirm samples prepared through a combined co-precipitation and low-temperature molten salt synthetic process homogenously form spherical nanocrystals of 36 nm in the ordered pyrochlore phase. Ultraviolet and X-ray excitation of these samples induce strong red emissions in the 580 - 590 and 612 - 630 nm range corresponding to the 5D0->7 F1 magnetic dipole and 5D0->7 F2 electric dipole transitions of Eu3+. Optical response and quantum yield are optimized at 5% Eu3+; a proposed trade-off between quenching mechanisms (defect-states/cross-relaxation) and dopant concentration is discussed. Owing to their high density, large effective atomic number, and bright luminescence, these La2Hf2O7:xmol%Eu3+ nanoparticles warrant further investigation for scintillator applications. The authors thank the support from the Defense Threat Reduction Agency of the U.S. Department of Defense (award #HDTRA1- 10-1-0114).
Radiation biodosimetry: applications for spaceflight
NASA Astrophysics Data System (ADS)
Blakely, W.; Miller, A.; Grace, M.; Prasanna, P.; Muderhwa, J.
The multiparametric dosimetry system that we are developing for medical radiological defense applications could be adapted for spaceflight environments. The system complements the internationally accepted cytogenetic analysis of chromosome aberrations, considered the best means of documenting radiation doses for health records. Our system consists of a dose assessment software application, a portable blood cell counter, and molecular biodosimetry using miniaturized equipment. The Biodosimetry Assessment Tool (BAT) software application calculates radiation dose based on a patient's physical signs and symptoms and blood analysis, annotates location of personnel dosimeters, displays a summary of a patient's dosimetric information to healthcare professionals, and archives the data for further use. The dry reagent centrifuge-based blood cell counter (QBC Autoread Plus, Beckon Dickinson Bioscience) measures peripheral blood lymphocytes and monocytes, which could determine radiation dose based on the kinetics of blood cell depletion. Molecular biomarkers for ionizing radiation exposure (gene expression changes, blood proteins), once dose-dependent targets are identified, optimized, and validated, will make use of miniaturized diagnostic equipment for nucleic acid sequence and antigen-based biosensor detection technologies. These radiation assessment diagnostic technologies can have dual use for other medical related applications. [The Armed Forces Radiobiology Research Institute, under work unit AFRRI-01-3, and the Defense Threat Reduction Agency, under contract GG4661, supported this research.
Dopant concentration dependent optical and X-Ray induced photoluminescence in Eu3+ doped La2Zr2O7
NASA Astrophysics Data System (ADS)
Pokhrel, Madhab; Brik, Mikhail; Mao, Yuanbing
2015-03-01
Herein, we will be presenting the dopant (Eu) concentration dependent high density La2Zr2O7 nanoparticles for optical and X-ray scintillation applications by use of X - ray diffraction, Raman, FTIR, scanning electron microscope (SEM), transmission electron microscopy (TEM), optically and X-ray excited photoluminescence (PL). Several theoretical methods have been used in order to investigate the structural, electronic, optical, elastic, dynamic properties of Eu doped La2Zr2O7. It is observed that Eu: La2Zr2O7 shows an intense red luminescence under 258, 322, 394 and 465 nm excitation. The optical intensity of Eu: La2Zr2O7 depends on the dopant concentration of Eu3+. Following high energy excitation with X-rays, Eu: La2Zr2O7 shows an atypical Eu PL response (scintillation) with a red emission. The intense color emission of Eu obtained under 258 nm excitation, the X-ray induced luminescence property along with reportedly high density of La2Zr2O7, makes these nanomaterials attractive for optical and X-ray applications. The authors thank the support from the Defense Threat Reduction Agency (DTRA) of the U.S. Department of Defense (Award #HDTRA1-10-1-0114).
Dunne, Simon; Gallagher, Pamela; Matthews, Anne
2015-01-01
Using a terror management theory framework, this study investigated if providing mortality reminders or self-esteem threats would lead participants to exhibit avoidant responses toward a point-of-care testing device for cardiovascular disease risk and if the nature of the device served to diminish the existential threat of cardiovascular disease. One hundred and twelve participants aged 40-55 years completed an experimental questionnaire. Findings indicated that participants were not existentially threatened by established terror management methodologies, potentially because of cross-cultural variability toward such methodologies. Highly positive appraisals of the device also suggest that similar technologies may beneficially affect the uptake of screening behaviors.
From avoidance to approach: The influence of threat-of-shock on reward-based decision making.
Bublatzky, Florian; Alpers, Georg W; Pittig, Andre
2017-09-01
Potential threat can prime defensive responding and avoidance behavior, which may result in the loss of rewards. When aversive consequences do not occur, avoidance should, thus, be quickly overcome in healthy individuals. This study examined the impact of threat anticipation on reward-based decisions. Sixty-five participants completed a decision-making task in which they had to choose between high- and low-reward options. To model an approach-avoidance conflict, the high-reward option was contingent with a threat-of-shock cue; the low-reward option was contingent with a safety cue. In control trials, decisions were made without threat/safety instructions. Overall, behavioral data documented a typical preference for the profitable option. Importantly, under threat-of-shock, participants initially avoided the profitable option (i.e., safe, but less profitable choices). However, when they experienced that shocks did actually not occur, participants overcame initial avoidance in favor of larger gains. Furthermore, autonomic arousal (skin conductance and heart rate responses) was elevated during threat cues compared to safety and non-threatening control cues. Taken together, threat-of-shock was associated with behavioral consequences: initially, participants avoided threat-related options but made more profitable decisions as they experienced no aversive consequences. Although socially acquired threat contingencies are typically stable, incentives for approach can help to overcome threat-related avoidance. Copyright © 2017 Elsevier Ltd. All rights reserved.
1982-05-06
request of- " -a)1LjrLetmmanZeon -E- -Pemetta. GAO’s objec- / tives were to identify and analyze signif - icant internal Defense Language Institute...as a baseline from which to measure vari- ances, assess the reasons for variances , and make needed correc- tions. We were told that DLI had not...etc. Multiply these major efforts times the number of high density "threat" languages and one can better understand the nature of manpower expenditures
Capability Surprise (Report of the Defense Science Board 2008 Summer Study). Volume 1: Main Report
2009-09-01
fact, this has already happened, at least to a degree. Gen. James Mattis sent a memo in March 2009 to Defense Secretary Robert Gates calling for the... bio , but with a focus on threats to military operations, we chose not to. “Surprising” surprises—those many that the nation might have known about...Victor 3/Akula Quieting Undetected use of foreign technology Prepared because we had anticipated capability in general Soviet Bio -weapons Program
2018-04-18
Significant research is currently conducted on dynamic learning and threat detection. However, this work is held back by gaps in validation methods ...and network path rotation (e.g., Stream Splitting MTD). Agents can also employ various cyber-deception methods , including direct observation hiding...ARL-SR-0395 ● APR 2018 US Army Research Laboratory Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017
2018-04-01
Significant research is currently conducted on dynamic learning and threat detection. However, this work is held back by gaps in validation methods ...and network path rotation (e.g., Stream Splitting MTD). Agents can also employ various cyber-deception methods , including direct observation hiding...ARL-SR-0395 ● APR 2018 US Army Research Laboratory Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017
The balance of terror on main street, USA
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stuller, J.
The movement to establish nuclear-free zones across America is quietly gaining momentum. Many of these ordinances go beyond mere symbolic declarations and are viewed as a threat by business. So far, nuclear-free zones have failed in cities with strong ties to the defense industry. The movement is increasingly colliding with the interests of corporations and workers that depend on Department of Defense contracts and support of America's nuclear arsenal. Examined are the various efforts to establish or defeat such proposals in several locals.
How the USAF Can Lose the Next War Losing Air Superiority
2009-04-01
Richard Hawley, then commander of ACC, said in 1998 that “the F-15 will not be able to operate effectively against upcoming threats such as four...Budge Battle” 37 LockheedMartin.com 38 Dougherty, “Defense Suppression”, 18 39 Vallance , “RAF Operations in the Gulf War”, 31 40 GAO Report, “Combat...Accounting Office, “Combat Air Power: Funding Priority for Suppression of Enemy Air Defenses May be Too Low”, October 1996 Vallance , Group Capt
Will China’s Rise Remain Peaceful? (Military Threat or Economic Competitor)
2008-01-01
factories not only to meet its own logistics needs but also to produce weapons for sale abroad and consumer goods for domestic sales, profits from which...trepidation as a powerful new economic competitor.34 21 Indeed, the watershed event for China’s outbound M&A strategy was the unsuccessful US$18.5bn bid...Secretary of Defense Donald H. Rumsfeld, Shangri-La Hotel , Singapore, Saturday, June 4, 2005, U.S. Department of Defense, Office of the Assistant
Snakes in the Eagle’s Nest: A History of Ground Attacks on Air Bases,
1995-01-01
CRETE The New Zealand Division (7,700 personnel) was deployed in the Maleme-Canea-Suda Bay area. Although its 5th Brigade was re- sponsible for the...forces. In contrast, the New Zealand defense of Maleme was hampered by their obsession with the seaborne threat to Suda Bay . The New Zealand ...attack on Crete. • New Zealand ground commanders on Crete failed to devote suf- ficient resources to the defense of Maleme Airfield. • German
2013-06-01
following literature is in addition to the literature already cited that focuses on threat capability and strategic balance, Tom Sauer, Eliminating Nuclear...Missile Defenses (Claremont: Regina Books, 2003 ), 15. 16 have constituted something of a sibling rivalry with the offense gaining favor and eventually...Freedman, The Evolution of Nuclear Strategy, 3rd ed. (New York: Palgrave Macmillan, 2003 ), 242. 30 Ibid., 232–242; Burns and Brune, The Quest for Missile
Seeing 2020: America’s New Vision for Integrated Air and Missile Defense
2015-01-01
powered missile in war dates back to 13th- century China, but it was not until the early 19th century in Europe that these rockets gained the range and...relevant is that it accounts for the volatility and reality of 21st- century strategic and threat environments characterized more often than not by...adapted by fashioning primitive defenses, which at the time consisted exclusively of passive measures such as shields or armor to survive an attack and
Fox, Andrew S; Shackman, Alexander J
2017-11-30
Anxiety disorders impose a staggering burden on public health, underscoring the need to develop a deeper understanding of the distributed neural circuits underlying extreme fear and anxiety. Recent work highlights the importance of the central extended amygdala, including the central nucleus of the amygdala (Ce) and neighboring bed nucleus of the stria terminalis (BST). Anatomical data indicate that the Ce and BST form a tightly interconnected unit, where different kinds of threat-relevant information can be integrated to assemble states of fear and anxiety. Neuroimaging studies show that the Ce and BST are engaged by a broad spectrum of potentially threat-relevant cues. Mechanistic work demonstrates that the Ce and BST are critically involved in organizing defensive responses to a wide range of threats. Studies in rodents have begun to reveal the specific molecules, cells, and microcircuits within the central extended amygdala that underlie signs of fear and anxiety, but the relevance of these tantalizing discoveries to human experience and disease remains unclear. Using a combination of focal perturbations and whole-brain imaging, a new generation of nonhuman primate studies is beginning to close this gap. This work opens the door to discovering the mechanisms underlying neuroimaging measures linked to pathological fear and anxiety, to understanding how the Ce and BST interact with one another and with distal brain regions to govern defensive responses to threat, and to developing improved intervention strategies. Copyright © 2017. Published by Elsevier B.V.
Crockett, Katie
2011-09-01
Following the terrorist attacks in 2001, much time and effort has been put toward improving catastrophic incident response. But recovery--the period following initial response that focuses on the long-term viability of the affected area--has received less attention. Recognizing the importance of being able to recover an area following a catastrophic incident, the Department of Defense, through its Defense Threat Reduction Agency (DTRA), and the Department of Homeland Security, through its Science and Technology Directorate (DHS S&T), created the Interagency Biological Restoration Demonstration (IBRD) program. IBRD was a 4-year program jointly managed and funded by DTRA and DHS S&T, the goal of which was to reduce the time and resources necessary to recover a wide urban area from an intentional release of Bacillus anthracis. Specific program objectives included understanding the social, economic, and operational interdependencies that affect recovery; establishing long-term coordination between the Departments of Defense and Homeland Security; developing strategic recovery/restoration plans; identifying and demonstrating technologies that support recovery; and exercising recovery activities and technology solutions. IBRD has made important first steps toward improving national preparedness in the area biological incident recovery. Specifically, IBRD has helped enhance the efficacy and efficiency of recovering large urban areas by developing consequence management guidance; identifying key S&T capabilities and integrating them with planning and guidance documents; and establishing key relationships across the federal interagency, federal-to-regional, civilian-to-military, and public-to-private stakeholders. Upon completion of IBRD in fall 2010, both DTRA and DHS S&T planned follow-on programs.
Combating terrorism : threat and risk assessments can help prioritize and target program investments
DOT National Transportation Integrated Search
1998-04-01
The Defense Against Weapons of Mass Destruction Act of 1996 established the Nunn-Lugar-Domenici (NLD) domestic preparedness program. The General Accounting Office (GAO) was requested to review implementation of the NLD program. Specifically, the GAO ...
A Database of Systems Management Cases
1990-09-01
of weapons systems that effectively meet threats and national strategic objectives (28). Vanguard was the responsibility of HQ AFSC/ XRP , the Long...control of the process located in XRP . These areas were strategic offense; strategic defense; tactical; command, control, and communication (C3
Planetary Defense: Options for Deflection of Near Earth Objects
NASA Technical Reports Server (NTRS)
Adams, R. B.; Statham, G.; Hopkins, R.; Chapman, J.; White, S.; Bonometti, J.; Alexander, R.; Fincher, S.; Polsgrove, T.; Kalkstein, M.
2003-01-01
Several recent near-miss encounters with asteroids and comets have focused attention on the threat of a catastrophic impact with the Earth. This document reviews the historical impact record and current understanding of the number and location of Near Earth Objects (NEO's) to address their impact probability. Various ongoing projects intended to survey and catalog the NEO population are also reviewed. Details are then given of an MSFC-led study, intended to develop and assess various candidate systems for protection of the Earth against NEOs. An existing program, used to model the NE0 threat, was extensively modified and is presented here. Details of various analytical tools, developed to evaluate the performance of proposed technologies for protection against the NEO threat, are also presented. Trajectory tools, developed to model the outbound path a vehicle would take to intercept or rendezvous with a target asteroid or comet, are described. Also, details are given of a tool that was created to model both the un-deflected inbound path of an NE0 as well as the modified, post-deflection, path. The number of possible options available for protection against the NE0 threat was too numerous for them to all be addressed within the study; instead, a representative selection were modeled and evaluated. The major output from this work was a novel process by which the relative effectiveness of different threat mitigation concepts can be evaluated during future, more detailed, studies. In addition, several new or modified mathematical models were developed to analyze various proposed protection systems. A summary of the major lessons learned during this study is presented, as are recommendations for future work. It is hoped that this study will serve to raise the level attention about this very real threat and also demonstrate that successful defense is both possible and practicable, provided appropriate steps are taken.
Silverman, Arielle M; Cohen, Geoffrey L
2014-10-01
Stereotype threat, the concern about being judged in light of negative stereotypes, causes underperformance in evaluative situations. However, less is known about how coping with stereotypes can aggravate underperformance over time. We propose a model in which ongoing stereotype threat experiences threaten a person's sense of self-integrity, which in turn prompts defensive avoidance of stereotype-relevant situations, impeding growth, achievement, and well-being. We test this model in an important but understudied population: the physically disabled. In Study 1, blind adults reporting higher levels of stereotype threat reported lower self-integrity and well-being and were more likely to be unemployed and to report avoiding stereotype-threatening situations. In Study 2's field experiment, blind students in a compensatory skill-training program made more progress if they had completed a values-affirmation, an exercise that bolsters self-integrity. The findings suggest that stereotype threat poses a chronic threat to self-integrity and undermines life outcomes for people with disabilities. © 2014 by the Society for Personality and Social Psychology, Inc.
Evidence for aversive withdrawal response to own errors.
Hochman, Eldad Yitzhak; Milman, Valery; Tal, Liron
2017-10-01
Recent model suggests that error detection gives rise to defensive motivation prompting protective behavior. Models of active avoidance behavior predict it should grow larger with threat imminence and avoidance. We hypothesized that in a task requiring left or right key strikes, error detection would drive an avoidance reflex manifested by rapid withdrawal of an erring finger growing larger with threat imminence and avoidance. In experiment 1, three groups differing by error-related threat imminence and avoidance performed a flanker task requiring left or right force sensitive-key strikes. As predicted, errors were followed by rapid force release growing faster with threat imminence and opportunity to evade threat. In experiment 2, we established a link between error key release time (KRT) and the subjective sense of inner-threat. In a simultaneous, multiple regression analysis of three error-related compensatory mechanisms (error KRT, flanker effect, error correction RT), only error KRT was significantly associated with increased compulsive checking tendencies. We propose that error response withdrawal reflects an error-withdrawal reflex. Copyright © 2017 Elsevier B.V. All rights reserved.
Homeland Security and Defense Applications
None
2018-01-16
Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.
Plasma radome designed for the EMP effects defense
NASA Astrophysics Data System (ADS)
Li, Zhigang; Wang, Jiachun; Cheng, Li; Wang, Qichao
2016-11-01
Radar, as the main detection means, plays an extremely important role in modern warfare. However, it is easily attacked by the electromagnetic pulse (EMP) weapon. In order to defense the threat, a radome formed by plasma is designed. The plasma radome is used to protect the radar systems against EMP coupling through both `front door' and `back door'. What's more, the damage effects of EMP to the radar systems are analyzed, and the protection mechanism of plasma to EMP weapon is discussed. In addition, a simulation experiment is carried out to verify the feasibility of the plasma radome to defense against EMP. The results indicate that the structure performs well, which makes it a new method against EMP weapon.
Needed: Reincarnation of National Defense Education Act of 1958
NASA Astrophysics Data System (ADS)
Harris, Mary M.; Miller, James R.
2005-06-01
This paper reviews the historical and current response of the United States to threats to its world leadership in scientific endeavors, with particular attention to the National Defense Education Act of 1958. The current status of the United States in mathematics, science, and engineering education is reviewed with respect to K-12 student achievement, K-12 teacher quality, numbers of degrees granted, and other indicators of international competitiveness. Concluding that we are a nation in peril, recommendations are made to enhance the likelihood that the United States will retain its preeminent position in science and technology and, therefore, provide for the national defense and economic wellbeing of citizens in an information age and global economy.
The effects of disturbance threat on leaf-cutting ant colonies: a laboratory study.
Norman, V C; Pamminger, T; Hughes, W O H
2017-01-01
The flexibility of organisms to respond plastically to their environment is fundamental to their fitness and evolutionary success. Social insects provide some of the most impressive examples of plasticity, with individuals exhibiting behavioral and sometimes morphological adaptations for their specific roles in the colony, such as large soldiers for nest defense. However, with the exception of the honey bee model organism, there has been little investigation of the nature and effects of environmental stimuli thought to instigate alternative phenotypes in social insects. Here, we investigate the effect of repeated threat disturbance over a prolonged (17 month) period on both behavioral and morphological phenotypes, using phenotypically plastic leaf-cutting ants ( Atta colombica ) as a model system. We found a rapid impact of threat disturbance on the behavioral phenotype of individuals within threat-disturbed colonies becoming more aggressive, threat responsive, and phototactic within as little as 2 weeks. We found no effect of threat disturbance on morphological phenotypes, potentially, because constraints such as resource limitation outweighed the benefit for colonies of producing larger individuals. The results suggest that plasticity in behavioral phenotypes can enable insect societies to respond to threats even when constraints prevent alteration of morphological phenotypes.
USDA-ARS?s Scientific Manuscript database
Multi-drug resistant bacteria are an increasing threat to human and animal health; to combat this threat, a reduction in the use of antimicrobials has been recommended. For reduction in drug usage to reduce the incidence of resistant bacteria, this requires that maintaining antimicrobial resistance...
76 FR 2151 - Assumption Buster Workshop: Defense-in-Depth is a Smart Investment for Cyber Security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-12
... debate of topics generally believed to be true to determine to what extent that claim is warranted. The adversarial nature of these debates is meant to ensure the threat environment is reflected in the discussion...
Rep. Kilmer, Derek [D-WA-6
2014-04-28
House - 07/01/2014 Referred to the Subcommittee on Intelligence, Emerging Threats & Capabilities. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Hypersonic Threats to the Homeland
2017-03-28
facilities. This defensive grid initiative can help stimulate R&D for hyper loop transportation and high speed railways for the aging infrastructure...Observe, Orient, Decide, Act (OODA) loop . In a tactical situation a warfighter makes decisions as he or she observes the environment; then the
Changing Our Ways of Thinking: Health Professionals and Nuclear Weapons.
ERIC Educational Resources Information Center
Neal, Mary
1984-01-01
Outlines the issues raised by health professionals concerned about the threat of nuclear weapons and nuclear war, including epidemics, civil defense, arms costs, psychosocial aspects, and ethical responsibility. Appendixes include lists of antinuclear organizations, medical professional associations, and 160 references. (SK)
78 FR 53736 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-30
...: Title, Associated Form and OMB Number: Defense Industrial Base Cyber Security/Information Assurance (DIB CS/IA) Cyber Incident Reporting; OMB Control Number 0704-0489. Type of Request: Reinstatement without.... The requested information supports the collaborative cyber threat information sharing and incident...
Genetic variation in anti-parasite behavior in oysters
USDA-ARS?s Scientific Manuscript database
Behavioral avoidance of disease-causing parasites provides a first line of defense against the threat of infection, particularly when hosts are exposed to free-living parasite stages in the external environment. We report that suspension-feeding oysters (Crassostrea virginica) respond to the presenc...
1989-11-01
and/or spill sites on Department of Defense (DoD) installations, and " Control hazards to human health, welfare, and the environment that may have...Investigations do not indicate harmful levels of contamination and do not pose a significant threat to human health or the environment. The site does not warrant...Feasibility Study - Investigation confirms the presence of contamination that may pose a threat to human health and/or the environment, and some sort of
Cybersecurity:The Road Ahead for Defense Acquisition
2016-06-01
tion programs. A key challenge for DoD acquisition addressing the cyber threat is how do we “ bake in” cybersecurity for our DoD ac- quisition programs...cybersecurity must be “ baked in” the design of our warfighting systems. Supporting policy and best practices for effective cyberse- curity in acquisition...contacted at steve.mills@dau.mil and steve.monks@ dau.mil. A key challenge for DoD acquisition addressing the cyber threat is how do we “ bake in” cybersecurity for our DoD acquisition programs vs. “bolting it on.”
2017-06-09
analysis method and focus on analyzing available documents while studying the separate but similar cases of Israel fighting Hezbollah in Lebanon and...two significant case studies will be reviewed. One deals with the conflict between Hezbollah and Israel Defense Forces (IDF) in Israel and Lebanon...Vietnam and in Operation Iraqi Freedom. Captain Houvinen in his research presented a case study from the Second Lebanon War based on the U.S. experience
Legislation Seeks to Protect Power Grid From Space Weather
NASA Astrophysics Data System (ADS)
Tretkoff, Ernie
2010-05-01
Proposed legislation would help protect the U.S. power grid against space weather and other threats. The Grid Reliability and Infrastructure Defense Act (GRID Act) would give the Federal Energy Regulatory Commission (FERC) authority to develop and enforce standards for power companies to protect the electric grid from geomagnetic storms and threats such as a terrorist attack using electromagnetic pulse (EMP) weapons. The act unanimously passed the U.S. House Committee on Energy and Commerce in April and will proceed to a vote in the full House of Representatives.
Interoceptive threat leads to defensive mobilization in highly anxiety sensitive persons.
Melzig, Christiane A; Holtz, Katharina; Michalowski, Jaroslaw M; Hamm, Alfons O
2011-06-01
To study defensive mobilization elicited by the exposure to interoceptive arousal sensations, we exposed highly anxiety sensitive students to a symptom provocation task. Symptom reports, autonomic arousal, and the startle eyeblink response were monitored during guided hyperventilation and a recovery period in 26 highly anxiety sensitive persons and 22 controls. Normoventilation was used as a non-provocative comparison condition. Hyperventilation led to autonomic arousal and a marked increase in somatic symptoms. While high and low anxiety sensitive persons did not differ in their defensive activation during hyperventilation, group differences were detected during early recovery. Highly anxiety sensitive students exhibited a potentiation of startle response magnitudes and increased autonomic arousal after hyper- as compared to after normoventilation, indicating defensive mobilization evoked by the prolonged presence of feared somatic sensations. Copyright © 2010 Society for Psychophysiological Research.
Taber, Jennifer M; Klein, William M P; Ferrer, Rebecca A; Lewis, Katie L; Harris, Peter R; Shepperd, James A; Biesecker, Leslie G
2015-08-01
Information avoidance is a defensive strategy that undermines receipt of potentially beneficial but threatening health information and may especially occur when threat management resources are unavailable. We examined whether individual differences in information avoidance predicted intentions to receive genetic sequencing results for preventable and unpreventable (i.e., more threatening) disease and, secondarily, whether threat management resources of self-affirmation or optimism mitigated any effects. Participants (N = 493) in an NIH study (ClinSeq®) piloting the use of genome sequencing reported intentions to receive (optional) sequencing results and completed individual difference measures of information avoidance, self-affirmation, and optimism. Information avoidance tendencies corresponded with lower intentions to learn results, particularly for unpreventable diseases. The association was weaker among individuals higher in self-affirmation or optimism, but only for results regarding preventable diseases. Information avoidance tendencies may influence decisions to receive threatening health information; threat management resources hold promise for mitigating this association.
Havko, Nathan E; Major, Ian T; Jewell, Jeremy B; Attaran, Elham; Browse, John; Howe, Gregg A
2016-01-15
Plant growth is often constrained by the limited availability of resources in the microenvironment. Despite the continuous threat of attack from insect herbivores and pathogens, investment in defense represents a lost opportunity to expand photosynthetic capacity in leaves and absorption of nutrients and water by roots. To mitigate the metabolic expenditure on defense, plants have evolved inducible defense strategies. The plant hormone jasmonate (JA) is a key regulator of many inducible defenses. Synthesis of JA in response to perceived danger leads to the deployment of a variety of defensive structures and compounds, along with a potent inhibition of growth. Genetic studies have established an important role for JA in mediating tradeoffs between growth and defense. However, several gaps remain in understanding of how JA signaling inhibits growth, either through direct transcriptional control of JA-response genes or crosstalk with other signaling pathways. Here, we highlight recent progress in uncovering the role of JA in controlling growth-defense balance and its relationship to resource acquisition and allocation. We also discuss tradeoffs in the context of the ability of JA to promote increased leaf mass per area (LMA), which is a key indicator of leaf construction costs and leaf life span.
Havko, Nathan E.; Major, Ian T.; Jewell, Jeremy B.; Attaran, Elham; Browse, John; Howe, Gregg A.
2016-01-01
Plant growth is often constrained by the limited availability of resources in the microenvironment. Despite the continuous threat of attack from insect herbivores and pathogens, investment in defense represents a lost opportunity to expand photosynthetic capacity in leaves and absorption of nutrients and water by roots. To mitigate the metabolic expenditure on defense, plants have evolved inducible defense strategies. The plant hormone jasmonate (JA) is a key regulator of many inducible defenses. Synthesis of JA in response to perceived danger leads to the deployment of a variety of defensive structures and compounds, along with a potent inhibition of growth. Genetic studies have established an important role for JA in mediating tradeoffs between growth and defense. However, several gaps remain in understanding of how JA signaling inhibits growth, either through direct transcriptional control of JA-response genes or crosstalk with other signaling pathways. Here, we highlight recent progress in uncovering the role of JA in controlling growth-defense balance and its relationship to resource acquisition and allocation. We also discuss tradeoffs in the context of the ability of JA to promote increased leaf mass per area (LMA), which is a key indicator of leaf construction costs and leaf life span. PMID:27135227
DHS S&T First Responders Group and NATO Counter UAS Proposal Interest Response.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Salton, Jonathan R.
The capability, speed, size, and widespread availability of small unmanned aerial systems (sUAS) makes them a serious security concern. The enabling technologies for sUAS are rapidly evolving and so too are the threats they pose to national security. Potential threat vehicles have a small cross-section, and are difficult to reliably detect using purely ground-based systems (e.g. radar or electro-optical) and challenging to target using conventional anti-aircraft defenses. Ground-based sensors are static and suffer from interference with the earth, vegetation and other man-made structures which obscure objects at low altitudes. Because of these challenges, sUAS pose a unique and rapidly evolvingmore » threat to national security.« less
Shame closely tracks the threat of devaluation by others, even across cultures.
Sznycer, Daniel; Tooby, John; Cosmides, Leda; Porat, Roni; Shalvi, Shaul; Halperin, Eran
2016-03-08
We test the theory that shame evolved as a defense against being devalued by others. By hypothesis, shame is a neurocomputational program tailored by selection to orchestrate cognition, motivation, physiology, and behavior in the service of: (i) deterring the individual from making choices where the prospective costs of devaluation exceed the benefits, (ii) preventing negative information about the self from reaching others, and (iii) minimizing the adverse effects of devaluation when it occurs. Because the unnecessary activation of a defense is costly, the shame system should estimate the magnitude of the devaluative threat and use those estimates to cost-effectively calibrate its activation: Traits or actions that elicit more negative evaluations from others should elicit more shame. As predicted, shame closely tracks the threat of devaluation in the United States (r = .69), India (r = .79), and Israel (r = .67). Moreover, shame in each country strongly tracks devaluation in the others, suggesting that shame and devaluation are informed by a common species-wide logic of social valuation. The shame-devaluation link is also specific: Sadness and anxiety-emotions that coactivate with shame-fail to track devaluation. To our knowledge, this constitutes the first empirical demonstration of a close, specific match between shame and devaluation within and across cultures.
Johns, Matthew C; Blazes, David L
2010-12-03
A cornerstone of effective global health surveillance programs is the ability to build systems that identify, track and respond to public health threats in a timely manner. These functions are often difficult and require international cooperation given the rapidity with which diseases cross national borders and spread throughout the global community as a result of travel and migration by both humans and animals. As part of the U.S. Armed Forces Health Surveillance Center (AFHSC), the Department of Defense's (DoD) Global Emerging Infections Surveillance and Response System (AFHSC-GEIS) has developed a global network of surveillance sites over the past decade that engages in a wide spectrum of support activities in collaboration with host country partners. Many of these activities are in direct support of International Health Regulations (IHR[2005]). The network also supports host country military forces around the world, which are equally affected by these threats and are often in a unique position to respond in areas of conflict or during complex emergencies. With IHR(2005) as the guiding framework for action, the AFHSC-GEIS network of international partners and overseas research laboratories continues to develop into a far-reaching system for identifying, analyzing and responding to emerging disease threats.
Shame closely tracks the threat of devaluation by others, even across cultures
Tooby, John; Cosmides, Leda; Porat, Roni; Shalvi, Shaul; Halperin, Eran
2016-01-01
We test the theory that shame evolved as a defense against being devalued by others. By hypothesis, shame is a neurocomputational program tailored by selection to orchestrate cognition, motivation, physiology, and behavior in the service of: (i) deterring the individual from making choices where the prospective costs of devaluation exceed the benefits, (ii) preventing negative information about the self from reaching others, and (iii) minimizing the adverse effects of devaluation when it occurs. Because the unnecessary activation of a defense is costly, the shame system should estimate the magnitude of the devaluative threat and use those estimates to cost-effectively calibrate its activation: Traits or actions that elicit more negative evaluations from others should elicit more shame. As predicted, shame closely tracks the threat of devaluation in the United States (r = .69), India (r = .79), and Israel (r = .67). Moreover, shame in each country strongly tracks devaluation in the others, suggesting that shame and devaluation are informed by a common species-wide logic of social valuation. The shame–devaluation link is also specific: Sadness and anxiety—emotions that coactivate with shame—fail to track devaluation. To our knowledge, this constitutes the first empirical demonstration of a close, specific match between shame and devaluation within and across cultures. PMID:26903649
Reactivity to unpredictable threat as a treatment target for fear-based anxiety disorders.
Gorka, S M; Lieberman, L; Klumpp, H; Kinney, K L; Kennedy, A E; Ajilore, O; Francis, J; Duffecy, J; Craske, M G; Nathan, J; Langenecker, S; Shankman, S A; Phan, K L
2017-10-01
Heightened reactivity to unpredictable threat (U-threat) is a core individual difference factor underlying fear-based psychopathology. Little is known, however, about whether reactivity to U-threat is a stable marker of fear-based psychopathology or if it is malleable to treatment. The aim of the current study was to address this question by examining differences in reactivity to U-threat within patients before and after 12-weeks of selective serotonin reuptake inhibitors (SSRIs) or cognitive-behavioral therapy (CBT). Participants included patients with principal fear (n = 22) and distress/misery disorders (n = 29), and a group of healthy controls (n = 21) assessed 12-weeks apart. A well-validated threat-of-shock task was used to probe reactivity to predictable (P-) and U-threat and startle eyeblink magnitude was recorded as an index of defensive responding. Across both assessments, individuals with fear-based disorders displayed greater startle magnitude to U-threat relative to healthy controls and distress/misery patients (who did not differ). From pre- to post-treatment, startle magnitude during U-threat decreased only within the fear patients who received CBT. Moreover, within fear patients, the magnitude of decline in startle to U-threat correlated with the magnitude of decline in fear symptoms. For the healthy controls, startle to U-threat across the two time points was highly reliable and stable. Together, these results indicate that startle to U-threat characterizes fear disorder patients and is malleable to treatment with CBT but not SSRIs within fear patients. Startle to U-threat may therefore reflect an objective, psychophysiological indicator of fear disorder status and CBT treatment response.
Bauer, Jessica
2016-01-01
Abstract Detecting past experiences with predators of a potential mate informs a female about prevailing ecological threats, in addition to stress-induced phenotypes that may be disseminated to offspring. We examined whether prior exposure of a male rat to a predator (cat) odor influences the attraction of a female toward a male, subsequent mother–infant interactions and the development of defensive (emotional) responses in the offspring. Females displayed less interest in males that had experienced predator odor. Mothers that reared young in larger, seminaturalistic housing provided more licking and grooming and active arched back-nursing behavior toward their offspring compared with dams housed in standard housing, although some effects interacted with paternal experience. Paternal predation risk and maternal rearing environment revealed sex-dependent differences in offspring wean weight, juvenile social interactions, and anxiety-like behavior in adolescence. Additionally, paternal predator experience and maternal housing independently affected variations in crf gene promoter acetylation and crf gene expression in response to an acute stressor in offspring. Our results show for the first time in mammals that variation among males in their predator encounters may contribute to stable behavioral variation among females in preference for mates and maternal care, even when the females are not directly exposed to predator threat. Furthermore, when offspring were exposed to the same threat experienced by the father, hypothalamic crf gene regulation was influenced by paternal olfactory experience and early housing. These results, together with our previous findings, suggest that paternal stress exposure and maternal rearing conditions can influence maternal behavior and the development of defensive responses in offspring. PMID:27896313
32 CFR Appendix to Part 173 - List of Contractors for Whom Certification Is Required
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false List of Contractors for Whom Certification Is Required Appendix to Part 173 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DEFENSE CONTRACTING COMPETITIVE INFORMATION CERTIFICATE AND PROFIT REDUCTION CLAUSE Pt. 173, App. Appendix...
32 CFR Appendix to Part 173 - List of Contractors for Whom Certification Is Required
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false List of Contractors for Whom Certification Is Required Appendix to Part 173 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DEFENSE CONTRACTING COMPETITIVE INFORMATION CERTIFICATE AND PROFIT REDUCTION CLAUSE Pt. 173, App. Appendix...
32 CFR Appendix to Part 173 - List of Contractors for Whom Certification Is Required
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false List of Contractors for Whom Certification Is Required Appendix to Part 173 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DEFENSE CONTRACTING COMPETITIVE INFORMATION CERTIFICATE AND PROFIT REDUCTION CLAUSE Pt. 173, App. Appendix...
32 CFR Appendix to Part 173 - List of Contractors for Whom Certification Is Required
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false List of Contractors for Whom Certification Is Required Appendix to Part 173 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DEFENSE CONTRACTING COMPETITIVE INFORMATION CERTIFICATE AND PROFIT REDUCTION CLAUSE Pt. 173, App. Appendix...
Stevens, Elizabeth S; Weinberg, Anna; Nelson, Brady D; Meissel, Emily E E; Shankman, Stewart A
2018-03-01
Attention-related abnormalities are key components of the abnormal defensive responding observed in panic disorder (PD). Although behavioral studies have found aberrant attentional biases towards threat in PD, psychophysiological studies have been mixed. Predictability of threat, an important feature of threat processing, may have contributed to these mixed findings. Additionally, anxiety sensitivity, a dimensional trait associated with PD, may yield stronger associations with cognitive processes than categorical diagnoses of PD. In this study, 171 participants with PD and/or depression and healthy controls completed a task that differentiated anticipation of predictable vs. unpredictable shocks, while startle eyeblink and event-related potentials (ERPs [N100, P300]) were recorded. In all participants, relative to the control condition, probe N100 was enhanced to both predictable and unpredictable threat, whereas P300 suppression was unique to predictable threat. Probe N100, but not P300, was associated with startle eyeblink during both threatening conditions, and was strongest for unpredictable threat. PD was not associated with ERPs, but anxiety sensitivity (physical concerns) was positively associated with probe N100 (indicating reduced responding) in the unpredictable condition independent of PD diagnosis. Vulnerability to panic-related psychopathology may be characterized by aberrant early processing of threat, which may be especially evident during anticipation of unpredictable threats. Copyright © 2017 Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Woodruff, Bruce E.
1976-01-01
A board member, says the Supreme Court, must be held to a standard of conduct based on knowledge of the basic unquestioned constitutional rights of his charges. The best defense against this serious liability threat is strict attention to due process and other relevant legal considerations. (Author/LBH)
Ballistic Missile Defense System (BMDS) Programmatic Environmental Impact Statement
2007-01-01
upon the fish for their nutrition , health, and economy. Additional studies need to be done to assess this potential threat to the Alaska...the Yucatan . (Lincoln et al., 1998) Several studies of bird migrations using NEXRAD (weather radar) have allowed researchers to estimate the
Jeffrey Garnas; David Houston; Matthew Ayres; Celia Evans
2009-01-01
Biotic threats to tree growth, survival, or reproduction often arise from interactions among a suite of species, primarily insects and fungi, that function together to varying degrees to defeat host defenses, secure resources, and infect...
Survey of Technologies Relevant to Defense From Near-Earth Objects
NASA Technical Reports Server (NTRS)
Adams, R. B.; Alexander, R.; Bonometti, J.; Chapman, J.; Fincher, S.; Hopkins, R.; Kalkstein, M.; Polsgrove, T.; Statham, G.; White, S.
2004-01-01
Several recent near-miss encounters with asteroids and comets have focused attention on the threat of a catastrophic impact with the Earth. This Technical Publication reviews the historical impact record and current understanding of the number and location of near-Earth objects (NEOs) to address their impact probability. Various ongoing projects intended to survey and catalog the NEO population are also reviewed. Details are given of a Marshall Space Flight Center-led study intended to develop and assess various candidate systems for protection of the Earth against NEOs. Details of analytical tools, trajectory tools, and a tool that was created to model both the undeflected inbound path of an NEO as well as the modified, postdeflection path are given. A representative selection of these possible options was modeled and evaluated. It is hoped that this study will raise the level of attention about this very real threat and also demonstrate that successful defense is both possible and practicable, provided appropriate steps are taken.
2002-01-01
The potential threat of biological warfare with a specific agent is proportional to the susceptibility of the population to that agent. Preventing disease after exposure to a biological agent is partially a function of the immunity of the exposed individual. The only available countermeasure that can provide immediate immunity against a biological agent is passive antibody. Unlike vaccines, which require time to induce protective immunity and depend on the host’s ability to mount an immune response, passive antibody can theoretically confer protection regardless of the immune status of the host. Passive antibody therapy has substantial advantages over antimicrobial agents and other measures for postexposure prophylaxis, including low toxicity and high specific activity. Specific antibodies are active against the major agents of bioterrorism, including anthrax, smallpox, botulinum toxin, tularemia, and plague. This article proposes a biological defense initiative based on developing, producing, and stockpiling specific antibody reagents that can be used to protect the population against biological warfare threats. PMID:12141970
Deficient aversive-potentiated startle and the triarchic model of psychopathy: The role of boldness.
Esteller, Àngels; Poy, Rosario; Moltó, Javier
2016-05-01
This study examined the contribution of the phenotypic domains of boldness, meanness, and disinhibition of the triarchic conceptualization of psychopathy (Patrick, Fowles, & Krueger, 2009) to deficient aversive-potentiated startle in a mixed-gender sample of 180 undergraduates. Eyeblink responses to noise probes were recorded during a passive picture-viewing task (erotica, neutral, threat, and mutilation). Deficient threat vs. neutral potentiation was uniquely related to increased boldness scores, thus suggesting that the diminished defensive reaction to aversive stimulation is specifically linked to the charm, social potency and venturesomeness features of psychopathy (boldness), but not to features such as callousness, coldheartedness and cruelty traits (meanness), even though both phenotypes theoretically share the same underlying low-fear disposition. Our findings provide further evidence of the differential association between distinct psychopathy components and deficits in defensive reactivity and strongly support the validity of the triarchic model of psychopathy in disentangling the etiology of this personality disorder. Copyright © 2016 Elsevier B.V. All rights reserved.
Malware and Disease: Lessons from Cyber Intelligence for Public Health Surveillance.
Smith, Frank L
2016-01-01
Malicious software and infectious diseases are similar is several respects, as are the functional requirements for surveillance and intelligence to defend against these threats. Given these similarities, this article compares and contrasts the actors, relationships, and norms at work in cyber intelligence and disease surveillance. Historical analysis reveals that civilian cyber defense is more decentralized, private, and voluntary than public health in the United States. Most of these differences are due to political choices rather than technical necessities. In particular, political resistance to government institutions has shaped cyber intelligence over the past 30 years, which is a troubling sign for attempts to improve disease surveillance through local, state, and federal health departments. Information sharing about malware is also limited, despite information technology being integral to cyberspace. Such limits suggest that automation through electronic health records will not automatically improve public health surveillance. Still, certain aspects of information sharing and analysis for cyber defense are worth emulating or, at the very least, learning from to help detect and manage health threats.
Malware and Disease: Lessons from Cyber Intelligence for Public Health Surveillance
Smith, Frank L.
2016-01-01
Malicious software and infectious diseases are similar is several respects, as are the functional requirements for surveillance and intelligence to defend against these threats. Given these similarities, this article compares and contrasts the actors, relationships, and norms at work in cyber intelligence and disease surveillance. Historical analysis reveals that civilian cyber defense is more decentralized, private, and voluntary than public health in the United States. Most of these differences are due to political choices rather than technical necessities. In particular, political resistance to government institutions has shaped cyber intelligence over the past 30 years, which is a troubling sign for attempts to improve disease surveillance through local, state, and federal health departments. Information sharing about malware is also limited, despite information technology being integral to cyberspace. Such limits suggest that automation through electronic health records will not automatically improve public health surveillance. Still, certain aspects of information sharing and analysis for cyber defense are worth emulating or, at the very least, learning from to help detect and manage health threats. PMID:27564783
1986-02-05
saries. When have these values -- freedom of individual citizens, democratically chosen governments, market economies, and a lawful international economic...to the plan of action for pene- trating a new market . In addition to the broad goals of the firm, strategy encompasses key operating policies by...threats on the other. A sustainable corporate strategy must match the particular strengths of the corporation with competitive forces in its markets
1984-05-01
Conflict; US efforts to overcome these difficulties_ statistics concerning hostile attacks against air bases and the results thereof (8]; and, a...buses. During the period from through 1973 the threat to ,air bacses iontinued, as reflected in the air base attack statistics provided ,at...advantage of aI r base vulnerabi lities to gather detailed intelligenrci concerning the air bases. C1 48 -STANDOFF ATTACKS- Based upon the statistics in
1984-05-16
in U.S. military planning , the West has to face growing threats in the peripheral zones, namely in those that are essential to the supply of raw...to a re-definition of U.S. strategic planning . In accordance with the ’Maritime strategy" of deployment from the U.S. territory of important military...Socialist Party, and the editor of the Communist daily, O’Diario, Miguel Urbano Rodriques. Neutralist doctrines are abundantly expressed in Liber 25
2009-05-20
Advanced Composite Cargo Aircraft ( ACCA ) platform to assess and validate the structural behavior and cost impact of using large out-of-autoclave...capabilities to fight the current and future wars 3. Improving our acquisition capabilities and accountability . The Department of Defense S&T budget...In fact, the S&T program fared well in comparison to many other discretionary accounts . For instance, the RDT&E budget categories of Advanced
Evolution of Host Defense against Multiple Enemy Populations.
Toor, Jaspreet; Best, Alex
2016-03-01
Natural and managed populations are embedded within complex ecological communities, where they face multiple enemies. Experimental studies have shown that the evolution of host defense mechanisms to a focal enemy is impacted by the surrounding enemy community. Theoretically, the evolution of host defenses against a single enemy population, typically parasites, has been widely studied, but only recently has the impact of community interactions on host-parasite evolution been looked at. In this article, we theoretically examine the evolutionary behavior of a host population that must allocate defenses between two enemy populations, parasites and predators, with defense against one enemy constraining defense against the other. We show that in simpler models the composition of the enemy community plays the key role in determining the defense strategy of the hosts, with the hosts building up defenses against the enemy population posing a larger threat. However, this simple driver is shown to break down when there is significant recovery and reproduction from infected hosts. Additionally, we find that most host diversity is likely to occur when there is a combined high risk of infection and predation, in common with experimental studies. Our results therefore provide vital insight into the ecological feedbacks that drive the evolution of host defense against multiple enemy populations.
Towards an integrated defense system for cyber security situation awareness experiment
NASA Astrophysics Data System (ADS)
Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe
2015-05-01
In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.
Strategic Defense Initiative Organization adaptive structures program overview
NASA Astrophysics Data System (ADS)
Obal, Michael; Sater, Janet M.
In the currently envisioned architecture none of the Strategic Defense System (SDS) elements to be deployed will receive scheduled maintenance. Assessments of performance capability due to changes caused by the uncertain effects of environments will be difficult, at best. In addition, the system will have limited ability to adjust in order to maintain its required performance levels. The Materials and Structures Office of the Strategic Defense Initiative Organization (SDIO) has begun to address solutions to these potential difficulties via an adaptive structures technology program that combines health and environment monitoring with static and dynamic structural control. Conceivable system benefits include improved target tracking and hit-to-kill performance, on-orbit system health monitoring and reporting, and threat attack warning and assessment.
An Anticipatory and Deceptive AI Utilizing Bayesian Belief Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lake, Joe E; Allgood, Glenn O; Olama, Mohammed M
The U.S. military defines antiterrorism as the defensive posture taken against terrorist threats. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, interdicting an event in progress, and ultimately mitigating and managing the consequences of an event. Recent events highlight the need for efficient tools for training our military and homeland security officers for anticipating threats posed by terrorists. These tools need to be easy enough so that they are readily usable without substantial training, but still maintain the complexity to allow for a level of deceptive reasoning on the part of themore » opponent. To meet this need, we propose to integrate a Bayesian Belief Network (BBN) model for threat anticipation and deceptive reasoning into training simulation environments currently utilized by several organizations within the Department of Defense (DoD). BBNs have the ability to deal with various types of uncertainties; such as identities, capabilities, target attractiveness, and the combinations of the previous. They also allow for disparate types of data to be fused in a coherent, analytically defensible, and understandable manner. A BBN has been developed by ORNL uses a network engineering process that treats the probability distributions of each node with in the broader context of the system development effort as a whole, and not in isolation. The network will be integrated into the Research Network Inc,(RNI) developed Game Distributed Interactive Simulation (GDIS) as a smart artificial intelligence module. GDIS is utilized by several DoD and civilian organizations as a distributed training tool for a multiplicity of reasons. It has garnered several awards for its realism, ease of use, and popularity. One area that it still has room to excel in, as most video training tools do, is in the area of artificial intelligence of opponent combatants. It is believed that by utilizing BBN as the backbone of the artificial intelligence code, a more realistic and helpful training experience will be available and enemy combatants that move and strategize with purpose will be obtained.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
... Development or Prototype Units (DFARS Case 2009-D034) AGENCY: Defense Acquisition Regulations System... the procurement of prototype units. The DFARS implementation places specific limits, in accordance... components or the procurement of prototype units. IV. Paperwork Reduction Act The Paperwork Reduction Act...
Sandia National Laboratories: Facts & Figures
Technology Partnerships Business, Industry, & Non-Profits Government Universities Center for Development Agreement (CRADA) Strategic Partnership Projects, Non-Federal Entity (SPP/NFE) Agreements New 1,615.2 Defense Nuclear Nonproliferation 204.2 Other NNSA 1.2 NON-NNSA DOE 2,061.1M Energy & Threat
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-05
... (DHS), Science and Technology, Protected Repository for the Defense of Infrastructure Against Cyber Threats (PREDICT) Program AGENCY: Science and Technology Directorate, DHS. ACTION: 30-Day notice and request for comment. SUMMARY: The Department of Homeland Security (DHS), Science & Technology (S&T...
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
Transformation in Russian and Soviet Military History,
1986-10-01
Allen & Unwin, 1981. (UA 770 .3667) Leighton, Marian K. The Soviet threat to NATO’s northern flank. New York: National Strategy Information Center...J66: 13/66305) 48 REPORT LITERATURE Baird , Gregory C. Soviet intermediary strategic C2 entities: the historical experience. Washington, D.C.: Defense
Coconut leaf bioactivity toward generalist maize insect pests
USDA-ARS?s Scientific Manuscript database
Tropical plants are often more resistant to insects than temperate plants due to evolution of robust defenses to cope with a more constant insect threat. Coconut (Cocos nucifera L.) has very few chewing leaf feeding insect pests and was tested against two omnivorous leaf feeding caterpillar species,...
Defense Implications of a Nuclear Iran for Turkey
2007-12-01
firms including Atomic Energy of Canada, Kraftwerk Union of Germany, and General Electric of the United States. Negotiations with General Electric...ended prematurely since, according to the firm, a reactor in Sinop would not be feasible due to seismic threats in Black Sea. The German firm Kraftwerk
77 FR 57567 - Single Source Cooperative Agreement Award for World Health Organization
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-18
... DEPARTMENT OF HEALTH AND HUMAN SERVICES Single Source Cooperative Agreement Award for World Health Organization AGENCY: Department of Health and Human Services (HHS), Assistant Secretary for Preparedness and... collective defense against transnational threats. States Parties to the U.N. have [[Page 57568
The National Bio- and Agro-Defense Facility: Issues for Congress
2008-04-03
focus on foot and mouth disease (FMD), classical swine fever , African swine fever , Rift Valley fever , Nipah virus, Hendra virus, contagious bovine...Report RL32521, Agroterrorism: Threats and Preparedness, by Jim Monke. 2 Examples include influenza, plague, West Nile Virus, and Rift Valley Fever . 3
Non-Traditional Security Threats and Asia-Pacific Regional Cooperation
2012-08-01
Cuba; Deputy Director, Office of the Secretary of Defense Bosnian Task Force; and for the Deputy Under Secretary of the Air Force in International...difficult challenge of discriminating between civil wars, wars of external aggression, and genocide . The world has taken a clear position on genocide
USN shipboard infrared search and track (IRST) program
NASA Astrophysics Data System (ADS)
Misanin, Joseph E.
1997-08-01
On May 17, 1987 two EXOCET missiles hit and crippled the frigate USS STARK. Thirty seven sailors lost their lives due to the inability of the ship to defend itself against a sea- skimming cruise missile attack. In 1991, as a result of this incident, Congress mandated the establishment of a Program Executive Office for Ship Self Defense. The purpose of the legislation was to preclude another incident by placing a high priority on the combat system engineering process used to design and field the anti-ship cruise missile (ASCM) defense capability of surface ships. Over 35 countries now have sea- skimming ASCMs and this type of threat continues to proliferate. The use of IRST is a critical element of ship self defense, providing early and reliable detection of sea- skimming cruise missiles. This paper describes the contribution of IRST in providing self-defense and the current status of the United States Navy (USN) shipboard IRST development program.
Xiong, Xiaorui R; Liang, Feixue; Zingg, Brian; Ji, Xu-ying; Ibrahim, Leena A; Tao, Huizhong W; Zhang, Li I
2015-06-11
Defense against environmental threats is essential for animal survival. However, the neural circuits responsible for transforming unconditioned sensory stimuli and generating defensive behaviours remain largely unclear. Here, we show that corticofugal neurons in the auditory cortex (ACx) targeting the inferior colliculus (IC) mediate an innate, sound-induced flight behaviour. Optogenetic activation of these neurons, or their projection terminals in the IC, is sufficient for initiating flight responses, while the inhibition of these projections reduces sound-induced flight responses. Corticocollicular axons monosynaptically innervate neurons in the cortex of the IC (ICx), and optogenetic activation of the projections from the ICx to the dorsal periaqueductal gray is sufficient for provoking flight behaviours. Our results suggest that ACx can both amplify innate acoustic-motor responses and directly drive flight behaviours in the absence of sound input through corticocollicular projections to ICx. Such corticofugal control may be a general feature of innate defense circuits across sensory modalities.