2017-06-09
MONGOLIA’S ECONOMIC SECURITY: HOW CAN ECONOMIC DEVELOPMENT FURTHER SUPPORT MONGOLIAN NATIONAL SECURITY THROUGH DEVELOPING ITS MINING SECTOR... Economic Security: How can Economic Development Further Support Mongolian National Security through Developing its Mining Sector? 5a. CONTRACT NUMBER...geographic position between two political and economic powers (China and Russia) provides both opportunities and disadvantages for Mongolia’s economy
Student Experiential Opportunities in National Security Careers
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2007-12-31
This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private andmore » public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2008-04-30
This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.
Input from Key Stakeholders in the National Security Technology Incubator
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.
National Security Technology Incubator Business Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with nationalmore » security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Erickson, Michael Charles
Los Alamos National Security, LLC (LANS) is the manager and operator of the Los Alamos National Laboratory for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. LANS is a mission-centric Federally Funded Research and Development Center focused on solving the most critical national security challenges through science and engineering for both government and private customers.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-04-01
This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important tomore » leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.« less
Small Technology Business Incubation Needs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2007-12-31
This report contains a summary of typical business incubation needs of small technology companies. This document will serve as a guide in the design and implementation of services offered by the National Security Technology Incubator (NSTI), an incubator program being designed and developed as part of the National Security Preparedness Project (NSPP), performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the methodology used to perform the needs assessment and services proposed to meet the needs of client companies. The purpose of the NSPP is to promote national security technologiesmore » through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland.« less
National Security Technology Incubator Evaluation Process
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages ofmore » early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.« less
40 CFR 211.110-2 - National security exemptions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a) A new product which is produced to conform with specifications developed by national security agency... security exemption shall be void ab initio with respect to each new product, originally intended for a...
Marketing Plan for the National Security Technology Incubator
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubatormore » program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-02-01
This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes.more » These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.« less
Neuroscience, ethics, and national security: the state of the art.
Tennison, Michael N; Moreno, Jonathan D
2012-01-01
National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.
Sandia National Laboratories: National Security Missions: Defense Systems
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Neuroscience, Ethics, and National Security: The State of the Art
Tennison, Michael N.; Moreno, Jonathan D.
2012-01-01
National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security. PMID:22448146
40 CFR 204.5-2 - National security exemptions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... exemptions. (a) A new product which is produced to conform with specifications developed by a national security agency, and so labeled or marked on the outside of the container and on the product itself, shall... national security exemption shall be void ab initio with respect to each new product, originally intended...
American History and National Security: Supplementary Lessons for High School Courses.
ERIC Educational Resources Information Center
Patrick, John J., Ed.; And Others
Effective citizen participation implies the acquisition of skills and knowledge necessary for discussing and deciding national security issues. This book was developed to provide teachers with resources to design and strengthen national security education. The 30 self-contained lessons supplement and enrich current textbook treatment of national…
National Security Technology Incubation Strategic Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achievingmore » sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to succeed, it must have sustainable competitive advantages in seven key areas: geography, products and businesses, distribution, sales and service culture, efficiency, brand, and most important, people. The four strategic goals of the plan are to: 1. Identify and recruit small businesses with technology applications for national security. 2. Design and implement a national security incubator program that provides incubator services and physical space for the targeted businesses. 3. Provide business assistance and technical leadership to NSTI clients to assist in bringing their products to market. 4. Construct a new multi-tenant facility with dedicated physical space for businesses with technology applications for national security.« less
Security: Progress and Challenges
ERIC Educational Resources Information Center
Luker, Mark A.
2004-01-01
The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…
Shelton, Shoshana R; Connor, Kathryn; Uscher-Pines, Lori; Pillemer, Francesca Matthews; Mullikin, James M; Kellermann, Arthur L
2012-12-01
The federal government plays a critical role in achieving national health security by providing strategic guidance and funding research to help prevent, respond to, mitigate, and recover from disasters, epidemics, and acts of terrorism. In this article we describe the first-ever inventory of nonclassified national health security-related research funded by civilian agencies of the federal government. Our analysis revealed that the US government's portfolio of health security research is currently weighted toward bioterrorism and emerging biological threats, laboratory methods, and development of biological countermeasures. Eight of ten other priorities identified in the Department of Health and Human Services' National Health Security Strategy-such as developing and maintaining a national health security workforce or incorporating recovery into planning and response-receive scant attention. We offer recommendations to better align federal spending with health security research priorities, including the creation of an interagency working group charged with minimizing research redundancy and filling persistent gaps in knowledge.
2017-05-25
operate independently without external nation support; (3) a custom approach is necessary in security forces development based on political requirements...independently without external nation support; (3) a custom approach is necessary in security forces development based on political requirements...interventions both successful and unsuccessful, that an external country must craft a custom approach to develop local security forces based on the
A model for international border management systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duggan, Ruth Ann
2008-09-01
To effectively manage the security or control of its borders, a country must understand its border management activities as a system. Using its systems engineering and security foundations as a Department of Energy National Security Laboratory, Sandia National Laboratories has developed such an approach to modeling and analyzing border management systems. This paper describes the basic model and its elements developed under Laboratory Directed Research and Development project 08-684.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pepper, Susan E.
2014-10-10
Brookhaven National Laboratory’s (BNL’s) Nonproliferation and National Security Department contributes to the National Nuclear Security Administration Office of Nonproliferation and International Security Next Generation Safeguards Initiative (NGSI) through university engagement, safeguards internships, safeguards courses, professional development, recruitment, and other activities aimed at ensuring the next generation of international safeguards professionals is adequately prepared to support the U.S. safeguards mission. This report is a summary of BNL s work under the NGSI program in Fiscal Year 2014.
TCIA Secure Cyber Critical Infrastructure Modernization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keliiaa, Curtis M.
The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Halbgewachs, Ronald D.; Chavez, Adrian R.
Process Control System (PCS) and Industrial Control System (ICS) security is critical to our national security. But there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. Sandia National Laboratories has performed the research and development of the OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy Office of Electricity Delivery and Energy Reliability (DOE/OE), to address this issue. OPSAID is an open-source architecture for PCS/ICS security that provides a design basis for vendors to build add-on security devices for legacy systems, whilemore » providing a path forward for the development of inherently-secure PCS elements in the future. Using standardized hardware, a proof-of-concept prototype system was also developed. This report describes the improvements and capabilities that have been added to OPSAID since an initial report was released. Testing and validation of this architecture has been conducted in another project, Lemnos Interoperable Security Project, sponsored by DOE/OE and managed by the National Energy Technology Laboratory (NETL).« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-05
...This Request for Information (RFI) notice informs the public that the Department of Homeland Security's (DHS) Science and Technology Directorate (S&T) is currently developing a National Critical Infrastructure Security and Resilience Research and Development Plan (NCISR R&D Plan) to conform to the requirements of Presidential Policy Directive 21, Critical Infrastructure Security and Resilience. As part of a comprehensive national review process, DHS solicits public comment on issues or language in the NCISR R&D Plan that need to be included. Critical infrastructure includes both cyber and physical components, systems, and networks for the sixteen established ``critical infrastructures''.
Global water risks and national security: Building resilience (Invited)
NASA Astrophysics Data System (ADS)
Pulwarty, R. S.
2013-12-01
The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere, and (3) Identify preventable risks, public leadership and private innovation needed for developing adaptive water resource management institutions that take advantage of climate and hydrologic information and changes. The presentation will conclude with a preliminary framework for assessing and implementing water security measures given insecure conditions introduced by a changing climate and in the context of national security.
National Security and Information Technology: The New Regulatory Option?
ERIC Educational Resources Information Center
Irwin, Manley R.
1987-01-01
Summarizes recent developments in information technology research and development, telecommunication services, telephone manufacturing, telecommunication networks, information processing, and U.S. import/export policy. It is concluded that government regulation as a policy strategy depends on how one defines national security. (Author/CLB)
Integration of Civilian and Army Research and Development
1949-05-24
top level impairs the et.:reati veness of the over-all program. for national security. b. Proposals to establish a National Science Foundation directly...deVJelopments in their respective branches. 5. CONOLUSIONS.--a. That a National Science Foundation designed to provide policy direction and control...development. 6. ACTION REOOMMENDED.-a. That the Armed Forces renew their efforts to secure the establishment of a National Science Foundation . b. That
Counter-Intelligence as a Chaotic Phenomenon and Its Importance in National Security
NASA Astrophysics Data System (ADS)
Kuloğlu, Gökhan; Gül, Zakir; Erçetin, Şefika Şule
In today's rapidly changing globalized world, remarkably fast and important developments have been faced in the area of national security as in almost all other areas. Advancements in communication and transportation technologies have removed physical boundaries almost completely. National security institutions now have to fight against new and complicated security threats that go beyond the boundaries such as organized crimes and terror crimes. These ever-changing threats and dangerous environment which become more and more complex every single day force nations to review their current security structures and to take new and effective measures in the required areas in order to ensure their national security. As a matter of fact, counter-intelligence, which was quite important due to the frequency of spying acts during the Cold War but lost its importance after the Cold War had ended, has been one of these measures. Today, counterintelligence has once again become one of the most important functions in the fight against national security threats with changing dimensions. It is only possible for a nation to ensure its national security fully by having not only a defensive and passive approach but also offensive counter-intelligence.
EPA/ORD NATIONAL EXPOSURE RESEARCH LABORATORY MEASUREMENT SCIENCE SUPPORT FOR HOMELAND SECURITY
This product describes the National Exposure Research Laboratory research and development support for homeland security through the proposed National Exposure Measurements Center (NEMC). Key NEMC functional areas depicted in this poster are: standardized analytical method develo...
Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy
2011-05-15
attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks
Marketing Plan for Demonstration and Validation Assets
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
The National Security Preparedness Project (NSPP), is to be sustained by various programs, including technology demonstration and evaluation (DEMVAL). This project assists companies in developing technologies under the National Security Technology Incubator program (NSTI) through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. This report documents the DEMVAL marketing and visibility plan, which will focus on collecting information about, and expanding the visibility of, DEMVAL assets serving businesses with national security technology applications in southern New Mexico.
Sandia National Laboratories: National Security Missions: Defense Systems
Technology Partnerships Business, Industry, & Non-Profits Government Universities Center for Development Agreement (CRADA) Strategic Partnership Projects, Non-Federal Entity (SPP/NFE) Agreements New leadership for the national security community by delivering cutting-edge experimental and operational sensor
47 CFR 202.2 - Criteria and guidance.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... can best be accomplished by centralized policy development, planning, and broad direction. Detailed... policies, procedures and responsibilities as described in parts 211 and 213 of this chapter. (c) The Nation...
47 CFR 202.2 - Criteria and guidance.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... can best be accomplished by centralized policy development, planning, and broad direction. Detailed... policies, procedures and responsibilities as described in parts 211 and 213 of this chapter. (c) The Nation...
47 CFR 202.2 - Criteria and guidance.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... can best be accomplished by centralized policy development, planning, and broad direction. Detailed... policies, procedures and responsibilities as described in parts 211 and 213 of this chapter. (c) The Nation...
47 CFR 202.2 - Criteria and guidance.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... can best be accomplished by centralized policy development, planning, and broad direction. Detailed... policies, procedures and responsibilities as described in parts 211 and 213 of this chapter. (c) The Nation...
Post-Cold War Science and Technology at Los Alamos
NASA Astrophysics Data System (ADS)
Browne, John C.
2002-04-01
Los Alamos National Laboratory serves the nation through the development and application of leading-edge science and technology in support of national security. Our mission supports national security by: ensuring the safety, security, and reliability of the U.S. nuclear stockpile; reducing the threat of weapons of mass destruction in support of counter terrorism and homeland defense; and solving national energy, environment, infrastructure, and health security problems. We require crosscutting fundamental and advanced science and technology research to accomplish our mission. The Stockpile Stewardship Program develops and applies, advanced experimental science, computational simulation, and technology to ensure the safety and reliability of U.S. nuclear weapons in the absence of nuclear testing. This effort in itself is a grand challenge. However, the terrorist attack of September 11, 2001, reminded us of the importance of robust and vibrant research and development capabilities to meet new and evolving threats to our national security. Today through rapid prototyping we are applying new, innovative, science and technology for homeland defense, to address the threats of nuclear, chemical, and biological weapons globally. Synergistically, with the capabilities that we require for our core mission, we contribute in many other areas of scientific endeavor. For example, our Laboratory has been part of the NASA effort on mapping water on the moon and NSF/DOE projects studying high-energy astrophysical phenomena, understanding fundamental scaling phenomena of life, exploring high-temperature superconductors, investigating quantum information systems, applying neutrons to condensed-matter and nuclear physics research, developing large-scale modeling and simulations to understand complex phenomena, and exploring nanoscience that bridges the atomic to macroscopic scales. In this presentation, I will highlight some of these post-cold war science and technology advances including our national security contributions, and discuss some of challenges for Los Alamos in the future.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This report documents the research that has been undertaken as background for preparation of a marketing campaign for middle and high school students to increase interest in national security careers at the National Nuclear Security Administration. This work is a part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. Previous research on the development of a properly trained and skilled national security workforce has identified a lack of interest by k-12 students in the STEM (Science, Technology, Engineering, and Mathematics) fields. Further, participation in these careers by womenmore » and minority populations is limited and is not increasing. Added to this are low educational achievement levels in New Mexico, where the marketing campaign will be deployed.« less
2009-06-12
x6x75745r2140160 (accessed November 17, 2008). Haggblade, Steven, Peter B. R. Hazell, and Thomas Reardon. Transforming the Rural Nonfarm Economy...Commander‘s Posture Statement to Congress, recognize the role of economic development and liberalized trade in promoting global and regional security...National Security Strategy down to the SOUTHCOM Commander‘s Posture Statement to Congress, recognize the role of economic development and liberalized trade
ERIC Educational Resources Information Center
Social and Labour Bulletin, 1983
1983-01-01
This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)
Advances in radiation detection technologies for responders.
Unterweger, Michael P; Pibida, Leticia S
2005-11-01
The Department of Homeland Security is supporting the development of a large number of standards for first responders. In the area of detection of radioactive and nuclear materials, four new standards (ANSI N42.32, N42.33, N42.34, and N42.35) and their corresponding test and evaluation protocols were developed to meet Department of Homeland Security needs. Testing of the standards and protocols was carried out at the National Institute of Standards and Technology, Oak Ridge National Laboratory, Pacific Northwest National Laboratory, Los Alamos National Laboratory, and Lawrence Livermore National Laboratory.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-02
... methodology developed by NationsShares, a firm that develops proprietary derivatives-based indexes and options... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To List Options... the Exchange of options on the Nations VolDex index, a new index that measures changes in implied...
Security Assistance Dependence - Wielding American Power
2002-12-09
national security objectives. One vehicle of this power brokering is the well-developed international security assistance program – oftentimes...incorrectly referred to exclusively as foreign military sales. There is nothing simple about the security assistance program as it has developed today...For the USG, there are many agencies influencing today’s security assistance program to execute complex, integrated tasks directly impacting U.S
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, G.; Mansur, D.L.; Ruhter, W.D.
1994-10-01
This report presents the details of the Lawrence Livermore National Laboratory safeguards and securities program. This program is focused on developing new technology, such as x- and gamma-ray spectrometry, for measurement of special nuclear materials. This program supports the Office of Safeguards and Securities in the following five areas; safeguards technology, safeguards and decision support, computer security, automated physical security, and automated visitor access control systems.
Malka, Ariel; Soto, Christopher J; Inzlicht, Michael; Lelkes, Yphtach
2014-06-01
We examine whether individual differences in needs for security and certainty predict conservative (vs. liberal) position on both cultural and economic political issues and whether these effects are conditional on nation-level characteristics and individual-level political engagement. Analyses with cross-national data from 51 nations reveal that valuing conformity, security, and tradition over self-direction and stimulation (a) predicts ideological self-placement on the political right, but only among people high in political engagement and within relatively developed nations, ideologically constrained nations, and non-Eastern European nations, (b) reliably predicts right-wing cultural attitudes and does so more strongly within developed and ideologically constrained nations, and (c) on average predicts left-wing economic attitudes but does so more weakly among people high in political engagement, within ideologically constrained nations, and within non-Eastern European nations. These findings challenge the prevailing view that needs for security and certainty organically yield a broad right-wing ideology and that exposure to political discourse better equips people to select the broad ideology that is most need satisfying. Rather, these findings suggest that needs for security and certainty generally yield culturally conservative but economically left-wing preferences and that exposure to political discourse generally weakens the latter relation. We consider implications for the interactive influence of personality characteristics and social context on political attitudes and discuss the importance of assessing multiple attitude domains, assessing political engagement, and considering national characteristics when studying the psychological origins of political attitudes.
Sandia National Laboratories: National Security Missions: International
Weapons Safety & Security Weapons Science & Technology Defense Systems & Assessments About Directed Research & Development Technology Deployment Centers Working With Sandia Working With Sandia Payable Contract Information Construction & Facilities Contract Audit Sandia's Economic Impact
Noonan, Vanessa K; Thorogood, Nancy P; Joshi, Phalgun B; Fehlings, Michael G; Craven, B Catharine; Linassi, Gary; Fourney, Daryl R; Kwon, Brian K; Bailey, Christopher S; Tsai, Eve C; Drew, Brian M; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F
2013-05-01
Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. Copyright © 2013 Longwoods Publishing.
Noonan, Vanessa K.; Thorogood, Nancy P.; Joshi, Phalgun B.; Fehlings, Michael G.; Craven, B. Catharine; Linassi, Gary; Fourney, Daryl R.; Kwon, Brian K.; Bailey, Christopher S.; Tsai, Eve C.; Drew, Brian M.; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F.
2013-01-01
Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. PMID:23968640
Neutron and Gamma Imaging for National Security Applications
NASA Astrophysics Data System (ADS)
Hornback, Donald
2017-09-01
The Department of Energy, National Nuclear Security Administration (NNSA), Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D/NA-22) possesses, in part, the mission to develop technologies in support of nuclear security efforts in coordination with other U.S. government entities, such as the Department of Defense and the Department of Homeland Security. DNN R&D has long supported research in nuclear detection at national labs, universities, and through the small business innovation research (SBIR) program. Research topics supported include advanced detector materials and electronics, detection algorithm development, and advanced gamma/neutron detection systems. Neutron and gamma imaging, defined as the directional detection of radiation as opposed to radiography, provides advanced detection capabilities for the NNSA mission in areas of emergency response, international safeguards, and nuclear arms control treaty monitoring and verification. A technical and programmatic overview of efforts in this field of research will be summarized.
NASA Technical Reports Server (NTRS)
Hakimdavar, Raha; Wood, Danielle; Eylander, John; Peters-Lidard, Christa; Smith, Jane; Doorn, Brad; Green, David; Hummel, Corey; Moore, Thomas C.
2018-01-01
River basins for which transboundary coordination and governance is a factor are of concern to US national security, yet there is often a lack of sufficient data-driven information available at the needed time horizons to inform transboundary water decision-making for the intelligence, defense, and foreign policy communities. To address this need, a two-day workshop entitled Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Global Water Security was held in August 2017 in Maryland. The committee that organized and convened the workshop (the Organizing Committee) included representatives from the National Aeronautics and Space Administration (NASA), the US Army Corps of Engineers Engineer Research and Development Center (ERDC), and the US Air Force. The primary goal of the workshop was to advance knowledge on the current US Government and partners' technical information needs and gaps to support national security interests in relation to transboundary water. The workshop also aimed to identify avenues for greater communication and collaboration among the scientific, intelligence, defense, and foreign policy communities. The discussion around transboundary water was considered in the context of the greater global water challenges facing US national security.
Instrumentation, Control, and Intelligent Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2005-09-01
Abundant and affordable energy is required for U.S. economic stability and national security. Advanced nuclear power plants offer the best near-term potential to generate abundant, affordable, and sustainable electricity and hydrogen without appreciable generation of greenhouse gases. To that end, Idaho National Laboratory (INL) has been charged with leading the revitalization of nuclear power in the U.S. The INL vision is to become the preeminent nuclear energy laboratory with synergistic, world-class, multi-program capabilities and partnerships by 2015. The vision focuses on four essential destinations: (1) Be the preeminent internationally-recognized nuclear energy research, development, and demonstration laboratory; (2) Be a majormore » center for national security technology development and demonstration; (3) Be a multi-program national laboratory with world-class capabilities; (4) Foster academic, industry, government, and international collaborations to produce the needed investment, programs, and expertise. Crucial to that effort is the inclusion of research in advanced instrumentation, control, and intelligent systems (ICIS) for use in current and advanced power and energy security systems to enable increased performance, reliability, security, and safety. For nuclear energy plants, ICIS will extend the lifetime of power plant systems, increase performance and power output, and ensure reliable operation within the system's safety margin; for national security applications, ICIS will enable increased protection of our nation's critical infrastructure. In general, ICIS will cost-effectively increase performance for all energy security systems.« less
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1983-01-01
This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.
Sandia National Laboratories: National Security Missions: International
; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & ; Development Technology Deployment Centers Working With Sandia Working With Sandia Prospective Suppliers What Information Construction & Facilities Contract Audit Sandia's Economic Impact Licensing & Technology
Sandia National Laboratories: National Security Missions: International
Programs Environmental Responsibility Environmental Management System Pollution Prevention History 60 ; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & ; Development Technology Deployment Centers Working With Sandia Working With Sandia Prospective Suppliers What
ERIC Educational Resources Information Center
McLean, Scott; Gasperini, Lavinia; Rudgard, Stephen
2002-01-01
The distance learning experiences of the United Nations Food and Agriculture Organization led to the following suggestions for applying distance learning strategies to the challenges of food security and rural development: use distance learning for the right reasons, be sensitive to context, use existing infrastructure, engage stakeholders, and…
Climate change and food security in East Asia.
Su, Yi-Yuan; Weng, Yi-Hao; Chiu, Ya-Wen
2009-01-01
Climate change causes serious food security risk for East Asian countries. The United Nations Framework Convention on Climate Change (UNFCCC) has recognized that the climate change will impact agriculture and all nations should prepare adaptations to the impacts on food security. This article reviews the context of adaptation rules and current policy development in East Asian region. The UNFCCC and Kyoto Protocol have established specific rules for countries to develop national or regional adaptation policies and measurements. The current development of the ASEAN Strategic Plan on food security is inspiring, but the commitments to implementation by its members remain an issue of concern. We suggest that the UNFCCC enhances co-operation with the Food and Agriculture Organization (FAO) and other international organizations to further develop methodologies and technologies for all parties. Our findings suggest that agriculture is one of the most vulnerable sectors in terms of risks associated with climate change and distinct programmatic initiatives are necessary. It's imperative to promote co-operation among multilateral organizations, including the UNFCCC, FAO, World Health Organization, and others.
Sandia National Laboratories proof-of-concept robotic security vehicle
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harrington, J.J.; Jones, D.P.; Klarer, P.R.
1989-01-01
Several years ago Sandia National Laboratories developed a prototype interior robot that could navigate autonomously inside a large complex building to air and test interior intrusion detection systems. Recently the Department of Energy Office of Safeguards and Security has supported the development of a vehicle that will perform limited security functions autonomously in a structured exterior environment. The goal of the first phase of this project was to demonstrate the feasibility of an exterior robotic vehicle for security applications by using converted interior robot technology, if applicable. An existing teleoperational test bed vehicle with remote driving controls was modified andmore » integrated with a newly developed command driving station and navigation system hardware and software to form the Robotic Security Vehicle (RSV) system. The RSV, also called the Sandia Mobile Autonomous Navigator (SANDMAN), has been successfully used to demonstrate that teleoperated security vehicles which can perform limited autonomous functions are viable and have the potential to decrease security manpower requirements and improve system capabilities. 2 refs., 3 figs.« less
Homeland Security and Information.
ERIC Educational Resources Information Center
Relyea, Harold C.
2002-01-01
Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)
Test and Demonstration Assets of New Mexico
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This document was developed by the Arrowhead Center of New Mexico State University as part of the National Security Preparedness Project (NSPP), funded by a DOE/NNSA grant. The NSPP has three primary components: business incubation, workforce development, and technology demonstration and validation. The document contains a survey of test and demonstration assets in New Mexico available for external users such as small businesses with security technologies under development. Demonstration and validation of national security technologies created by incubator sources, as well as other sources, are critical phases of technology development. The NSPP will support the utilization of an integrated demonstrationmore » and validation environment.« less
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1983-01-01
The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.
Sandia National Laboratories: National Security Missions: International
Weapons Safety & Security Weapons Science & Technology Defense Systems & Assessments About Directed Research & Development Technology Deployment Centers Working With Sandia Working With Sandia Licensing & Technology Transfer Browse Technology Portfolios Technology Partnerships Business, Industry
Sandia National Laboratories: National Security Missions: International
Prevention History 60 impacts Diversity Locations Facts & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Defense Systems & Assessments About Directed Research & Development Technology Deployment Centers Working With Sandia Working With Sandia
12 CFR 748.0 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM, REPORT....0 Security program. (a) Each federally insured credit union will develop a written security program...
12 CFR 748.0 - Security program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM, REPORT....0 Security program. (a) Each federally insured credit union will develop a written security program...
A wireless electronic monitoring system for securing milk from farm to processor
NASA Astrophysics Data System (ADS)
Womble, Phillip; Hopper, Lindsay; Thompson, Chris; Alexander, Suraj M.; Crist, William; Payne, Fred; Stombaugh, Tim; Paschal, Jon; Moore, Ryan; Luck, Brian; Tabayehnejab, Nasrin
2008-04-01
The Department of Homeland Security and the Department of Health and Human Services have targeted bulk food contamination as a focus for attention. The contamination of bulk food poses a high consequence threat to our society. Milk transport falls into three of the 17 targeted NIPP (National Infrastructure Protection Plan) sectors including agriculture-food, public health, and commercial facilities. Minimal security safeguards have been developed for bulk milk transport. The current manual methods of securing milk are paper intensive and prone to errors. The bulk milk transportation sector requires a security enhancement that will both reduce recording errors and enable normal transport activities to occur while providing security against unauthorized access. Milk transportation companies currently use voluntary seal programs that utilize plastic, numbered seals on milk transport tank openings. Our group has developed a Milk Transport Security System which is an electromechanical access control and communication system that assures the secure transport of milk, milk samples, milk data, and security data between locations and specifically between dairy farms, transfer stations, receiving stations, and milk plants. It includes a security monitoring system installed on the milk transport tank, a hand held device, optional printers, data server, and security evaluation software. The system operates automatically and requires minimal or no attention by the bulk milk hauler/sampler. The system is compatible with existing milk transport infrastructure, and has the support of the milk producers, milk transportation companies, milk marketing agencies, and dairy processors. The security protocol developed is applicable for transport of other bulk foods both nationally and internationally. This system adds significantly to the national security infrastructure for bulk food transport. We are currently demonstrating the system in central Kentucky and will report on the results of the demonstration.
2006-03-01
Transition, 156. 106 Quoted in Jacob W. Kipp, “War Scare in the Caucasus: Redefining the Threat and the War on Terrorism,” in Russian Military Reform , ed...Garden, 232. 109 Marcel de Haas, “The Development of Russia’s Security Policy,” in Russian Military Reform , ed. Anne C. Aldis and Roger N. McDermott...2003). de Haas, Marcel. “The Development of Russia’s Security Policy,” in Russian Military Reform , ed. Anne C. Aldis and Roger N. McDermott, 3-21
DOT National Transportation Integrated Search
1999-11-01
This plan describes coordinated long-term research initiatives to bring about advances in aviation that will be required in the opening decades of the next century. The White House Commission on Aviation Safety and Security and the National Civil Avi...
DOT National Transportation Integrated Search
1999-11-01
This plan describes coordinated long-term research initiatives to bring about advances in aviation that will be required in the opening decades of the next century. The White House Commission on Aviation Safety and Security and the National Civil Avi...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jacobs, R
The Physics and Advanced Technologies (PAT) Directorate was created in July 2000 by Bruce Tarter, Director of Lawrence Livermore National Laboratory (LLNL). The Director called for the new organization to execute and support programs that apply cutting-edge physics and advanced technology to develop integrated solutions to problems in national security, fusion energy, information science, health care, and other national grand challenges. When I was appointed a year later as the PAT Directorate's first Associate Director, I initiated a strategic planning project to develop a vision, mission, and long-term goals for the Directorate. We adopted the goal of becoming a leadermore » in frontier physics and technology for twenty-first-century national security missions: Stockpile Stewardship, homeland security, energy independence, and the exploration of space. Our mission is to: (1) Help ensure the scientific excellence and vitality of the major LLNL programs through its leadership role in performing basic and applied multidisciplinary research and development with programmatic impact, and by recruiting and retaining science and technology leaders; (2) Create future opportunities and directions for LLNL and its major programs by growing new program areas and cutting-edge capabilities that are synergistic with, and supportive of, its national security mission; (3) Provide a direct conduit to the academic and high-tech industrial sectors for LLNL and its national security programs, through which the Laboratory gains access to frontier science and technology, and can impact the science and technology communities; (4) Leverage unique Laboratory capabilities, to advance the state universe. This inaugural PAT Annual Report begins a series that will chronicle our progress towards fulfilling this mission. I believe the report demonstrates that the PAT Directorate has a strong base of capabilities and accomplishments on which to build in meeting its goals. Some of the highlights include: (1) Leadership of the Laboratory's Physical Data Research Program that provides fundamental physics information for the Stockpile Stewardship Program. (2) Development of the handheld Microbead Immunoassay Dipstick System that will allow relatively untrained first-responders to run sophisticated onsite diagnostics for pathogens, including those associated with biowarfare agents, by using a simple, one-step measurement. (3) Major advances in target design for inertial fusion energy research using both laser and ion-beam drivers. (4) Development of the Advanced Technology Kill Vehicle concept for use as a high-performance interceptor in a broad range of missile defense programs. Over the course of the past decade, the Laboratory has seen its major program evolve from weapons research, development, and testing, to Stockpile Stewardship. Today, the country's national security priorities are changing rapidly: nuclear security is becoming a broader set of missions, and the Laboratory is being asked to contribute to a range of new mission areas from countering bioterrorism to ensuring information security. As we embark on the twenty-first century, the new PAT Directorate is poised to help lead the Laboratory's response to the country's changing national security needs.« less
NASA Astrophysics Data System (ADS)
Morgan, John S.
2005-05-01
Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.
Twenty-Five Year Site Plan FY2013 - FY2037
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, William H.
2012-07-12
Los Alamos National Laboratory (the Laboratory) is the nation's premier national security science laboratory. Its mission is to develop and apply science and technology to ensure the safety, security, and reliability of the United States (U.S.) nuclear stockpile; reduce the threat of weapons of mass destruction, proliferation, and terrorism; and solve national problems in defense, energy, and the environment. The fiscal year (FY) 2013-2037 Twenty-Five Year Site Plan (TYSP) is a vital component for planning to meet the National Nuclear Security Administration (NNSA) commitment to ensure the U.S. has a safe, secure, and reliable nuclear deterrent. The Laboratory also usesmore » the TYSP as an integrated planning tool to guide development of an efficient and responsive infrastructure that effectively supports the Laboratory's missions and workforce. Emphasizing the Laboratory's core capabilities, this TYSP reflects the Laboratory's role as a prominent contributor to NNSA missions through its programs and campaigns. The Laboratory is aligned with Nuclear Security Enterprise (NSE) modernization activities outlined in the NNSA Strategic Plan (May 2011) which include: (1) ensuring laboratory plutonium space effectively supports pit manufacturing and enterprise-wide special nuclear materials consolidation; (2) constructing the Chemistry and Metallurgy Research Replacement Nuclear Facility (CMRR-NF); (3) establishing shared user facilities to more cost effectively manage high-value, experimental, computational and production capabilities; and (4) modernizing enduring facilities while reducing the excess facility footprint. Th is TYSP is viewed by the Laboratory as a vital planning tool to develop an effi cient and responsive infrastructure. Long range facility and infrastructure development planning are critical to assure sustainment and modernization. Out-year re-investment is essential for sustaining existing facilities, and will be re-evaluated on an annual basis. At the same time, major modernization projects will require new line-item funding. This document is, in essence, a roadmap that defines a path forward for the Laboratory to modernize, streamline, consolidate, and sustain its infrastructure to meet its national security mission.« less
Best, Michele; Sakande, Jean
2016-01-01
The role of national health laboratories in support of public health response has expanded beyond laboratory testing to include a number of other core functions such as emergency response, training and outreach, communications, laboratory-based surveillance and data management. These functions can only be accomplished by an efficient and resilient national laboratory network that includes public health, reference, clinical and other laboratories. It is a primary responsibility of the national health laboratory in the Ministry of Health to develop and maintain the national laboratory network in the country. In this article, we present practical recommendations based on 17 years of network development experience for the development of effective national laboratory networks. These recommendations and examples of current laboratory networks, are provided to facilitate laboratory network development in other states. The development of resilient, integrated laboratory networks will enhance each state's public health system and is critical to the development of a robust national laboratory response network to meet global health security threats.
2016-01-01
The role of national health laboratories in support of public health response has expanded beyond laboratory testing to include a number of other core functions such as emergency response, training and outreach, communications, laboratory-based surveillance and data management. These functions can only be accomplished by an efficient and resilient national laboratory network that includes public health, reference, clinical and other laboratories. It is a primary responsibility of the national health laboratory in the Ministry of Health to develop and maintain the national laboratory network in the country. In this article, we present practical recommendations based on 17 years of network development experience for the development of effective national laboratory networks. These recommendations and examples of current laboratory networks, are provided to facilitate laboratory network development in other states. The development of resilient, integrated laboratory networks will enhance each state’s public health system and is critical to the development of a robust national laboratory response network to meet global health security threats. PMID:28879137
ERIC Educational Resources Information Center
Okolo, Nkiru Benjamin
2016-01-01
Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…
Beck, Eduard J; Gill, Wayne; De Lay, Paul R
2016-01-01
As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs) may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV . The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The success of programs like Universal Health Coverage, under the recently ratified Sustainable Development Goals is also contingent on the availability of personal health information for communicable and non-communicable diseases. Guidance for countries to develop and implement their own guidelines for protecting HIV-information formed the basis of identifying a number of fundamental principles, governing the areas of privacy, confidentiality and security. The use of individual-level data must balance maximizing the benefits from their most effective and fullest use, and minimizing harm resulting from their malicious or inadvertent release. These general principles are described in this paper, as along with a bibliography referring to more detailed technical information. A country assessment tool and user's manual, based on these principles, have been developed to support countries to assess the privacy, confidentiality, and security of personal health information at facility, data warehouse/repository, and national levels. The successful development and implementation of national guidance will require strong collaboration at local, regional, and national levels, and this is a pre-condition for the successful implementation of a range of national and global programs. This paper is a call for action for stakeholders in low- and middle-income countries to develop and implement such coherent policies and provides fundamental principles governing the areas of privacy, confidentiality, and security of personal health information being collected in low- and middle-income countries.
Code of Federal Regulations, 2010 CFR
2010-04-01
... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and the...
Latin America in the 1980’s: The Strategic Environment and Inter-American Security.
1981-06-15
Investigaciones socio-economicas (CISEC), Las Fuerzas Armadas en la Sociedad Civil, Santiago: Talleres Graficos , pages 143-229. 25. A 1976 International Monetary...Moreover, Latin American countries, notably Brazil, Peru, and Chile , have elaborated and implemented comprehensive national security doctrines that...equate development and social integration with national security. In the 1980’s Argentina, Brazil, Chile , Colombia, Mexico, Peru and Venezuela-the seven
1988-10-20
The LOCK project , from its very beginnings as an implementation study for the Provably Secure Operating System in 1979...to the security field, can study to gain insight into the evaluation process. The project has developed an innovative format for the DTLS and FTLS...management tern becomes available, the Al Secure DBMS will be system (DBMS) that is currently being developed un- ported to it . der the Advanced
DOT National Transportation Integrated Search
2013-07-29
The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...
Examining National Public Health Law to Realize the Global Health Security Agenda.
Meier, Benjamin Mason; Tureski, Kara; Bockh, Emily; Carr, Derek; Ayala, Ana; Roberts, Anna; Cloud, Lindsay; Wilhelm, Nicolas; Burris, Scott
2017-05-01
Where the Global Health Security Agenda (GHSA) seeks to accelerate progress toward a world safe and secure from public health emergencies, the realization of GHSA 'Action Packages' will require national governments to establish necessary legal frameworks to prevent, detect, and respond to infectious disease. By analyzing the scope and content of existing national legislation in each of the GHSA Action Packages, this comparative cross-national research has developed a framework that disaggregates the legal domains necessary to meet each Action Package target. Based upon these legal domains, this study developed an assessment tool that can identify specific attributes of national legislation. This article applies this tool to assess the legal environment in twenty Sub-Saharan African countries, examining the content of laws across the GHSA Action Packages, analyzing the legal domains necessary to implement each Action Package, and highlighting specific national laws that reflect attributes of each legal domain. © The Author 2017. Published by Oxford University Press; all rights reserved. For Permissions, please email: journals.permissions@oup.com.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hadley, Mark D.; Clements, Samuel L.
2009-01-01
Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Intrator, Miranda Huang
Los Alamos National Security, LLC (LANS) is the manager and operator of Los Alamos National Laboratory (Los Alamos) for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52- 06NA25396. Los Alamos is a mission-centric Federally Funded Research and Development Center focused on solving critical national security challenges through science and engineering for both government and private customers. LANS is opening this formal Request for Information (RFI) to gauge interest in engaging as an industry partner to LANS for collaboration in advancing the bio-assessment platform described below. Please see last section for details on submitting a Letter ofmore » Interest.« less
Sandia SCADA Program -- High Surety SCADA LDRD Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
CARLSON, ROLF E.
2002-04-01
Supervisory Control and Data Acquisition (SCADA) systems are a part of the nation's critical infrastructure that is especially vulnerable to attack or disruption. Sandia National Laboratories is developing a high-security SCADA specification to increase the national security posture of the U.S. Because SCADA security is an international problem and is shaped by foreign and multinational interests, Sandia is working to develop a standards-based solution through committees such as the IEC TC 57 WG 15, the IEEE Substation Committee, and the IEEE P1547-related activity on communications and controls. The accepted standards are anticipated to take the form of a Common Criteriamore » Protection Profile. This report provides the status of work completed and discusses several challenges ahead.« less
24 CFR 232.525 - Note and security form.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Note and security form. 232.525 Section 232.525 Housing and Urban Development Regulations Relating to Housing and Urban Development... URBAN DEVELOPMENT MORTGAGE AND LOAN INSURANCE PROGRAMS UNDER NATIONAL HOUSING ACT AND OTHER AUTHORITIES...
76 FR 43286 - National Assessment Governing Board; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-20
... levels for each grade and subject tested, developing standards and procedures for interstate and national... in closed session to review secure test items for the 2012 Economics assessment at grade 12 and the... meeting the ADC will complete their review of secure NAEP test items for the 2012 Economics assessment at...
2015-07-01
Army War College,Strategic Studies Institute,47 Ashburn Drive,Carlisle,PA,17013-5010 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING...achieving national security objectives. The Strategic Studies Institute publishes national security and strategic research and analysis to influence...U.S. Army War College SLDR Senior Leader Development and Resiliency STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the
14 CFR 1203.603 - Systematic review for declassification.
Code of Federal Regulations, 2011 CFR
2011-01-01
... National Security Agency. (3) Systematic review for declassification of classified information pertaining... coordinated through the Central Intelligence Agency. (4) The Chairperson, NASA Information Security Program... guidelines. The Chairperson, NASA Information Security Program Committee, shall develop, in coordination with...
Russian Stance in the Caucasus and the National Security Strategy of Georgia
2005-06-01
12, 2005) 10 Marcel de Haas, “The Development of Russia’s Security Policy, 1992-2002,” in: Russian Military Reform 1992-2002, ed. Anne C. Aldis...positive tendencies in the world.14 12Marcel de Haas, “The Development of Russia’s Security Policy, 1992-2002,” in: Russian Military Reform 1992...Development of Russia’s Security Policy, 1992-2002,” in: Russian Military Reform 1992-2002, ed. Anne C. Aldis, Roger N. McDermott, 13- 18 (London, Portland
National Will: Achilles Heel in United States National Strategy
1990-05-01
value of the psychosocial or national-will. element of power is significantly underrated by national leaders in developing an appropriate national... developing and using the political, economic, and psychosocial powers of a nation, together with its armed forces during peace and war to secure National...employ the 5 M RI psychosocial element of power. Colonel Summers argues that, this failure to develop and use national will was our major strategic
Impacts of Psychological Science on National Security Agencies Post-9/11
ERIC Educational Resources Information Center
Brandon, Susan E.
2011-01-01
Psychologists have been an integral part of national security agencies since World War I, when psychological science helped in personnel selection. A robust infrastructure supporting wider applications of psychology to military and intelligence problems developed further during World War II and the years following, primarily in the areas of…
ERIC Educational Resources Information Center
Grossman, Michael; Schortgen, Francis
2016-01-01
This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…
Heavy Lift for National Security: The Ares V
NASA Technical Reports Server (NTRS)
Sumrall, Phil
2009-01-01
The NASA Ares Projects Office is developing the launch vehicles to move the United States and humanity beyond low earth orbit. Ares I is a crewed vehicle, and Ares V is a heavy lift vehicle being designed to launch cargo into LEO and transfer cargo and crews to the Moon. This is a snapshot of development and capabilities. Ares V is early in the requirements formulation stage of development pending the outcome of the Review of U.S. Human Space Flight Plans Committee and White House action. The Ares V vehicle will be considered a national asset, creating unmatched opportunities for human exploration, science, national security, and space business.
Internet Governance and National Security
2012-01-01
the conflict created by headline- grabbing exploits of ad hoc hacker networks or nation-state-inspired cor porate espionage.5 Malicious actors add...governance of critical Internet re sources and their impact on US national security are often overlooked. Foreign efforts to alter the technical...crime, espio nage, and other forms of cyber conflict rather than on the issues related to governance of critical Internet resources, development of
Transitions to Peace: Effects on Internal Security Forces in Nicaragua, El Salvador and Guatemala
2008-12-01
and the National Guard, which operated in rural areas.”133 A National Intelligence Directorate supported the 60,000 strong security personnel in...Londoño, Juan Luis, Alejandro Gaviria, and Rodrigo Guerrero eds., Asalto al Desarrollo (Washington, D.C.: Inter-American Development Bank, 2000...Guerrero eds., Asalto al desarrollo . Washington, D.C.: Inter-American Development Bank, 2000. “Saca unimpressed with size of U.S. funding.” Latin
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eipeldauer, Mary D; Shelander Jr, Bruce R
2012-01-01
The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) wasmore » established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.« less
Sandia National Laboratories: Hydrogen Risk Assessment Models toolkit now
Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Sandia National Laboratories: 100 Resilient Cities: Sandia Challenge:
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Securing global trade through secure freight transportation : final report.
DOT National Transportation Integrated Search
2009-12-16
Given the increased probability of disruptions to global supply chains, and the significant impact these have on national and global economies, the problem is how to secure global trade. The concept of a global trade chain-of-custody has been develop...
Damari, Behzad; Abdollahi, Zahra; Hajifaraji, Majid; Rezazadeh, Arezoo
2018-05-03
All government policies and programmes for food and nutrition security should include providing healthy food, as well as providing economic and social availability for all people. This study aimed to analyse the current situation of Iranian food and nutrition security and establish a road map towards 2021. The applied methods were situation analysis and a mixed qualitative-quantitative method. The conceptual method used for developing this national document encompassed three areas: sustainable food supply, food safety and nutrition. The outcomes of the Iranian food and nutrition security system in the past three decades include development of management infrastructure and improvement in food and nutrition security status. However, analysis of current programmes showed that there were some overlapping, intertwining and parallel works in the responsibilities of related organizations in the field of supervision of food safety (from production to supply). The national document produced as the outcome of this paper was communicated by the Iranian Ministry of Health in 2012 and has been running for 2 years. Selected ministries are responsible for implementation of 20 national programmes by the end of the 5th Economic, Social and Cultural Development Programme (2016-2011). The consensus of stakeholders by the end of the 6th Development Programme (2021) is to put all of the provinces in a safe or very safe situation in terms of food and nutrition security. The most important challenge in establishing national documents is to make them operational. This aim was achieved by an intersectoral nutrition and food security working group, which produced a general memorandum of understanding with the main organizations, the media, universities and private sector. Copyright © World Health Organization (WHO) 2018. Some rights reserved. This work is available under the CC BY-NC-SA 3.0 IGO license (https://creativecommons.org/licenses/by-nc-sa/3.0/igo).
76 FR 62433 - Delegation of Authority to the Office of Disaster Management and National Security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-07
... the Office of Disaster Management and National Security AGENCY: Office of the Secretary, HUD. ACTION... Disaster and National Security Officer, Office of Disaster Management and National Security. DATES... and National Security Officer, Office of Disaster Management and National Security, Department of...
Nevada National Security Site-Directed Research and Development FY 2011 Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Howard Bender, comp.
2012-04-25
This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supportingmore » our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.« less
US Capitol Security - Our Nation's Capitol - A Safe Place for All?
DOT National Transportation Integrated Search
2000-08-01
This article describes the Volpe Centrer's role in developing a new security system for the US Capitol. The US Capitol Police turned to the Center because of our proven capabilities as security experts. We brought to the project: our knowledge of sec...
NASA Astrophysics Data System (ADS)
Voskresenskaya, Elena; Vorona-Slivinskaya, Lubov
2018-03-01
The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.
Policy Analysis in National Security Affairs: New Methods for a New Era
2006-01-01
make it hard to keep talented staffs in all three areas. Such firms draw most of their money from external sponsorship of research projects, often by... field of national security policy, the process of employing analytical methods to develop and enhance thought-derived knowledge begins by creating new...flow to poor regions from banks and lending agencies. Multinational firms add to the total with funds to develop industrial plants and other facilities
1996-01-01
Russia, by was someone higher up in the security that didn’t want to Austria, or by anyone else. But, I do believe that we must provide it. The Civil...Center to develop informed protective action the national security of many states, including Russia. recommendations to protect public health and...part played by the RSDM in the systems mentioned above). of the national security . The next, also very important role of the RSDM, is First, the
A Career Cluster in Law, Public Safety, Corrections and Security
ERIC Educational Resources Information Center
Reese, Susan
2007-01-01
This article describes a program at Great Plains Technology Center that is not only serving its community's needs but it is also serving as a national pilot site. When Oklahoma's Great Plains Technology Center began developing its Law, Public Safety, Corrections and Security Cluster in 2003, the National Partnership for Careers in Law, Public…
76 FR 62439 - Order of Succession for the Office of Disaster Management and National Security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-07
... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5546-D-02] Order of Succession for the... of order of succession. SUMMARY: In this notice, the Secretary of HUD designates the Order of Succession for the Office of Disaster Management and National Security. This is the first order of succession...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-28
... teleconference. The meeting is limited to one topic, the 2010 National Strategy for Global Supply Chain Security... COAC will meet to discuss its views on the development of the 2010 National Strategy for Global Supply Chain Security. Public Participation: This meeting is open to the public; however, participation in COAC...
Achieving Youth Employment and National Security in Nigeria: TVET Imperatives
ERIC Educational Resources Information Center
Ogbuanya, T. C.; Ofonmbuk, Michael
2015-01-01
The rate of unemployment in Nigeria is alarming and could promote social vices some of which are kidnapping, armed robbery, child trafficking, Cultism, Drug peddling and ritual killing. These social vices could in no small measure constitute a threat to national security as a matter of fact. Therefore, the development of a workable Technical and…
To Legalize or not to Legalize? That is the Question
2009-04-01
and international community to improve security and promote development in Afghanistan. The negative effect on the nations overall security, the...the problem/solution methodology. The research explores the current illicit opium cultivation in Afghanistan and its effect on the current...negative effect on the current development efforts. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF
Risk Unbound: Threat, Catastrophe, and the End of Homeland Security
2015-09-01
Defense (DOD) models ) is now the prevalent model for developing plans.63 Capabilities- based within the national preparedness system is defined as...capabilities- based planning is the accounting for scenarios through organizational capability development , and the search for commonality and structure...of providing perfect security, and demonstrate the limitations of risk- based security practices. This thesis presents an argument in three parts
Perimeter security for Minnesota correctional facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crist, D.; Spencer, D.D.
1996-12-31
For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned newmore » construction at other facilities.« less
Impacts of psychological science on national security agencies post-9/11.
Brandon, Susan E
2011-09-01
Psychologists have been an integral part of national security agencies since World War I, when psychological science helped in personnel selection. A robust infrastructure supporting wider applications of psychology to military and intelligence problems developed further during World War II and the years following, primarily in the areas of testing, human factors, perception, and the decision sciences. Although the nature of the attacks on 9/11 raised the level of perceived need for increased human-based intelligence, the impacts of psychologists on the policies and practices of national security agencies in the decade since have not increased significantly. © 2011 American Psychological Association
Health security as a public health concept: a critical analysis.
Aldis, William
2008-11-01
There is growing acceptance of the concept of health security. However, there are various and incompatible definitions, incomplete elaboration of the concept of health security in public health operational terms, and insufficient reconciliation of the health security concept with community-based primary health care. More important, there are major differences in understanding and use of the concept in different settings. Policymakers in industrialized countries emphasize protection of their populations especially against external threats, for example terrorism and pandemics; while health workers and policymakers in developing countries and within the United Nations system understand the term in a broader public health context. Indeed, the concept is used inconsistently within the UN agencies themselves, for example the World Health Organization's restrictive use of the term 'global health security'. Divergent understandings of 'health security' by WHO's member states, coupled with fears of hidden national security agendas, are leading to a breakdown of mechanisms for global cooperation such as the International Health Regulations. Some developing countries are beginning to doubt that internationally shared health surveillance data is used in their best interests. Resolution of these incompatible understandings is a global priority.
Variation in beliefs about ‘fracking’ between the UK and US
NASA Astrophysics Data System (ADS)
Evensen, Darrick; Stedman, Richard; O'Hara, Sarah; Humphrey, Mathew; Andersson-Hudson, Jessica
2017-12-01
In decision-making on the politically-contentious issue of unconventional gas development, the UK Government and European Commission are attempting to learn from the US experience. Although economic, environmental, and health impacts and regulatory contexts have been compared cross-nationally, public perceptions and their antecedents have not. We conducted similar online panel surveys of national samples of UK and US residents simultaneously in September 2014 to compare public perceptions and beliefs affecting such perceptions. The US sample was more likely to associate positive impacts with development (i.e. production of clean energy, cheap energy, and advancing national energy security). The UK sample was more likely to associate negative impacts (i.e. water contamination, higher carbon emissions, and earthquakes). Multivariate analyses reveal divergence cross-nationally in the relationship between beliefs about impacts and support/opposition—especially for beliefs about energy security. People who associated shale gas development with increased energy security in the UK were over three times more likely to support development than people in the US with this same belief. We conclude with implications for policy and communication, discussing communication approaches that could be successful cross-nationally and policy foci to which the UK might need to afford more attention in its continually evolving regulatory environment.
31 CFR 515.325 - National securities exchange.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false National securities exchange. 515.325... Definitions § 515.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act of...
31 CFR 500.325 - National securities exchange.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false National securities exchange. 500.325... Definitions § 500.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act of...
Code of Federal Regulations, 2010 CFR
2010-04-01
... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is not...
[Important issues of biological safety].
Onishchenko, G G
2007-01-01
The problem of biological security raises alarm due to the real growth of biological threats. Biological security includes a wide scope of problems, the solution of which becomes a part of national security as a necessary condition for the constant development of the country. A number of pathogens, such as human immunodeficiency virus, exotic Ebola and Lassa viruses causing hemorrhagic fever,rotaviruses causing acute intestinal diseases, etc. were first discovered in the last century. Terrorist actions committed in the USA in 2001 using the anthrax pathogen made the problem of biological danger even more important. In Russian Federation, biological threats are counteracted through the united state policy being a part of general state security policy. The biological Security legislation of Russian Federation is chiefly based on the 1992 Federal Law on Security. On the basis of cumulated experience, the President of Russia ratified Basics of Russian Federation's State Policy for Chemical and Biological Security for the Period through 2010 and Beyond on 4 December, 2003. The document determines the main directions and stages of the state development in the area of chemical and biological security. The Federal target program Russian Federation's National Program for Chemical and Biological Security is being developed, and its development is to be completed soon in order to perfect the national system for biological security and fulfill Basics of Russian Federation's State Policy for Chemical and Biological Security for the Period through 2010 and Beyond, ratified by the President. The new global strategy for control over infectious diseases, presented in the materials of Saint Petersburg summit of the Group of Eight, as well as the substantive part of its elements in Sanitary International Standards, are to a large degree an acknowledgement of the Russian Federation's experience and the algorithm for fighting extremely dangerous infections. This Russia's experience has resulted in the following global achievements: smallpox elimination in the USSR (1936); the USSR's suggestions on the program of smallpox elimination in the world and 2 billion doses of the vaccine transferred to the possession of the WHO (since 1958); the global elimination of the disease (1980); effective control over avian influenza at the epizootic stage, recognized internationally at Beijing International Congress, 17-18 January, 2006.
Increasing security through public health: a practical model.
Parker, R David
2011-01-01
As political and social changes sweep the globe, there are opportunities to increase national security through innovative approaches. While traditional security methods such as defense forces and homeland security provide both pre-emptive and defensive protection, new methods could meet emerging challenges by responding to the political, financial, and social trends. One method is the integration of defense, medicine and public health. By assisting a nation by providing basic services, such as healthcare, collaborative efforts can increase stabilization in areas of unrest. Improved health outcomes leads to increased domestic security, which can create a ripple effect across a region. Assessment, uptake and sustainability by the host nation are critical for program success. The proposed methodology focuses on the use of primarily extant resources, such as programs used by Special Operations Forces and other health and defense programs. Additional components include evaluation, set objectives and mission collaborations. As the nexus between foreign affairs, security, and public health is increasingly validated through research and practice, standardized interventions should be developed to minimize overlapping expenditures, promote security and strengthen international relations. 2011.
Developing a Defense Sector Assessment Rating Tool
2010-01-01
JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...Cathryn Quantic Thurston, and Gregory F. Treverton (MG-863-OSD). • Making Liberia Safe: Transformation of the National Security Sector, by David C...Cathryn Quantic Thurston, and Gregory F. Treverton, A Framework to Assess Programs for Building Partnerships, Santa Monica, Calif.: RAND Corporation
Cyber Defense: An International View
2015-09-01
NAME(S) AND ADDRESS(ES) U.S. Army War College,Strategic Studies Institute,47 Ashburn Drive,Carlisle,PA,17013-5010 8. PERFORMING ORGANIZATION REPORT...role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and strategic research...honor Soldiers—past and present. U.S. Army War College SLDR Senior Leader Development and Resiliency i STRATEGIC STUDIES INSTITUTE The Strategic
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
The world's political structure and many economic practices are out of harmony with nature. This disharmony threatens environmentally sustainable growth and human survival. United Nations (UN) conference participants discussed the degree of political acceptance of concepts such as environmental security and sustainable development. Their reading…
Security Challenges in the Gulf of Guinea Sub-Region: Strategy for Nigeria
2008-06-01
Gas Fisheries Defense of Shipping Data Sea Power Functioning Ecosystem Nation-States Pollution & Misuse Criminal Activities Poaching ...region, these increased activities have created challenging security issues including increased piracy, poaching , terrorism, militant youth activities... impact its economic, social and political development. Also, the GoG’s vast sea area presents great challenges to the Nigerian nation and the
A Compton Gamma Imager for Criminal and National Security Investigation
2014-05-01
which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety Canada. Partners in the...project include National Research Council, McGill University, Royal Canadian Mounted Police, Public Safety Canada, Toronto Police, and Canada Border...16 6.2.1 Follow-on Research ...................................................................................... 16 6.2.2 Follow-on
Integrating Partner Nations into Coalition Operations
2006-01-01
of United Nations (UN) Security Council Resolu- tion 1529, Chile , Canada, France, and the United States established a multinational force...of restabi- lization. Chile continues to deploy forces as a member of the UN Stabilization Force Haiti (MINUSTAH), led by Brazil and comprised...supporting a tailored exercise and theater security cooperation program that has encouraged partners such as Chile , Brazil, and El Salvador to develop
Education Policy and National Security in Brazil in the Post-1964 Context
ERIC Educational Resources Information Center
Silveira, Rene Trentin
2013-01-01
The aim of this article is to analyse and show in detail the influence of the National Security and Development Doctrine, the main ideological prop of the 1964 civilian-military coup, on the education policy implemented by the regime. Special attention is given to the MEC-USAID agreements, the setting up of the Meira Matos Commission and the…
2015-02-01
Centralization . . . . . . . . . . . . . . . . . . . . . . 43 “Anonymity”: A Bitcoin Case Study...been a case of x National Security Implications of Virtual Currency such a non-state actor deployment; in this report, we aim to high- light...development of VCs may advance, including a gen- eral increased sophistication in cryptographic applications. More gen- erally, we make the case that the main
Afghanistan Narcotics: The Bigger Battle Toward Stabilization
2009-04-01
Development of economic opportunities coupled with effective governmental reform is necessary for the nation to become prosperous, stable, and secure. 15...without marginalizing narcotics production and narco-trafficking. Effective security, strong governance, judicial capability...introduce the possibility of meaningful alternative livelihoods. Development of these economic opportunities coupled with effective governmental
45 CFR 5b.8 - Appeals of refusals to correct or amend records.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Statistics, National Institute of Education, and Office of Education. (iv) Assistant Secretary for Human Development for records of the Office of Human Development. (v) Commissioner of Social Security for records of the Social Security Administration. (vi) Administrator, Social and Rehabilitation Service for the...
45 CFR 5b.8 - Appeals of refusals to correct or amend records.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Statistics, National Institute of Education, and Office of Education. (iv) Assistant Secretary for Human Development for records of the Office of Human Development. (v) Commissioner of Social Security for records of the Social Security Administration. (vi) Administrator, Social and Rehabilitation Service for the...
Infant-Mother Attachment Security and Children's Anxiety and Aggression at First Grade
ERIC Educational Resources Information Center
Dallaire, Danielle H.; Weinraub, Marsha
2007-01-01
With a large and diverse sample of children from the National Institute of Child Health and Human Development Study of Early Child Care and Youth Development, the role of infant-mother attachment security as a protective factor against the development of children's anxious and aggressive behaviors at first grade was examined. When child's sex,…
ERIC Educational Resources Information Center
Boletin del Centro Nacional de Documentacion e Informacion Educativa, 1971
1971-01-01
This article discusses the education provisions established in the Argentine Plan for Development and Security (1971-1975). The statements on educational development call for a diagnostic study of the current cultural and educational situation, the establishment of objectives and strategies, goals for each level of education, steps for the…
Bode, Ingvild
2017-01-01
The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted. PMID:29782586
Bode, Ingvild
2018-06-01
The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted.
37 CFR 5.1 - Applications and correspondence involving national security.
Code of Federal Regulations, 2010 CFR
2010-07-01
... correspondence involving national security. 5.1 Section 5.1 Patents, Trademarks, and Copyrights UNITED STATES... involving national security. (a) All correspondence in connection with this part, including petitions... national security classified (see § 1.9(i) of this chapter) and contain authorized national security...
28 CFR 17.13 - National Security Division; interpretation of Executive Orders.
Code of Federal Regulations, 2010 CFR
2010-07-01
... for National Security, who shall refer such questions to the Office of Legal Counsel, as appropriate... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-29
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national securities...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national securities...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national securities...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national securities...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national securities...
Coping with Iran: Confrontation, Containment, or Engagement?
2007-01-01
David Ignatius (national security columnist , The Washington Post) IRAN’S NATIONAL SECURITY ENVIRONMENT Mohammad Javad Zarif Iran’s national security...senior editor, Newsweek) David Ignatius (national security columnist , The Washington Post) HOW THE U.S. GOVERNMENT VIEWS IRAN R. Nicholas Burns...Iranian Ambassador to the United Nations Questions Michael Hirsh Senior Editor Newsweek David Ignatius National Security Columnist The Washington
Cybersecurity Strategy in Developing Nations: A Jamaica Case Study
ERIC Educational Resources Information Center
Newmeyer, Kevin Patrick
2014-01-01
Developing nations have been slow to develop and implement cybersecurity strategies despite a growing threat to governance and public security arising from an increased dependency on Internet-connected systems in the developing world and rising cybercrime. Using a neorealist theoretical framework that draws from Gilpin and Waltz, this qualitative…
Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert
2013-06-01
To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.
Development of a Lithospheric Model and Geophysical Data Base for North Africa.
1996-07-19
Department of Energy Office of Non-Proliferation and National Security MONITORED BY Phillips Laboratory CONTRACT No. F 19628-C-0104 The views and...Worldwide Standardized Seismograph Netowrk stations locatdd:.&t regional distances from magnitude greater than 5.•0 earthquakes occurring within N6rth... SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACTOF REPORT OF THIS PAGE OF ABSTRACT
World population, world health and security: 20th century trends.
Bashford, A
2008-03-01
The connection between infectious disease control and national security is now firmly entrenched. This article takes a historical look at another security issue once prominent in debate on foreign policy and international relations, but now more or less absent: overpopulation. It explores the nature of the debate on population as a security question, and its complicated historical relation to the development of world health.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bingham, Philip; Bush, John; Bowerman, Biays
The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security’s Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with fourmore » of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009.« less
Developing Soft Power Using Afloat Medical Capability
2009-03-02
the National Security Strategy. Depending on its program employment , it has the capability to effectively combine the other elements of national power...Strategy through the employment of combatant commanders’ Theater Security Cooperation (TSC) Program in their area of responsibility. The TSC program is...In the final phases of Pacific campaign during World War II, tactical doctrine for employment of Navy hospital vessels changed, allowing them to
Extending the Thin Blue Line: Constabulary Police Development in Phase Zero Operations
2015-05-16
procure intelligence and support from local nationals. This participatory community approach to policing promotes a lasting sense of security and safety...conflict by posturing the Germans to establish law and order and internal and border security.92 The participatory police partnership also resulted in...host nation police forces supported the expansion of democracy and promoted safe overseas economic transactions. Consequently, government officials
The link between national security and biometrics
NASA Astrophysics Data System (ADS)
Etter, Delores M.
2005-03-01
National security today requires identification of people, things and activities. Biometrics plays an important role in the identification of people, and indirectly, in the identification of things and activities. Therefore, the development of technology and systems that provide faster and more accurate biometric identification is critical to the defense of our country. In addition, the development of a broad range of biometrics is necessary to provide the range of options needed to address flexible and adaptive adversaries. This paper will discuss the importance of a number of critical areas in the development of an environment to support biometrics, including research and development, biometric education, standards, pilot projects, and privacy assurance.
Enhancing National Security in Jamaica Through the Development and Employment of Special Forces
2005-06-01
face Jamaica. This study examines the value, utility, and possible roles of such a unit in the Jamaican security landscape, and makes recommendations...and possible roles of such a unit in the Jamaican security landscape, and makes recommendations for the establishment and employment of such a unit...
Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense
NASA Astrophysics Data System (ADS)
Spafford, Eugene H.
The number and sophistication of cyberattacks continues to increase, but no national policy is in place to confront them. Critical systems need to be built on secure foundations, rather than the cheapest general-purpose platform. A program that combines education in cyber security, increasing resources for law enforcement, development of reliable systems for critical applications, and expanding research support in multiple areas of security and reliability is essential to combat risks that are far beyond the nuisances of spam email and viruses, and involve widespread espionage, theft, and attacks on essential services.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...
Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.
Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-08
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...
Huang, Jin; Kim, Youngmi; Barnidge, Ellen
2016-11-20
The National School Lunch Program (NSLP) is one of the most important food assistance programs in the United States to ensure children's food security and healthy development. Previous studies have offered mixed results and challenges in estimating the effects of program participation. This study assesses NSLP's effect on household food security using data from the Survey of Income and Program Participation (SIPP). SIPP collects information on food security that covers four reference months, including both summer (June, July, August) and nonsummer months. The number of summer months in these four reference months varies by SIPP rotation group. These unique features allow this study to address the potential selection bias in the research of NSLP and food security by examining a seasonal difference in program participation. The analysis found that one more summer month in the reference period increases the difference in low food security rates by about 1.5 percentage points between recipients and nonrecipients eligible for free or reduced-price lunch. Findings have important social work and health policy implications for increasing food security among low-income households with children. © 2016 National Association of Social Workers.
77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-17
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...
78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-08
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...
Interface of Science, Technology and Security: Areas of Most Concern, Now and Ahead
2017-03-28
connectivity is creating new forms of security threats and exploitable instabilities. There is a need to develop secure software to reduce vulnerabilities...implications in the light of global population growth, industrialization and limited fossil fuel supplies. The continued improvement of generation, storage...national strategic concern is when the S&T-security nexus creates opportunities for misunderstanding. These opportunities assume two forms , rooted in
Aircraft Survivability: Reclaiming the Low Altitude Battlespace. Fall 2003
2003-01-01
tt p: //j as .jc s. m il n by Charles Pedriani to Improve Commercial Aviation Security JASPO/NASA Cooperate The National Aeronautics and Space...Administration (NASA) Aviation Safety and Security Program Office announced its Aviation Security Project at a rollout work- shop in March 2003. The...and development efforts involving technology of interest. Overview of the NASA Aviation Security Initiative A systems approach will be used as
U.S. Foreign Aid to East and South Asia: Selected Recipients
2007-08-22
foreign policy and national security goals and respond to global development and humanitarian needs through its foreign assistance programs . In the past...national security strategy.1 Within this context, the Bush Administration reoriented U.S. foreign assistance programs : aid to “front line” states...building as major goals of foreign aid. Toward these ends, the new Strategic Framework for U.S. Foreign Assistance divides aid programming among five
Laboratory Directed Research and Development FY2010 Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jackson, K J
2011-03-22
A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has at its core a primary national security mission - to ensure the safety, security, and reliability of the nation's nuclear weapons stockpile without nuclear testing, and to prevent and counter the spread and use of weapons of mass destruction: nuclear, chemical, and biological. The Laboratory uses the scientific and engineering expertise and facilities developed for its primary mission to pursue advanced technologies to meet other important national security needs - homeland defense, military operations, and missile defense, for example - that evolve in response to emerging threats. For broader nationalmore » needs, LLNL executes programs in energy security, climate change and long-term energy needs, environmental assessment and management, bioscience and technology to improve human health, and for breakthroughs in fundamental science and technology. With this multidisciplinary expertise, the Laboratory serves as a science and technology resource to the U.S. government and as a partner with industry and academia. This annual report discusses the following topics: (1) Advanced Sensors and Instrumentation; (2) Biological Sciences; (3) Chemistry; (4) Earth and Space Sciences; (5) Energy Supply and Use; (6) Engineering and Manufacturing Processes; (7) Materials Science and Technology; Mathematics and Computing Science; (8) Nuclear Science and Engineering; and (9) Physics.« less
Code of Federal Regulations, 2010 CFR
2010-04-01
...), 14(a), 14(b), and 14(c) for debt securities listed on a national securities exchange. 240.3a12-11... 14(c) for debt securities listed on a national securities exchange. (a) Debt securities that are listed for trading on a national securities exchange shall be exempt from the restrictions on borrowing...
2009 National Intelligence: A Consumer’s Guide
2009-04-01
Program (NIP), formerly known as the National Foreign Intelligence Program ( NFIP ), provides the resources needed to develop and maintain...Clandestine Service NCTC: National Counterterrorism Center NDIC: National Defense Intelligence College (DIA – formerly JMIC) NFIP : National Foreign...Coordination Center (ODNI) NIE: National Intelligence Estimate NIP: National Intelligence Program (formerly NFIP ) NIPRNet: Non-Secure Internet Protocol Router
Management of Security Services in Higher Education. National Report.
ERIC Educational Resources Information Center
Higher Education Funding Council for Wales, Cardiff.
This report, the seventh in a series from the Value for Money Steering Group, identifies the key management issues for governors, senior managers, and heads of security services at institutions of higher education in the United Kingdom in developing and reviewing security services to ensure that they are effective and provide value for money.…
DOT National Transportation Integrated Search
2003-05-01
The Department of Transportation's (DOT) Research and Special Programs Administration (RSPA) began research in to assess the vulnerabilities of the nation's transportation infrastructure and develop needed improvements in security in June 2001. The g...
Sandia National Laboratories: Privacy and Security
Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios
14 CFR 1260.31 - National security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance of...
14 CFR § 1260.31 - National security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false National security. § 1260.31 Section Â... AGREEMENTS General Provisions § 1260.31 National security. National Security October 2000 Normally, NASA... performing on the grant who will have access to the information must obtain the appropriate security...
14 CFR 1260.31 - National security.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance of...
14 CFR 1260.31 - National security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance of...
14 CFR 1260.31 - National security.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance of...
10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.
Code of Federal Regulations, 2010 CFR
2010-01-01
... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted Data...
76 FR 43993 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
...; System of Records AGENCY: National Security Agency/Central Security Service, Department of Defense. ACTION: Notice to Delete a System of Records. SUMMARY: The National Security Agency/Central Security.... FOR FURTHER INFORMATION CONTACT: Ms. Anne Hill, National Security Agency/Central Security Service...
2001-01-01
Human Participants. National Bioethics Advisory Commission. (Forthcoming.) Research Involving Human Biological Materials: Ethical Issues and Policy...and security • Advised the president’s National Bioethics Advisory Commission on technical, ethical, and legal issues • Developed the data for the...Centers for Disease Control Department of Education Department of Housing and Urban Development NASA National Bioethics Advisory Commission Office of
Rath, Johannes; Ischi, Monique; Perkins, Dana
2014-09-01
This paper provides an overview of the various dual-use concepts applied in national and international non-proliferation and anti-terrorism legislation, such as the Biological and Toxin Weapons Convention, the Chemical Weapons Convention and United Nations Security Council Resolution 1540, and national export control legislation and in relevant codes of conduct. While there is a vast literature covering dual-use concepts in particular with regard to life sciences, this is the first paper that incorporates into such discussion the United Nations Security Council Resolution 1540. In addition, recent developments such as the extension of dual-use export control legislation in the area of human rights protection are also identified and reviewed. The discussion of dual-use concepts is hereby undertaken in the context of human- and/or national-security-based approaches to security. This paper discusses four main concepts of dual use as applied today in international and national law: civilian versus military, peaceful versus non-peaceful, legitimate versus illegitimate and benevolent versus malevolent. In addition, the usage of the term to describe positive technology spin-offs between civilian and military applications is also briefly addressed. Attention is also given to the roles civil society and research ethics may play in the governance of dual-use sciences and technologies.
77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0016] President's National Security Telecommunications Advisory Committee; Correction AGENCY: National Protection and Programs Directorate, DHS. [[Page... April 25, 2012, concerning the President's National Security Telecommunications Advisory Committee...
40 CFR 85.1708 - National security exemption.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense. [39 FR 32611, Sept. 10...
ERIC Educational Resources Information Center
Comp, David J.
2013-01-01
The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…
Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security
2015-09-01
security enterprise NAFTA North American Free Trade Agreement NATO North Atlantic Treaty Organization NS national security NSS National Security...all hazards, outcome driven, national security) of the person being asked. Some advocate a more holistic description that encompasses law enforcement...department rather than maintaining the artificial separation. 3. Create a Department of Prosperity The Preamble to the Constitution defines our federal
Clinton administration forging population-foreign policy links.
De Sherbinin, A
1994-12-01
In the US, the Clinton administration has renewed the link between global population and national security issues. These so-called "soft security issues" receive attention from the Under-Secretary of State for Global Affairs, Tim Wirth, and the senior director of the Global Environmental Affairs branch of the National Security Council, Eileen Claussen. Wirth and Claussen draft the US response to soft security issues such as environmental security, refugee and migration movements, political instability, and religious and ethnic conflict as well as the other nonmilitary threats of illegal drug trafficking, terrorism, and international organized crime. Population was first considered a foreign policy concern in the 1960s. By 1965, President Johnson decided that the US would provide family planning supplies and technical assistance to any country which asked for help. The initial justification for assuming a leading role in developing innovative population strategies for less developed countries was a humanitarian desire to forward economic development, the self-interest of maintaining access to resources, and concern that rapid growth produced more communists. Today the US remains concerned about resource access and economic development and is also wary of spill-over environmental effects, economic migration, diminished US trade opportunities, political asylum seekers and refugees, and increasing demand for US peacekeepers. It is also believed that rapid population growth leads to political destabilization. Critics of these views blame the development difficulties of less developed countries on poor governing decisions (inadequate institutions, trade barriers, or indifference). Women's reproductive rights advocates fear that using security as a rationale for population assistance could lead to restrictions on women's rights to choose the number and spacing of births. Despite such objections, the belief that population growth is an underlying problem in imploding states like Haiti, Rwanda, and Somalia has turned the attention of US policy-makers to these soft security issues.
Transboundary natural area protection: Broadening the definition of national security
Haven B. Cook
2007-01-01
This paper looks at the definition and concept of national security, and examines how the environment is linked with national security. The traditional, state view of national security that guides most foreign policy includes the concepts of military power, sovereignty and geopolitical stability. This paper advocates broadening the definition of security to include...
National ITS architecture security
DOT National Transportation Integrated Search
2003-10-01
This Security Document presents an overview of security as it is represented in the National ITS Architecture and provides guidance for using the security-related parts of the National ITS Architecture. The objective of security, in the context of th...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-18
... research, development, engineering and production of border security-related systems; and (iii) to insert.... Patricia A. Brink, Director of Civil Enforcement, Antitrust Division. [FR Doc. 2012-14766 Filed 6-15-12; 8...
75 FR 56079 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-15
... to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to amend a system of records. SUMMARY: The National Security Agency/Central Security Service is proposing to...
78 FR 29145 - President's National Security Telecommunications Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0022] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. ACTION: Committee... notice of a May 22, 2013, meeting of the President's National Security Telecommunications Advisory...
Securing the High Seas: America’s Global Maritime Constabulatory Power
2008-03-12
at www.heritage.org/ Research/HomelandSecurity/bg1950.cfm. 29. Construcciones Aeronáuticas, SA. 16 Securing the High Seas: America’s Global Maritime...Coast Guard ships (National Security Cutter, Off-Shore Patrol Cutter, and Fast Response Cutter) and many Navy ships currently in design or construction ...forge complementary maritime strategies. Only by developing common doctrine, creating greater synergy in the construction of core assets, and forging a
75 FR 32555 - Consolidated Audit Trail
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-08
... act jointly in developing a national market system (``NMS'') plan to develop, implement, and maintain... markets, there is a heightened need for regulators to have efficient access to a more robust and effective cross-market order and execution tracking system. Currently, many of the national securities exchanges...
Fuel Cycle Technologies 2014 Achievement Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hong, Bonnie C.
2015-01-01
The Fuel Cycle Technologies (FCT) program supports the Department of Energy’s (DOE’s) mission to: “Enhance U.S. security and economic growth through transformative science, technology innovation, and market solutions to meet our energy, nuclear security, and environmental challenges.” Goal 1 of DOE’s Strategic Plan is to innovate energy technologies that enhance U.S. economic growth and job creation, energy security, and environmental quality. FCT does this by investing in advanced technologies that could transform the nuclear fuel cycle in the decades to come. Goal 2 of DOE’s Strategic Plan is to strengthen national security by strengthening key science, technology, and engineering capabilities.more » FCT does this by working closely with the National Nuclear Security Administration and the U.S Department of State to develop advanced technologies that support the Nation’s nuclear nonproliferation goals.« less
77 FR 66517 - National Adoption Month, 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-06
... National Adoption Month, 2012 By the President of the United States of America A Proclamation As a Nation... National Adoption Month, we give voice to children who are still waiting for that opportunity, celebrate... child with the care and security that will nurture their development and well-being. Later this month...
76 FR 58786 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-22
... National Security Agency/Central Security System systems of records notices subject to the Privacy Act of... inquiries to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; Systems of Records AGENCY: National Security Agency/Central Security Service, Department of Defense (DoD...
77 FR 56628 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-13
... to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to add a system of records. SUMMARY: The National Security Agency/Central Security Service proposes to add a new...
78 FR 45913 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-30
... National Security Agency/Central Security Service systems of records subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act Office, 9800...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to alter...
3 CFR 101.4 - National Security Council.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 3 The President 1 2010-01-01 2010-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI. ...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-20
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0018] Request for Information (RFI) Regarding the Planned Biotechnology Development Module (BDM) As Part of the National Bio and Agro-Defense... Development Module (BDM) a planned component of the National Bio and Agro-Defense Facility (NBAF) and...
NorthAm Fest : fostering a North American continent approach to countering terrorism.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gerdes, Dick; Moore, Judy Hennessey; Whitley, John B.
2004-12-01
On September 14-16, 2004, the Advanced Concepts Group of Sandia National Laboratories in conjunction with the University of Texas at El Paso and the North American Institute hosted a workshop (fest) designed to explore the concept of a North American continental approach to countering terrorism. The fest began with the basic premise that the successful defense of North America against the threat of terrorism will require close collaboration among the North American allies--Canada, Mexico and the U.S.--as well as a powerful set of information collection and analysis tools and deterrence strategies. The NorthAm Fest recast the notion of ''homeland defense''more » as a tri-national effort to protect the North American continent against an evolving threat that respects no borders. This is a report of the event summarizing the ideas explored. The fest examined the uniqueness of dealing with terrorism from a tri-national North American viewpoint, the role and possible features of joint security systems, concepts for ideal continental security systems for North America, and the challenges and opportunities for such systems to become reality. The following issues were identified as most important for the advancement of this concept. (1) The three countries share a set of core values--democracy, prosperity and security--which form the basis for joint interactions and allow for the development of a culture of cooperation without affecting the sovereignty of the members. (2) The creation of a continental defensive strategy will require a set of strategic guidelines and that smart secure borders play a pivotal role. (3) Joint security systems will need to operate from a set of complementary but not identical policies and procedures. (4) There is a value in joint task forces for response and shared information systems for the prevention of attacks. (5) The private sector must play a critical role in cross-border interactions. Finally, participants envisioned a ''Tri-National Security Laboratory'' to develop and test new counter-terrorism technologies and processes. The fest was an important first step in developing a tri-national approach to continental security and very different approaches to countering terrorism were explored. Participants came to the conclusion that continental security would be easier to achieve if the focus were on broader security issues, such as transnational crime, with terrorism being only a part of the focus. A series of fledgling relationships were begun between individuals and organizations through which actions can occur. A first commitment is the publication by a set of participants representing the three countries of a joint paper outlining the elements of a Continental Security approach.« less
17 CFR 240.19c-5 - Governing the multiple listing of options on national securities exchanges.
Code of Federal Regulations, 2010 CFR
2010-04-01
... of options on national securities exchanges. 240.19c-5 Section 240.19c-5 Commodity and Securities... of Exchange Members § 240.19c-5 Governing the multiple listing of options on national securities exchanges. (a) The rules of each national securities exchange that provides a trading market in standardized...
17 CFR 249.10 - Form 1-N for notice registration as a national securities exchange.
Code of Federal Regulations, 2010 CFR
2010-04-01
... registration as a national securities exchange. 249.10 Section 249.10 Commodity and Securities Exchanges... or Exemption of, and Notification of Action Taken by, National Securities Exchanges § 249.10 Form 1-N for notice registration as a national securities exchange. This form shall be used for notice, and...
Sapkota, V P; Bhusal, U P
2017-01-01
Nepal is pursuing Social Health Insurance as a way of mobilizing revenues to achieve Universal Health Coverage. The Social Health Insurance governance encourages service providers to maintain quality and efficiency in services provision by practicing strategic purchasing. Social Health Security Programme is a social protection program which aspires to achieve the goals of Social Health Insurance. Social Health Security Development Committee needs to consider following experiences to function as a strategic purchaser. The Social Health Security Development Committee need to be an independent body instead of falling under Ministry of Health. Similarly, purchasing of health services needs to be made strategic, i.e., Social Health Security Development Committee should use its financial power to guide the provider behavior that will eventually contribute to achieving the goals of quality and efficiency in service provision. The other social health security funds should be merged with Social Health Security Development Committee and develop a single national fund. Finally, the state has to regulate and monitor the performance of the SHI agency.
NREL National Bioenergy Center Overview
Foust, Thomas; Pienkos, Phil; Sluiter, Justin; Magrini, Kim; McMillan, Jim
2018-01-16
The demand for clean, sustainable, secure energy is growing... and the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) is answering the call. NREL's National Bioenergy Center is pioneering biofuels research and development and accelerating the pace these technologies move into the marketplace.
77 FR 1710 - National Maritime Security Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-11
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0975] National Maritime Security Advisory... notice announcing a National Maritime Security Advisory Committee (NMSAC) public meeting on January 18-19... and forward progress regarding multiple maritime security initiatives. If you have been adversely...
75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...
76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-07
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...
77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-01
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National... Information Security Oversight Office no later than Friday, March 16, 2012. The Information Security Oversight... FURTHER INFORMATION CONTACT: David O. Best, Senior Program Analyst, The Information Security Oversight...
76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-01
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... must be submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 11...
76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-13
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...
75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-09
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...
Child rights, right to water and sanitation, and human security.
Pink, Ross
2012-06-15
The article explores the intersection between child rights, water scarcity, sanitation, and the human security paradigm. The recognition of child rights has been advanced through the 1989 Convention on the Rights of the Child and other international legal instruments, while water rights are increasingly affirmed in international law and through the historic July 2010 United Nations General Assembly resolution that strengthened the legal foundation for water security and human rights. Yet there remains a development gap in terms of child access to clean and secure water sources for basic human development needs. The human security paradigm provides a legal and humanitarian foundation for the extension of child rights related to water and sanitation. Copyright © 2012 Pink.
Metrics for the National SCADA Test Bed Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.
2008-12-05
The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.
78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-25
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 8, 2013. ISOO...
48 CFR 606.302-6 - National security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...
48 CFR 606.302-6 - National security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...
48 CFR 606.302-6 - National security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...
48 CFR 606.302-6 - National security.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...
48 CFR 606.302-6 - National security.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-02
... DEPARTMENT OF JUSTICE [OMB Number 1124-0001] National Security Division; Agency Information..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit... Justice sponsoring the collection: Form Number: NSD- 1. National Security Division, U.S. Department of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-02
... DEPARTMENT OF JUSTICE [OMB Number 1124-0006] National Security Division; Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit...
32 CFR 2001.1 - Purpose and scope.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...
32 CFR 2001.1 - Purpose and scope.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...
32 CFR 2001.1 - Purpose and scope.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...
32 CFR 2001.1 - Purpose and scope.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...
32 CFR 2001.1 - Purpose and scope.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barnes, Cris William
Los Alamos National Laboratory’s proposed MaRIE facility is slated to introduce the world’s highest energy hard x-ray free electron laser (XFEL). As the light source for the Matter-Radiation Interactions in Extremes experimental facility (MaRIE), the 42-keV XFEL, with bursts of x-ray pulses at gigahertz repetition for studying fast dynamical processes, will help accelerate discovery and design of the advanced materials needed to meet 21st-century national security and energy security challenges. Yet the science of free-electron lasers has a long and distinguished history at Los Alamos National Laboratory (LANL), where for nearly four decades Los Alamos scientists have been performing research,more » design, development, and collaboration work in FEL science. The work at Los Alamos has evolved from low-gain amplifier and oscillator FEL development to highbrightness photoinjector development, and later, self-amplified spontaneous emission (SASE) and high-gain amplifier FEL development.« less
MEMS and MOEMS for national security applications
NASA Astrophysics Data System (ADS)
Scott, Marion W.
2003-01-01
Major opportunities for microsystem insertion into commercial applications, such as telecommunications and medical prosthesis, are well known. Less well known are applications that ensure the security of our nation, the protection of its armed forces, and the safety of its citizens. Microsystems enable entirely new possibilities to meet National Security needs, which can be classed along three lines: anticipating security needs and threats, deterring the efficacy of identified threats, and defending against the application of these threats. In each of these areas, specific products that are enabled by MEMS and MOEMS are discussed. In the area of anticipating needs and threats, sensored microsystems designed for chem/bio/nuclear threats, and sensors for border and asset protection can significantly secure our borders, ports, and transportation systems. Key features for these applications include adaptive optics and spectroscopic capabilities. Microsystems to monitor soil and water quality can be used to secure critical infrastructure, food safety can be improved by in-situ identification of pathogens, and sensored buildings can ensure the architectural safety of our homes and workplaces. A challenge to commercializing these opportunities, and thus making them available for National Security needs, is developing predictable markets and predictable technology roadmaps. The integrated circuit manufacturing industry provides an example of predictable technology maturation and market insertion, primarily due to the existence of a "unit cell" that allows volume manufacturing. It is not clear that microsystems can follow an analogous path. The possible paths to affordable low-volume production, as well as the prospects of a microsystems unit cell, are discussed.
Marketing Strategy and Implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This report documents the marketing campaign that has been designed for middle and high school students in New Mexico to increase interest in participation in national security careers at the National Nuclear Security Administration. This marketing campaign builds on the research that was previously conducted, as well as the focus groups that were conducted. This work is a part of the National Nuclear Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) / National Nuclear Security Administration (NNSA) grant. Outcome analysis was performed to determine appropriate marketing strategies. The analysis was based upon focus groups with middlemore » school and high school students, student interactions, and surveys completed by students to understand and gauge student interest in Science, Technology, Engineering, and Math (STEM) subjects, interest in careers at NNSA, future job considerations, and student desire to pursue post-secondary education. Further, through the focus groups, students were asked to attend a presentation on NNSA job opportunities and employee requirements. The feedback received from the students was utilized to develop the focus and components of the marketing campaign.« less
Sandia National Laboratories: National Security Missions: Nuclear Weapons:
Safety & Security Sandia National Laboratories Exceptional service in the national interest & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Twitter YouTube Flickr RSS Top Nuclear Weapons About Nuclear Weapons at Sandia Safety & Security
78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-25
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, July 12, 2013. ISOO will...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-02
... DEPARTMENT OF JUSTICE [OMB Number 1124-0004] National Security Division: Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the... write to U.S. Department of Justice, 10th & Constitution Avenue, NW., National Security Division...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Governing certain off-board agency transactions by members of national securities exchanges. 240.19c-1 Section 240.19c-1 Commodity... members of national securities exchanges. The rules of each national securities exchange shall provide as...
Nordin, Stacia M; Boyle, Marie; Kemmer, Teresa M
2013-04-01
It is the position of the Academy of Nutrition and Dietetics that all people should have consistent access to an appropriately nutritious diet of food and water, coupled with a sanitary environment, adequate health services, and care that ensure a healthy and active life for all household members. The Academy supports policies, systems, programs, and practices that work with developing nations to achieve nutrition security and self-sufficiency while being environmentally and economically sustainable. For nations to achieve nutrition security, all people must have access to a variety of nutritious foods and potable drinking water; knowledge, resources, and skills for healthy living; prevention, treatment, and care for diseases affecting nutrition status; and safety-net systems during crisis situations, such as natural disasters or deleterious social and political systems. More than 2 billion people are micronutrient deficient; 1.5 billion people are overweight or obese; 870 million people have inadequate food energy intake; and 783 million people lack potable drinking water. Adequate nutrient intake is a concern, independent of weight status. Although this article focuses on nutritional deficiencies in developing nations, global solutions for excesses and deficiencies need to be addressed. In an effort to achieve nutrition security, lifestyles, policies, and systems (eg, food, water, health, energy, education/knowledge, and economic) contributing to sustainable resource use, environmental management, health promotion, economic stability, and positive social environments are required. Food and nutrition practitioners can get involved in promoting and implementing effective and sustainable policies, systems, programs, and practices that support individual, community, and national efforts. Copyright © 2013 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.
48 CFR 1352.237-72 - Security processing requirements-national security contracts.
Code of Federal Regulations, 2010 CFR
2010-10-01
.... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...
48 CFR 1352.237-72 - Security processing requirements-national security contracts.
Code of Federal Regulations, 2012 CFR
2012-10-01
.... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...
48 CFR 1352.237-72 - Security processing requirements-national security contracts.
Code of Federal Regulations, 2014 CFR
2014-10-01
.... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...
48 CFR 1352.237-72 - Security processing requirements-national security contracts.
Code of Federal Regulations, 2011 CFR
2011-10-01
.... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...
32 CFR 156.5 - National security positions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... of Existing Personnel Security Clearances” dated December 12, 2005 (Copies available on the Internet... 32 National Defense 1 2014-07-01 2014-07-01 false National security positions. 156.5 Section 156.5 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE...
10 CFR 602.16 - National security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...
10 CFR 602.16 - National security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...
10 CFR 602.16 - National security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...
40 CFR 92.908 - National security exemption.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must be...
Code of Federal Regulations, 2010 CFR
2010-07-01
... declassification of classified national security Executive Branch information that has been accessioned by NARA... ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION Responsibilities § 1260.20 Who is responsible for the declassification of classified national security Executive Branch information...
36 CFR 1256.70 - What controls access to national security-classified information?
Code of Federal Regulations, 2010 CFR
2010-07-01
... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...
1979-04-05
political, economic , or military pressure - pressure applied by those who either have the ability to contro directly or can indirectly influence the flow...collective national security. The political and economic risks of foreign oil supply interruptions are very serious and very real to our national security...security. We must find energy alternatives - alternatives that are domestically controllable, technically feasible, and economically , environmentally, and
Laboratory Directed Research and Development FY2001 Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Al-Ayat, R
2002-06-20
Established by Congress in 1991, the Laboratory Directed Research and Development (LDRD) Program provides the Department of Energy (DOE)/National Nuclear Security Administration (NNSA) laboratories, like Lawrence Livermore National Laboratory (LLNL or the Laboratory), with the flexibility to invest up to 6% of their budget in long-term, high-risk, and potentially high payoff research and development (R&D) activities to support the DOE/NNSA's national security missions. By funding innovative R&D, the LDRD Program at LLNL develops and extends the Laboratory's intellectual foundations and maintains its vitality as a premier research institution. As proof of the Program's success, many of the research thrusts thatmore » started many years ago under LDRD sponsorship are at the core of today's programs. The LDRD Program, which serves as a proving ground for innovative ideas, is the Laboratory's most important single resource for fostering excellent science and technology for today's needs and tomorrow's challenges. Basic and applied research activities funded by LDRD enhance the Laboratory's core strengths, driving its technical vitality to create new capabilities that enable LLNL to meet DOE/NNSA's national security missions. The Program also plays a key role in building a world-class multidisciplinary workforce by engaging the Laboratory's best researchers, recruiting its future scientists and engineers, and promoting collaborations with all sectors of the larger scientific community.« less
A Hierarchical Security Architecture for Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Quanyan Zhu; Tamer Basar
2011-08-01
Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.
2008-01-01
S ) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) U.S. Air Force Academy,Institute...for National Security Studies,USAFA,CO,80840 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME( S ) AND ADDRESS(ES) 10...SPONSOR/MONITOR’S ACRONYM( S ) 11. SPONSOR/MONITOR’S REPORT NUMBER( S ) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution
2002-07-01
Knowledge From Data .................................................. 25 HIGH-CONFIDENCE SOFTWARE AND SYSTEMS Reliability, Security, and Safety for...NOAA’s Cessna Citation flew over the 16-acre World Trade Center site, scanning with an Optech ALSM unit. The system recorded data points from 33,000...provide the data storage and compute power for intelligence analysis, high-performance national defense systems , and critical scientific research • Large
Spatially Explicit Life Cycle Assessment of Biofuel Feedstock Production
Biofuels derived from renewable resources have gained increased research and development priority due to increasing energy demand and national security concerns. In the US, the Energy Independence and Security Act (EISA) of 2007 mandated the annual production of 56.8 billion L of...
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
The National Energy Technology Laboratory celebrates 100 years of innovative energy technology development. NETL has been a leader in energy technology development. This video takes a look back at the many accomplishments over the past 100 years. These advances benefit the American people, enhance our nation's energy security and protect our natural resources.
None
2018-01-16
The National Energy Technology Laboratory celebrates 100 years of innovative energy technology development. NETL has been a leader in energy technology development. This video takes a look back at the many accomplishments over the past 100 years. These advances benefit the American people, enhance our nation's energy security and protect our natural resources.
77 FR 51817 - National Maritime Security Advisory Committee; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-27
... the information sharing efforts of the Coast Guard and DHS. (2) Cyber-Security. The Committee will... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0797] National Maritime Security Advisory...: The National Maritime Security Advisory Committee (NMSAC) will meet on September 11-12, 2012 in the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-03
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70263; File No. SR-NSCC-2013-09] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change.... On July 2, 2013, the National Securities Clearing Corporation filed with the Securities and Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-03
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70544; File No. SR-NSCC-2013-10] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change... September 16, 2013, National Securities Clearing Corporation (``NSCC'') filed with the Securities and...
US-CERT Control System Center Input/Output (I/O) Conceputal Design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2005-02-01
This document was prepared for the US-CERT Control Systems Center of the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs the federal departments to identify and prioritize critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the NCSD to address the control system security component addressed in the National Strategy to Secure Cyberspace andmore » the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems; the I/O upgrade described in this document supports these goals. The vulnerability assessment Test Bed, located in the Information Operations Research Center (IORC) facility at Idaho National Laboratory (INL), consists of a cyber test facility integrated with multiple test beds that simulate the nation's critical infrastructure. The fundamental mission of the Test Bed is to provide industry owner/operators, system vendors, and multi-agency partners of the INL National Security Division a platform for vulnerability assessments of control systems. The Input/Output (I/O) upgrade to the Test Bed (see Work Package 3.1 of the FY-05 Annual Work Plan) will provide for the expansion of assessment capabilities within the IORC facility. It will also provide capabilities to connect test beds within the Test Range and other Laboratory resources. This will allow real time I/O data input and communication channels for full replications of control systems (Process Control Systems [PCS], Supervisory Control and Data Acquisition Systems [SCADA], and components). This will be accomplished through the design and implementation of a modular infrastructure of control system, communications, networking, computing and associated equipment, and measurement/control devices. The architecture upgrade will provide a flexible patching system providing a quick ''plug and play''configuration through various communication paths to gain access to live I/O running over specific protocols. This will allow for in-depth assessments of control systems in a true-to-life environment. The full I/O upgrade will be completed through a two-phased approach. Phase I, funded by DHS, expands the capabilities of the Test Bed by developing an operational control system in two functional areas, the Science & Technology Applications Research (STAR) Facility and the expansion of various portions of the Test Bed. Phase II (see Appendix A), funded by other programs, will complete the full I/O upgrade to the facility.« less
2014-09-01
biometrics technologies. 14. SUBJECT TERMS Facial recognition, systems engineering, live video streaming, security cameras, national security ...national security by sharing biometric facial recognition data in real-time utilizing infrastructures currently in place. It should be noted that the...9/11),law enforcement (LE) and Intelligence community (IC)authorities responsible for protecting citizens from threats against national security
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Forty-five day exemption from registration for certain members of national securities exchanges. 240.15a-4 Section 240.15a-4 Commodity and... national securities exchanges. (a) A natural person who is a member of a national securities exchange shall...
78 FR 54634 - National Security Education Board; Notice of Federal Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-05
... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), Office of the Secretary, DoD. ACTION: Meeting notice... committee working group meeting of the National Security Education Board will take place. DATES: Monday...
10 CFR 2.903 - Protection of restricted data and national security information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States and...
48 CFR 6.302-6 - National security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the agency...
48 CFR 6.302-6 - National security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the agency...
48 CFR 6.302-6 - National security.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the agency...
40 CFR 90.908 - National security exemption.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request for...
40 CFR 89.908 - National security exemption.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...
36 CFR 1256.46 - National security-classified information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false National security-classified... Restrictions § 1256.46 National security-classified information. In accordance with 5 U.S.C. 552(b)(1), NARA... properly classified under the provisions of the pertinent Executive Order on Classified National Security...
48 CFR 204.470-2 - National security exclusion.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false National security... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... associated with such activities, with direct national security significance. (b) In order to ensure that all...
45 CFR 601.2 - Classification authority.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.2 Classification authority. The... a Foundation employee develops information that appears to warrant classification because of its...
45 CFR 601.2 - Classification authority.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.2 Classification authority. The... a Foundation employee develops information that appears to warrant classification because of its...
45 CFR 601.2 - Classification authority.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.2 Classification authority. The... a Foundation employee develops information that appears to warrant classification because of its...
45 CFR 601.2 - Classification authority.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.2 Classification authority. The... a Foundation employee develops information that appears to warrant classification because of its...
45 CFR 601.2 - Classification authority.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.2 Classification authority. The... a Foundation employee develops information that appears to warrant classification because of its...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chrzanowski, P; Walter, K
For the Laboratory and staff, 2006 was a year of outstanding achievements. As our many accomplishments in this annual report illustrate, the Laboratory's focus on important problems that affect our nation's security and our researchers breakthroughs in science and technology have led to major successes. As a national laboratory that is part of the Department of Energy's National Nuclear Security Administration (DOE/NNSA), Livermore is a key contributor to the Stockpile Stewardship Program for maintaining the safety, security, and reliability of the nation's nuclear weapons stockpile. The program has been highly successful, and our annual report features some of the Laboratory'smore » significant stockpile stewardship accomplishments in 2006. A notable example is a long-term study with Los Alamos National Laboratory, which found that weapon pit performance will not sharply degrade from the aging effects on plutonium. The conclusion was based on a wide range of nonnuclear experiments, detailed simulations, theoretical advances, and thorough analyses of the results of past nuclear tests. The study was a superb scientific effort. The continuing success of stockpile stewardship enabled NNSA in 2006 to lay out Complex 2030, a vision for a transformed nuclear weapons complex that is more responsive, cost efficient, and highly secure. One of the ways our Laboratory will help lead this transformation is through the design and development of reliable replacement warheads (RRWs). Compared to current designs, these warheads would have enhanced performance margins and security features and would be less costly to manufacture and maintain in a smaller, modernized production complex. In early 2007, NNSA selected Lawrence Livermore and Sandia National Laboratories-California to develop ''RRW-1'' for the U.S. Navy. Design efforts for the RRW, the plutonium aging work, and many other stockpile stewardship accomplishments rely on computer simulations performed on NNSA's Advanced Simulation and Computing (ASC) Program supercomputers at Livermore. ASC Purple and BlueGene/L, the world's fastest computer, together provide nearly a half petaflop (500 trillion operations per second) of computer power for use by the three NNSA national laboratories. Livermore-led teams were awarded the Gordon Bell Prize for Peak Performance in both 2005 and 2006. The winning simulations, run on BlueGene/L, investigated the properties of materials at the length and time scales of atomic interactions. The computing power that makes possible such detailed simulations provides unprecedented opportunities for scientific discovery. Laboratory scientists are meeting the extraordinary challenge of creating experimental capabilities to match the resolution of supercomputer simulations. Working with a wide range of collaborators, we are developing experimental tools that gather better data at the nanometer and subnanosecond scales. Applications range from imaging biomolecules to studying matter at extreme conditions of pressure and temperature. The premier high-energy-density experimental physics facility in the world will be the National Ignition Facility (NIF) when construction is completed in 2009. We are leading the national effort to perform the first fusion ignition experiments using NIF's 192-beam laser and prepare to explore some of the remaining important issues in weapons physics. With scientific colleagues from throughout the nation, we are also designing revolutionary experiments on NIF to advance the fields of astrophysics, planetary physics, and materials science. Mission-directed, multidisciplinary science and technology at Livermore is also focused on reducing the threat posed by the proliferation of weapons of mass destruction as well as their acquisition and use by terrorists. The Laboratory helps this important national effort by providing its unique expertise, integration analyses, and operational support to the Department of Homeland Security. For this vital facet of the Laboratory's national security mission, we are developing advanced technologies, such as a pocket-size explosives detector and an airborne persistent surveillance system, both of which earned R&D 100 Awards. Altogether, Livermore won seven R&D 100 Awards in 2006, the most for any organization. Emerging threats to national and global security go beyond defense and homeland security. Livermore pursues major scientific and technical advances to meet the need for a clean environment; clean, abundant energy; better water management; and improved human health. Our annual report highlights the link between human activities and the warming of tropical oceans, as well as techniques for imaging biological molecules and detecting bone cancer in its earliest stages. In addition, we showcase many scientific discoveries: distant planets, the composition of comets, a new superheavy element.« less
Foundations for Security Aware Software Development Education
2005-11-22
depending on the budget, that support robustness. We discuss the educational customer base, projected lifetime, and complexity of paradigm shift that should...in Honour of Sir Tony Hoar, [6] Cheetham, C. and Ferraiolo, K., "The Systems Security Millenial Perspectives in Computer Science, Engineering...Capability Maturity Model", 21st 2002, 229-246. National Information Systems Security Conference, [15] Schwartz, J., "Object Oriented Extensions to October 5
Contemporary United States Foreign Policy Towards Indonesia
2004-01-01
regard to resolving a number of longstanding territorial disputes, and it has become a cornerstone for the promotion of economic and social development...and stability and security in the region. However, Indonesia is also faced with a variety of social , economic, and internal security issues, most...faced with significant social , economic, and security issues. Thesis Question The thesis question is: Does contemporary US policy promote US national
2013-01-01
tremendously dangerous and sophisticated virus that successfully attacked a SCADA system is now available for free on the Internet, where one can find...security for the public and private sectors. To develop this capability, the Nation needs to undergo a paradigm shift on how it views the cyber... for communications and trade were extraordinarily important for the security and prosperity of Britain. Today, the security and prosperity of the
Strategic Vision: A Selected Bibliography
2011-04-01
Africa in the New World: How Global and Domestic Developments Will Impact by 2025. Tshwane (Pretoria), South Africa: Institute for Security Studies...Our Next Chapter; Tough Questions, Straight Answers. New York: Ecco, 2008. 306pp. (E902 . H13 2008) Hanks, Reuel R. Global Security Watch: Central...D’Amato. The Macroeconomics of US Defense Spending: Problems in Federal Spending, and Their Impact on National Security. Washington, DC: Center for
ERIC Educational Resources Information Center
Agabi, Ogar G.; Obasi, Kenneth K.; Ohia, Adanma N.
2012-01-01
Quality manpower production is not just essential for national development, but very critical to national security and quick economic recovery in most of today's fragile economies of the world. This paper assessed the participation of prospective employers as relevant interest groups in the development of academic programmes in tertiary…
77 FR 26259 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-03
.... SUPPLEMENTARY INFORMATION: The National Security Agency systems of records notice subject to the Privacy Act of... of Records AGENCY: National Security Agency/Central Security Service. ACTION: Notice to Delete a System of Records. SUMMARY: The National Security Agency/Central Security Service is deleting a system of...
75 FR 67697 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-03
... National Security Agency's record system notices for records systems subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act (FOIA)/Privacy Act Office...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to add a...
75 FR 43494 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... National Security Agency's record system notices for records systems subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act and Privacy Act Office, 9800...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to...
32 CFR 2001.80 - Prescribed standard forms.
Code of Federal Regulations, 2011 CFR
2011-07-01
... when their use will enhance the protection of national security information and/or will reduce the....80 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Standard...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pepper, S. E.; Bachner, K.; Gomera, J.
Brookhaven National Laboratory’s (BNL’s) Nonproliferation and National Security Department hosted the Next Generation Safeguards Professional Network (NGSPN) at BNL September 6-9, 2016. Thirteen representatives from seven Department of Energy National Laboratories, including two from BNL, participated in the four-day meeting. The NGSPN meeting was sponsored by the Office of International Nuclear Safeguards (NA-241) of the National Nuclear Security Administration, which provided funding for BNL’s development and conduct of the meeting program and the participant’s labor and travel. NGSPN meetings were previously held at Savannah River National Laboratory, Oak Ridge National Laboratory, Idaho National Laboratory, Sandia National Laboratories, and Los Alamosmore » National Laboratory. The purpose of NGSPN is to provide a forum for early-career international safeguards practitioners to network with their peers, to meet international safeguards experts from other institutions and to learn about organizations other than their employers who contribute to international safeguards.« less
Laboratory directed research and development fy1999 annual report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Al-Ayat, R A
2000-04-11
The Lawrence Livermore National Laboratory (LLNL) was founded in 1952 and has been managed since its inception by the University of California (UC) for the U.S. Department of Energy (DOE). Because of this long association with UC, the Laboratory has been able to recruit a world-class workforce, establish an atmosphere of intellectual freedom and innovation, and achieve recognition in relevant fields of knowledge as a scientific and technological leader. This environment and reputation are essential for sustained scientific and technical excellence. As a DOE national laboratory with about 7,000 employees, LLNL has an essential and compelling primary mission to ensuremore » that the nation's nuclear weapons remain safe, secure, and reliable and to prevent the spread and use of nuclear weapons worldwide. The Laboratory receives funding from the DOE Assistant Secretary for Defense Programs, whose focus is stewardship of our nuclear weapons stockpile. Funding is also provided by the Deputy Administrator for Defense Nuclear Nonproliferation, many Department of Defense sponsors, other federal agencies, and the private sector. As a multidisciplinary laboratory, LLNL has applied its considerable skills in high-performance computing, advanced engineering, and the management of large research and development projects to become the science and technology leader in those areas of its mission responsibility. The Laboratory Directed Research and Development (LDRD) Program was authorized by the U.S. Congress in 1984. The Program allows the Director of each DOE laboratory to fund advanced, creative, and innovative research and development (R&D) activities that will ensure scientific and technical vitality in the continually evolving mission areas at DOE and the Laboratory. In addition, the LDRD Program provides LLNL with the flexibility to nurture and enrich essential scientific and technical competencies, which attract the most qualified scientists and engineers. The LDRD Program also enables many collaborations with the scientific community in academia, national and international laboratories, and industry. The projects in the FY1999 LDRD portfolio were carefully selected to continue vigorous support of the strategic vision and the long-term goals of DOE and the Laboratory. Projects chosen for LDRD funding undergo stringent selection processes, which look for high-potential scientific return, emphasize strategic relevance, and feature technical peer reviews by external and internal experts. The FY1999 projects described in this annual report focus on supporting the Laboratory's national security needs: stewardship of the U.S. nuclear weapons stockpile, responsibility for the counter- and nonproliferation of weapons of mass destruction, development of high-performance computing, and support of DOE environmental research and waste management programs. In the past, LDRD investments have significantly enhanced LLNL scientific capabilities and greatly contributed to the Laboratory's ability to meet its national security programmatic requirements. Examples of past investments include technical precursors to the Accelerated Strategic Computing Initiative (ASCI), special-materials processing and characterization, and biodefense. Our analysis of the FY1999 portfolio shows that it strongly supports the Laboratory's national security mission. About 95% of the LDRD dollars have directly supported LLNL's national security activities in FY1999, which far exceeds the portion of LLNL's overall budget supported by National Security Programs, which is 63% for FY1999.« less
Building Community Resilience to Disasters: A Way Forward to Enhance National Health Security.
Chandra, Anita; Acosta, Joie; Howard, Stefanie; Uscher-Pines, Lori; Williams, Malcolm; Yeung, Douglas; Garnett, Jeffrey; Meredith, Lisa S
2011-01-01
Community resilience, or the sustained ability of a community to withstand and recover from adversity, has become a key policy issue at federal, state, and local levels, including in the National Health Security Strategy. Because resources are limited in the wake of an emergency, it is increasingly recognized that resilience is critical to a community's ability to reduce long recovery periods after an emergency. This article shares details of a report that provides a roadmap for federal, state, and local leaders who are developing plans to enhance community resilience for health security threats and describes options for building community resilience in key areas. Based on findings from a literature review and a series of community and regional focus groups, the authors provide a definition of community resilience in the context of national health security and a set of eight levers and five core components for building resilience. They then describe suggested activities that communities are pursuing and may want to strengthen for community resilience, and they identify challenges to implementation.
17 CFR 240.11a1-4(T) - Bond transactions on national securities exchanges.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Bond transactions on national securities exchanges. 240.11a1-4(T) Section 240.11a1-4(T) Commodity and Securities Exchanges SECURITIES AND....11a1-4(T) Bond transactions on national securities exchanges. A transaction in a bond, note, debenture...
17 CFR 240.11a1-4(T) - Bond transactions on national securities exchanges.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Bond transactions on national securities exchanges. 240.11a1-4(T) Section 240.11a1-4(T) Commodity and Securities Exchanges SECURITIES AND....11a1-4(T) Bond transactions on national securities exchanges. A transaction in a bond, note, debenture...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greenwald, P.T.
In the post Cold War era, the East-West conflict may be succeeded by a new confrontation which pits an industrialized North against a developing South. In June 1992, world attention was fixed on the Earth Summit in Rio de Janeiro. This event marked a milestone in global environmental awareness; but just as the end of the Cold War has provided new opportunities for the US, the world is now faced with new sources of conflict which have advanced to the forefront of the national security debate. Among the new sources of conflict, environmental problems are rapidly becoming preeminent. Within nationalmore » security debates, those environmental problems which respect no international boundary are of particular concern. Worldwide deforestation, and the related issues of global warming and the loss of biodiversity, represent a clear threat to national security. Two percent of the Earth's rainforests are lost each year; one 'football field' is lost each second. Deforestation has already led to conflict and instability within several regions of the world including Southeast Asia. The United States must recognize the character and dynamics of these new sources of conflict in order to successfully realize its policy aims in national security. The US should preempt conflict through cooperation and develop a shared concern for the environment throughout the world. The US military may play a key role in this effort. Rainforest, Deforestation, Tropical timber, Logging, Southeast Asia, Philippines, Malaysia, Indonesia, Thailand, Burma, Laos, Japan Cambodia, Vietnam, Human rights, Plywood, Pulp, Paper, World Bank, U.S. Agency for International Development.« less
THE NEW DIMENSIONS OF REMOTE SENSING AND GLOBAL SECURITY
Remote sensing as a science and as a paradigm was borne from the critical need for battlefield intelligence and grew and thrived as one of the fundamental cornerstones of national security. To a great extent, the development ofmany aspects and accepted principals of remote sensin...
Tradeoffs Associated with Fighting Terrorism.
ERIC Educational Resources Information Center
Deming, Stuart H.
1997-01-01
Elucidates the inherent conflict between national security and public safety measures necessitated by terrorism and the Fourth Amendment protections against unreasonable search and seizure. Briefly discusses the rise in terrorist activity in the 1970s and the development of airline security. Identifies several areas where personal freedom has been…
75 FR 75952 - U.S. Agency for International Mandatory Declassification Review Address
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-07
... Development. ACTION: Notice. SUMMARY: Pursuant to the Information Security Oversight Offices Classified National Security Information Directive No. 1, this notice provides the U.S. Agency for International... public in advising them where to send such requests for declassification review. FOR FURTHER INFORMATION...
Cyber Security Assessment Report: Adventium Labs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-31
Major control system components often have life spans of 15-20 years. Many systems in our Nation's critical infrastructure were installed before the Internet became a reality and security was a concern. Consequently, control systems are generally insecure. Security is now being included in the development of new control system devices; however, legacy control systems remain vulnerable. Most efforts to secure control systems are aimed at protecting network borers, but if an intruder gets inside the network these systems are vulnerable to a cyber attack.
Code of Federal Regulations, 2011 CFR
2011-01-01
... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.913 Review of Restricted Data or other National Security Information received in evidence. At the close of the reception of... National Security Information be expunged from the record where such expunction would not prejudice the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... or other national security information. 2.908 Section 2.908 Energy NUCLEAR REGULATORY COMMISSION... Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a) A...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-21
... DEPARTMENT OF ENERGY National Nuclear Security Administration Extension of the Public Comment... Department of Energy/National Nuclear Security Administration Nevada National Security Site and Off-Site Locations in the State of Nevada AGENCY: National Nuclear Security Administration, U.S. Department of Energy...
10 CFR 2.911 - Admissibility of restricted data or other national security information.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security...
10 CFR 2.911 - Admissibility of restricted data or other national security information.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security...
40 CFR 80.606 - What national security exemption applies to fuels covered under this subpart?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 16 2010-07-01 2010-07-01 false What national security exemption... national security exemption applies to fuels covered under this subpart? (a) The standards of all the fuels..., including locomotive and marine, having an EPA national security exemption from the motor vehicle emission...
12 CFR 335.251 - Forms for notification of action taken by national securities exchanges.
Code of Federal Regulations, 2010 CFR
2010-01-01
... national securities exchanges. 335.251 Section 335.251 Banks and Banking FEDERAL DEPOSIT INSURANCE... for notification of action taken by national securities exchanges. The applicable forms for notification of action taken by national securities exchanges are codified in subpart A of 17 CFR part 249. All...
Code of Federal Regulations, 2010 CFR
2010-01-01
... or other national security information. 2.908 Section 2.908 Energy NUCLEAR REGULATORY COMMISSION... Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a) A...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.913 Review of Restricted Data or other National Security Information received in evidence. At the close of the reception of... National Security Information be expunged from the record where such expunction would not prejudice the...
Code of Federal Regulations, 2010 CFR
2010-01-01
... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is the...
10 CFR 2.903 - Protection of restricted data and national security information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Plan § 103.500 General. (a) The Area Maritime... with the National Maritime Transportation Security Plan and the National Transportation Security Plan...
The Millennial Generation: Developing Leaders for the Future Security Environment
2011-02-15
Dumbest Generation (Penguin Group, New York, New York: 2009) p 8, 10. 19 National Academy of Sciences, “Generation Y : The Millennials …Ready or Not, Here...St ra te gy R es ea rc h Pr oj ec t THE MILLENNIAL GENERATION: DEVELOPING LEADERS FOR THE FUTURE SECURITY ENVIRONMENT BY COLONEL LANCE...Strategy Research Project 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE The Millennial Generation: Developing Leaders for the Future
Focusing America’s National Powers
2006-04-14
governments with market economies. 15. SUBJECT TERMS National Security, National Powers, Sources of Power, National Security Council, National Security... Strategy , Six-phased Campaign Plan, JIACG, DIME 16. SECURITY CLASSIFICATION OF: Unclassified 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME...satisfaction of the requirements of a Master of Science Degree in Joint Campaign Planning and Strategy . The contents of this paper reflect my own
Global Maize Trade and Food Security: Implications from a Social Network Model
Wu, Felicia; Guclu, Hasan
2013-01-01
In this study, we developed a social network model of the global trade of maize: one of the most important food, feed, and industrial crops worldwide, and critical to food security. We used this model to analyze patterns of maize trade among nations, and to determine where vulnerabilities in food security might arise if maize availability were decreased due to factors such as diversion to non-food uses, climatic factors, or plant diseases. Using data on imports and exports from the United Nations Commodity Trade Statistics Database for each year from 2000 to 2009 inclusive, we summarized statistics on volumes of maize trade between pairs of nations for 217 nations. There is evidence of market segregation among clusters of nations; with three prominent clusters representing Europe, Brazil and Argentina, and the United States. The United States is by far the largest exporter of maize worldwide, while Japan and the Republic of Korea are the largest maize importers. In particular, the star-shaped cluster of the network that represents US maize trade to other nations indicates the potential for food security risks because of the lack of trade these other nations conduct with other maize exporters. If a scenario arose in which US maize could not be exported in as large quantities, maize supplies in many nations could be jeopardized. We discuss this in the context of recent maize ethanol production and its attendant impacts on food prices elsewhere worldwide. PMID:23656551
76 FR 40296 - Declassification of National Security Information
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-08
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION 36 CFR Part 1260 [FDMS NARA-11-0001] RIN 3095-AB64 Declassification of National Security Information AGENCY: National Archives and Records Administration. ACTION... classified national security information in records transferred to NARA's legal custody. The rule...
2013-06-01
ABBREVIATIONS ANSI American National Standards Institute ASIS American Society of Industrial Security CCTV Closed Circuit Television CONOPS...is globally recognized for the development and maintenance of standards. ASTM defines a specification as an explicit set of requirements...www.rkb.us/saver/. One of the SAVER reports titled CCTV Technology Handbook has a chapter on system design. The report uses terms like functional
ERIC Educational Resources Information Center
Lucas-Thompson, Rachel; Clarke-Stewart, K. Alison
2007-01-01
Mothers' perceptions of marital quality and depressed mood and children's attachment security and friendship quality were assessed in the National Institute of Child Health and Human Development Study of Early Child Care and Youth Development. One month after their birth and again when the children were 3 and 4 years old and in first and third…
Descriptive Model of Generic WAMS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hauer, John F.; DeSteese, John G.
The Department of Energy’s (DOE) Transmission Reliability Program is supporting the research, deployment, and demonstration of various wide area measurement system (WAMS) technologies to enhance the reliability of the Nation’s electrical power grid. Pacific Northwest National Laboratory (PNNL) was tasked by the DOE National SCADA Test Bed Program to conduct a study of WAMS security. This report represents achievement of the milestone to develop a generic WAMS model description that will provide a basis for the security analysis planned in the next phase of this study.
OPSAID Initial Design and Testing Report.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hurd, Steven A.; Stamp, Jason Edwin; Chavez, Adrian R.
2007-11-01
Process Control System (PCS) security is critical to our national security. Yet, there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy's Office of Electricity Delivery and Reliability, aims to address this issue through developing and testing an open source architecture for PCS security. Sandia National Laboratories, along with a team of PCS vendors and owners, have developed and tested this PCS security architecture. This report describes their progress to date.2 AcknowledgementsThe authors acknowledgemore » and thank their colleagues for their assistance with the OPSAID project.Sandia National Laboratories: Alex Berry, Charles Perine, Regis Cassidy, Bryan Richardson, Laurence PhillipsTeumim Technical, LLC: Dave TeumimIn addition, the authors are greatly indebted to the invaluable help of the members of the OPSAID Core Team. Their assistance has been critical to the success and industry acceptance of the OPSAID project.Schweitzer Engineering Laboratory: Rhett Smith, Ryan Bradetich, Dennis GammelTelTone: Ori Artman Entergy: Dave Norton, Leonard Chamberlin, Mark AllenThe authors would like to acknowledge that the work that produced the results presented in this paper was funded by the U.S. Department of Energy/Office of Electricity Delivery and Energy Reliability (DOE/OE) as part of the National SCADA Test Bed (NSTB) Program. Executive SummaryProcess control systems (PCS) are very important for critical infrastructure and manufacturing operations, yet cyber security technology in PCS is generally poor. The OPSAID (Open PCS (Process Control System) Security Architecture for Interoperable Design) program is intended to address these security shortcomings by accelerating the availability and deployment of comprehensive security technology for PCS, both for existing PCS and inherently secure PCS in the future. All activities are closely linked to industry outreach and advisory efforts.Generally speaking, the OPSAID project is focused on providing comprehensive security functionality to PCS that communicate using IP. This is done through creating an interoperable PCS security architecture and developing a reference implementation, which is tested extensively for performance and reliability.This report first provides background on the PCS security problem and OPSAID, followed by goals and objectives of the project. The report also includes an overview of the results, including the OPSAID architecture and testing activities, along with results from industry outreach activities. Conclusion and recommendation sections follow. Finally, a series of appendices provide more detailed information regarding architecture and testing activities.Summarizing the project results, the OPSAID architecture was defined, which includes modular security functionality and corresponding component modules. The reference implementation, which includes the collection of component modules, was tested extensively and proved to provide more than acceptable performance in a variety of test scenarios. The primary challenge in implementation and testing was correcting initial configuration errors.OPSAID industry outreach efforts were very successful. A small group of industry partners were extensively involved in both the design and testing of OPSAID. Conference presentations resulted in creating a larger group of potential industry partners.Based upon experience implementing and testing OPSAID, as well as through collecting industry feedback, the OPSAID project has done well and is well received. Recommendations for future work include further development of advanced functionality, refinement of interoperability guidance, additional laboratory and field testing, and industry outreach that includes PCS owner education. 4 5 --This page intentionally left blank --« less
Students' Study Abroad Plans: The Influence of Motivational and Personality Factors
ERIC Educational Resources Information Center
Li, Manyu; Olson, Josephine E.; Frieze, Irene Hanson
2013-01-01
Improving the international competencies of university students is becoming an important goal for both nations and universities. On the country level, national security and globalization trends are "driving nations to place more importance on developing and recruiting human capital or brain power through international education…
ERIC Educational Resources Information Center
Radack, Shirley M.
1994-01-01
Examines the role of the National Institute of Standards and Technology (NIST) in the development of the National Information Infrastructure (NII). Highlights include the standards process; voluntary standards; Open Systems Interconnection problems; Internet Protocol Suite; consortia; government's role; and network security. (16 references) (LRW)
32 CFR 2001.50 - Telecommunications automated information systems and network security.
Code of Federal Regulations, 2014 CFR
2014-07-01
... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...
32 CFR 2001.50 - Telecommunications automated information systems and network security.
Code of Federal Regulations, 2013 CFR
2013-07-01
... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...
32 CFR 2001.50 - Telecommunications automated information systems and network security.
Code of Federal Regulations, 2012 CFR
2012-07-01
... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...
LLNL: Science in the National Interest
George Miller
2017-12-09
This is Lawrence Livermore National Laboratory. located in the Livermore Valley about 50 miles east of San Francisco, the Lab is where the nations topmost science, engineering and technology come together. National security, counter-terrorism, medical technologies, energy, climate change our researchers are working to develop solutions to these challenges. For more than 50 years, we have been keeping America strong.
Livestock and food security: vulnerability to population growth and climate change
Godber, Olivia F; Wall, Richard
2014-01-01
Livestock production is an important contributor to sustainable food security for many nations, particularly in low-income areas and marginal habitats that are unsuitable for crop production. Animal products account for approximately one-third of global human protein consumption. Here, a range of indicators, derived from FAOSTAT and World Bank statistics, are used to model the relative vulnerability of nations at the global scale to predicted climate and population changes, which are likely to impact on their use of grazing livestock for food. Vulnerability analysis has been widely used in global change science to predict impacts on food security and famine. It is a tool that is useful to inform policy decision making and direct the targeting of interventions. The model developed shows that nations within sub-Saharan Africa, particularly in the Sahel region, and some Asian nations are likely to be the most vulnerable. Livestock-based food security is already compromised in many areas on these continents and suffers constraints from current climate in addition to the lack of economic and technical support allowing mitigation of predicted climate change impacts. Governance is shown to be a highly influential factor and, paradoxically, it is suggested that current self-sufficiency may increase future potential vulnerability because trade networks are poorly developed. This may be relieved through freer trade of food products, which is also associated with improved governance. Policy decisions, support and interventions will need to be targeted at the most vulnerable nations, but given the strong influence of governance, to be effective, any implementation will require considerable care in the management of underlying structural reform. PMID:24692268
Code of Federal Regulations, 2012 CFR
2012-07-01
... are exempt from release under the National Security Exemption of the Privacy Act? 1202.90 Section 1202... from release under the National Security Exemption of the Privacy Act? (a) The Investigative Case Files... interfere with ongoing investigations and law enforcement or national security activities and impose an...
Code of Federal Regulations, 2011 CFR
2011-07-01
... are exempt from release under the National Security Exemption of the Privacy Act? 1202.90 Section 1202... from release under the National Security Exemption of the Privacy Act? (a) The Investigative Case Files... interfere with ongoing investigations and law enforcement or national security activities and impose an...
Code of Federal Regulations, 2014 CFR
2014-07-01
... are exempt from release under the National Security Exemption of the Privacy Act? 1202.90 Section 1202... from release under the National Security Exemption of the Privacy Act? (a) The Investigative Case Files... interfere with ongoing investigations and law enforcement or national security activities and impose an...
The Impact of Migration Processes on the National Security of Kazakhstan
ERIC Educational Resources Information Center
Korganova, Saipzhamal S.; Taubayeva, Mirash Y.; Sultanov, Serik A.; Rysbayeva, Saule Zh.; Sultanova, Valida I.; Zhumabekov, Madiyr U.; Raximshikova, Mavluda K.
2016-01-01
The purpose of this study is to analyze the impact of migration processes on the national security of Kazakhstan. However, it should be noted that national security is an expression of national interests and it is provided by means of resources and efforts of a particular state. Consequently, social security is an expression of the public…
Code of Federal Regulations, 2010 CFR
2010-04-01
... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited volume...
Code of Federal Regulations, 2011 CFR
2011-04-01
... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited volume...
ERIC Educational Resources Information Center
Ogbunaya, T. C.; Udoudo, Ekereobong S.
2015-01-01
The paper focused on repositioning Technical and Vocational Education and Training (TVET) for youth's employment and national security in Nigeria. It examined briefly the concepts of technical vocational education and training (TVET), youths, unemployment and national security as well as the effects of unemployment on national security in Nigeria.…
Small Nations in Multinational Operations and Armenian Perspectives
2014-12-12
National Security Powers: Are the Checks in Balance?” In U.S. Army War College Guide to National Security Issues, Volume II: National Security Policy and...SMALL NATIONS IN MULTINATIONAL OPERATIONS AND ARMENIAN PERSPECTIVES A thesis presented to the Faculty of the U.S. Army
Ready to Respond: Case Studies in Campus Safety and Security
ERIC Educational Resources Information Center
Hyatt, James A.
2010-01-01
Is your campus primed for the next big emergency? The National Campus Safety and Security Project (NCSSP), led by NACUBO, sought to help colleges and universities develop comprehensive emergency management plans that address the four phases of emergency management: prevention/mitigation, preparedness, response, and recovery. A major component of…
United Nations Charter, Chapter VII, Article 43: Now or Never.
Burkle, Frederick M
2018-04-25
For more than 75 years, the United Nations Charter has functioned without the benefit of Chapter VII, Article 43, which commits all United Nations member states "to make available to the Security Council, on its call, armed forces, assistance, facilities, including rights of passage necessary for the purpose of maintaining international peace and security." The consequences imposed by this 1945 decision have had a dramatic negative impact on the United Nation's functional capacity as a global body for peace and security. This article summarizes the struggle to implement Article 43 over the decades from the onset of the Cold War, through diplomatic attempts during the post-Cold War era, to current and often controversial attempts to provide some semblance of conflict containment through peace enforcement missions. The rapid growth of globalization and the capability of many nations to provide democratic protections to their populations are again threatened by superpower hegemony and the development of novel unconventional global threats. The survival of the United Nations requires many long overdue organizational structure and governance power reforms, including implementation of a robust United Nations Standing Task Force under Article 43. (Disaster Med Public Health Preparedness. 2018;page 1 of 8).
Naval Postgraduate School Fact Book 2004
2004-01-01
education to other nations. NPS develops new educational programs, explores different delivery methods and modifies its existing programs to meet the...leadership and the right organizational structure are needed to prepare warriors for the challenges of the future battlespace. To develop the ideas...the rapidly changing needs of the national security. Opportunities for faculty development are available in areas important to the Naval services
NASA Astrophysics Data System (ADS)
Lovett, Kian
Since the dawn of time, humans have engaged in war. In the last 5,600 years of recorded history 14,600 wars have been waged1. The United Nations has sought to save succeeding generations from the scourge of war and to foster peace. Wars have recently taken place in Afghanistan and Iraq. Both countries are now faced with a range of complex problems. In-depth country assessments reveal significant shortcomings in the areas of water, sanitation, health, security and natural resource management. These are key factors when examining environmental security, sustainable development and trans-boundary problems, all of which are issues relevant to the Middle East and Central Asian states. Space technology can be applied to support the reconstruction and development plans for Afghanistan and Iraq; however, there needs to be an investigation and open discussion of how these resources can best be used. Already, agencies within the United Nations possess considerable expertise in the use of space technologies in the area of disaster management. If this capability is to be used, there will need to be inter-agency coordination, not to mention a further expansion and development of the United Nations role in both Afghanistan and Iraq.
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2012 CFR
2012-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2014 CFR
2014-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2011 CFR
2011-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2013 CFR
2013-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-19
... Clearance and Safeguarding of National Security Information and Restricted Data AGENCY: Nuclear Regulatory... Executive Order 13526, Classified National Security Information. In addition, this direct final rule allowed... licensees (or their designees) to conduct classified [[Page 69287
National Labs and Nuclear Emergency Response
NASA Astrophysics Data System (ADS)
Budil, Kimberly
2015-04-01
The DOE national laboratories, and in particular the three NNSA national security laboratories, have long supported a broad suite of national nuclear security missions for the U.S. government. The capabilities, infrastructure and base of expertise developed to support the U.S. nuclear weapons stockpile have been applied to such challenges as stemming nuclear proliferation, understanding the nuclear capabilities of adversaries, and assessing and countering nuclear threats including essential support to nuclear emergency response. This talk will discuss the programs that are underway at the laboratories and the essential role that science and technology plays therein. Nuclear scientists provide expertise, fundamental understanding of nuclear materials, processes and signatures, and tools and technologies to aid in the identification and mitigation of nuclear threats as well as consequence management. This talk will also discuss the importance of direct engagement with the response community, which helps to shape research priorities and to enable development of useful tools and techniques for responders working in the field. National Labs and Nuclear Emergency Response.
The Department of Homeland Security’s Role in Protecting the National Economy
2017-09-01
national influence, power, and security. However, new characteristics of the modern trade environment have the potential to undermine U.S. economic ...prosperity. The Department of Homeland Security (DHS) claims that homeland security is inseparable from economic security and, as such, that the...department has a role to play in supporting national economic security goals. However, DHS has yet to fully reconcile the tension between its trade
Biological and Chemical Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fitch, P J
2002-12-19
The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defensemore » Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.« less
Koenig, Kristi L
2003-01-01
The terrorist attacks of 11 September 2001 led to the largest US Government transformation since the formation of the Department of Defense following World War II. More than 22 different agencies, in whole or in part, and >170,000 employees were reorganized to form a new Cabinet-level Department of Homeland Security (DHS), with the primary mission to protect the American homeland. Legislation enacted in November 2002 transferred the entire Federal Emergency Management Agency and several Department of Health and Human Services (HHS) assets to DHS, including the Office of Emergency Response, and oversight for the National Disaster Medical System, Strategic National Stockpile, and Metropolitan Medical Response System. This created a potential separation of "health" and "medical" assets between the DHS and HHS. A subsequent presidential directive mandated the development of a National Incident Management System and an all-hazard National Response Plan. While no Department of Veterans Affairs (VA) assets were targeted for transfer, the VA remains the largest integrated healthcare system in the nation with important support roles in homeland security that complement its primary mission to provide care to veterans. The Emergency Management Strategic Healthcare Group (EMSHG) within the VA's medical component, the Veteran Health Administration (VHA), is the executive agent for the VA's Fourth Mission, emergency management. In addition to providing comprehensive emergency management services to the VA, the EMSHG coordinates medical back-up to the Department of Defense, and assists the public via the National Disaster Medical System and the National Response Plan. This article describes the VA's role in homeland security and disasters, and provides an overview of the ongoing organizational and operational changes introduced by the formation of the new DHS. Challenges and opportunities for public health are highlighted.
Sandia National Laboratories: Sandia National Laboratories: Missions:
; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & ; Development Technology Deployment Centers Working With Sandia Working With Sandia Prospective Suppliers What Information Construction & Facilities Contract Audit Sandia's Economic Impact Licensing & Technology
Code of Federal Regulations, 2014 CFR
2014-01-01
... other agency. (b) Handling and safeguarding national security information. All information classified... Orders on the classification of national security information. (e) Agency terminology. The National...” only in relation to materials classified for national security purposes. [63 FR 14338, Mar. 25, 1998...
78 FR 45255 - President's National Security Telecommunications Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-26
... Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. [[Page 45256... President's National Security Telecommunications Advisory Committee (NSTAC) will meet on Tuesday, August 20... related to national security and emergency preparedness (NS/EP) telecommunications policy. Agenda: The...
15 CFR 705.3 - Commencing an investigation.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.3 Commencing an investigation. (a) Upon... the effect on the national security of the imports of any article. (b) The Secretary shall immediately...
Code of Federal Regulations, 2010 CFR
2010-01-01
... AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.2 Purpose. These regulations set forth the procedures by which the Department shall commence and conduct an investigation to determine the effect on the national security of...
77 FR 49439 - National Security Education Board Members Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-16
.... ADDRESSES: Defense Language and National Security Education Office, 1101 Wilson Boulevard, Suite 1210... National Security Education Office (DLNSEO), 1101 Wilson Boulevard, Suite 1210, Rosslyn, Virginia 22209...
Code of Federal Regulations, 2013 CFR
2013-07-01
... are exempt from release under the National Security Exemption of the Privacy Act? § 1202.90 Section Â... from release under the National Security Exemption of the Privacy Act? (a) The Investigative Case Files... interfere with ongoing investigations and law enforcement or national security activities and impose an...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smartt, Heidi A.; Romero, Juan A.; Custer, Joyce Olsen
Containment/Surveillance (C/S) measures are critical to any verification regime in order to maintain Continuity of Knowledge (CoK). The Ceramic Seal project is research into the next generation technologies to advance C/S, in particular improving security and efficiency. The Ceramic Seal is a small form factor loop seal with improved tamper-indication including a frangible seal body, tamper planes, external coatings, and electronic monitoring of the seal body integrity. It improves efficiency through a self-securing wire and in-situ verification with a handheld reader. Sandia National Laboratories (SNL) and Savannah River National Laboratory (SRNL), under sponsorship from the U.S. National Nuclear Security Administrationmore » (NNSA) Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D), have previously designed and have now fabricated and tested Ceramic Seals. Tests have occurred at both SNL and SRNL, with different types of tests occurring at each facility. This interim report will describe the Ceramic Seal prototype, the design and development of a handheld standalone reader and an interface to a data acquisition system, fabrication of the seals, and results of initial testing.« less
Surface-enhanced Raman spectroscopy and homeland security: a perfect match?
Golightly, Rebecca S; Doering, William E; Natan, Michael J
2009-10-27
This Nano Focus article reviews recent developments in surface-enhanced Raman spectroscopy (SERS) and its application to homeland security. It is based on invited talks given at the "Nanorods and Microparticles for Homeland Security" symposium, which was organized by one of the authors and presented at the 238th ACS National Meeting and Exhibition in Washington, DC. The three-day symposium included approximately 25 experts from academia, industry, and national laboratories and included both SERS and non-SERS approaches to detection of chemical and biological substances relevant to homeland security, as well as fundamental advances. Here, we focus on SERS and how it is uniquely positioned to have an impact in a field whose importance is increasing rapidly. We describe some technical challenges that remain and offer a glimpse of what form solutions might take.
Ansari, Armin; Buddemeier, Brooke
2018-02-01
The National Council on Radiation Protection and Measurements (NCRP) Program Area Committee (PAC) 3 covers the broad subject of nuclear and radiological security and safety and provides guidance and recommendations for response to nuclear and radiological incidents of both an accidental and deliberate nature. In 2017, PAC 3 Scientific Committee 3-1 completed the development of Guidance for Emergency Responder Dosimetry, and began development of a companion commentary on operational aspects of that guidance. PAC 3 members also organized the technical program for the 2017 Annual Meeting of the NCRP on “Assessment of National Efforts in Emergency Preparedness for Nuclear Terrorism:more » Is There a Need for Realignment to Close Remaining Gaps.” Based on discussions and presentations at the annual meeting, PAC 3 is working to develop a commentary on the subject that could serve as a roadmap for focusing our national efforts on the most pressing needs for preparing the nation for nuclear and radiological emergencies. PAC 3 is also engaged in active discussions, exploring the landscape of priority issues for its future activities. Lastly, an important consideration in this discussion is the extent of NCRP’s present and potential future resources to support the work of its scientific committees.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ansari, Armin; Buddemeier, Brooke
The National Council on Radiation Protection and Measurements (NCRP) Program Area Committee (PAC) 3 covers the broad subject of nuclear and radiological security and safety and provides guidance and recommendations for response to nuclear and radiological incidents of both an accidental and deliberate nature. In 2017, PAC 3 Scientific Committee 3-1 completed the development of Guidance for Emergency Responder Dosimetry, and began development of a companion commentary on operational aspects of that guidance. PAC 3 members also organized the technical program for the 2017 Annual Meeting of the NCRP on “Assessment of National Efforts in Emergency Preparedness for Nuclear Terrorism:more » Is There a Need for Realignment to Close Remaining Gaps.” Based on discussions and presentations at the annual meeting, PAC 3 is working to develop a commentary on the subject that could serve as a roadmap for focusing our national efforts on the most pressing needs for preparing the nation for nuclear and radiological emergencies. PAC 3 is also engaged in active discussions, exploring the landscape of priority issues for its future activities. Lastly, an important consideration in this discussion is the extent of NCRP’s present and potential future resources to support the work of its scientific committees.« less
National Strategy for Aviation Security
2007-03-26
for Aviation Security (hereafter referred to as the Strategy) to protect the Nation and its interests from threats in the Air Domain. The Secretary of... Aviation security is best achieved by integrating public and private aviation security global activities into a coordinated effort to detect, deter...might occur. The Strategy aligns Federal government aviation security programs and initiatives into a comprehensive and cohesive national effort
75 FR 3913 - President's National Security Telecommunications Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-25
...] President's National Security Telecommunications Advisory Committee AGENCY: National Communications System... Telecommunications Advisory Committee (NSTAC) will be meeting by teleconference; the meeting will be open to the... implementing national security and emergency preparedness telecommunications policy. Notice of this meeting is...
Global maize trade and food security: implications from a social network model.
Wu, Felicia; Guclu, Hasan
2013-12-01
In this study, we developed a social network model of the global trade of maize: one of the most important food, feed, and industrial crops worldwide, and critical to food security. We used this model to analyze patterns of maize trade among nations, and to determine where vulnerabilities in food security might arise if maize availability was decreased due to factors such as diversion to nonfood uses, climatic factors, or plant diseases. Using data on imports and exports from the U.N. Commodity Trade Statistics Database for each year from 2000 to 2009 inclusive, we summarized statistics on volumes of maize trade between pairs of nations for 217 nations. There is evidence of market segregation among clusters of nations; with three prominent clusters representing Europe, Brazil and Argentina, and the United States. The United States is by far the largest exporter of maize worldwide, whereas Japan and the Republic of Korea are the largest maize importers. In particular, the star-shaped cluster of the network that represents U.S. maize trade to other nations indicates the potential for food security risks because of the lack of trade these other nations conduct with other maize exporters. If a scenario arose in which U.S. maize could not be exported in as large quantities, maize supplies in many nations could be jeopardized. We discuss this in the context of recent maize ethanol production and its attendant impacts on food prices elsewhere worldwide. © 2013 Society for Risk Analysis.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-14
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62849; File No. SR-NSCC-2010-07] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change To... September 3, 2010. I. Introduction On July 1, 2010, National Securities Clearing Corporation (``NSCC...
Improving the Automated Detection and Analysis of Secure Coding Violations
2014-06-01
eliminating software vulnerabilities and other flaws. The CERT Division produces books and courses that foster a security mindset in developers, and...website also provides a virtual machine containing a complete build of the Rosecheckers project on Linux . The Rosecheckers project leverages the...Compass/ROSE6 project developed at Law- rence Livermore National Laboratory. This project provides a high-level API for accessing the abstract syntax tree
Role of the U.S. Military in the Professionalization of the Armed Forces of Liberia
2015-06-12
professionalizing the AFL. The GEF states, “Partner nations provide for their own security, contribute effectively to broader regional or global security...facilitates the development of important professional and personal relationships that effectively strengthen military alliances and the international...Forces of Liberia (AFL) presents a developing opportunity to contribute to the broader U.S. interests. However, in order to ensure stability within
Helicopters: The Platform of Choice for Defense and Development
2013-04-25
FID effort by facilitating the IDAD tasks of balanced development, security, neutralization, and mobilization. In order to prevent instability...security, neutralization, and mobilization. In order to prevent instability inside a Host Nation (HN), it is important to build cohesive IDAD and...derived from the H -53 (arguably the oldest, biggest, and most cost-prohibitive platform of this type) compared to STOL-capable 4-9 passenger fixed wing
Solar Thermal Utility-Scale Joint Venture Program (USJVP) Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
MANCINI,THOMAS R.
2001-04-01
Several years ago Sandia National Laboratories developed a prototype interior robot [1] that could navigate autonomously inside a large complex building to aid and test interior intrusion detection systems. Recently the Department of Energy Office of Safeguards and Security has supported the development of a vehicle that will perform limited security functions autonomously in a structured exterior environment. The goal of the first phase of this project was to demonstrate the feasibility of an exterior robotic vehicle for security applications by using converted interior robot technology, if applicable. An existing teleoperational test bed vehicle with remote driving controls was modifiedmore » and integrated with a newly developed command driving station and navigation system hardware and software to form the Robotic Security Vehicle (RSV) system. The RSV, also called the Sandia Mobile Autonomous Navigator (SANDMAN), has been successfully used to demonstrate that teleoperated security vehicles which can perform limited autonomous functions are viable and have the potential to decrease security manpower requirements and improve system capabilities.« less
The old age health security in rural China: where to go?
Dai, Baozhen
2015-11-04
The huge number of rural elders and the deepening health problems (e.g. growing threats of infectious diseases and chronic diseases etc.) place enormous pressure on old age health security in rural China. This study aims to provide information for policy-makers to develop effective measures for promoting rural elders' health care service access by examining the current developments and challenges confronted by the old age health security in rural China. Search resources are electronic databases, web pages of the National Bureau of Statistics of China and the National Health and Family Planning Commission of China on the internet, China Population and Employment Statistics Yearbook, China Civil Affairs' Statistical Yearbook and China Health Statistics Yearbooks etc. Articles were identified from Elsevier, Wiley, EBSCO, EMBASE, PubMed, SCI Expanded, ProQuest, and National Knowledge Infrastructure of China (CNKI) which is the most informative database in Chinese. Search terms were "rural", "China", "health security", "cooperative medical scheme", "social medical assistance", "medical insurance" or "community based medical insurance", "old", or "elder", "elderly", or "aged", "aging". Google scholar was searched with the same combination of keywords. The results showed that old age health security in rural China had expanded to all rural elders and substantially improved health care service utilization among rural elders. Increasing chronic disease prevalence rates, pressing public health issues, inefficient rural health care service provision system and lack of sufficient financing challenged the old age health security in rural China. Increasing funds from the central and regional governments for old age health security in rural China will contribute to reducing urban-rural disparities in provision of old age health security and increasing health equity among rural elders between different regions. Meanwhile, initiating provider payment reform may contribute to improving the efficiency of rural health care service provision system and promoting health care service access among rural elders.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Adams, C.; Arsenlis, T.; Bailey, A.
Lawrence Livermore National Laboratory Campus Capability Plan for 2018-2028. Lawrence Livermore National Laboratory (LLNL) is one of three national laboratories that are part of the National Nuclear Security Administration. LLNL provides critical expertise to strengthen U.S. security through development and application of world-class science and technology that: Ensures the safety, reliability, and performance of the U.S. nuclear weapons stockpile; Promotes international nuclear safety and nonproliferation; Reduces global danger from weapons of mass destruction; Supports U.S. leadership in science and technology. Essential to the execution and continued advancement of these mission areas are responsive infrastructure capabilities. This report showcases each LLNLmore » capability area and describes the mission, science, and technology efforts enabled by LLNL infrastructure, as well as future infrastructure plans.« less
Sandia National Laboratories: Sandia National Laboratories: News: Events
Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios
Sandia National Laboratories: National Security Missions: Defense Systems
; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios
2011-08-26
peoples, such as the Inuit , have been accorded greater control of their own lives, while multilateral organizations have been crafted to provide a forum...stakeholders in the Inuit community, and not all of the agreements made between aboriginal groups and national governments have been honored. As a...North America and the Arctic Council”; and, (3) Udloriak Hanson from the Inuit Tapiriit Kanatami, “Sovereignty, Resource Development and Security
2009-01-01
country in order to establish a physically and psychologically secured environment conducive to national development."g Challenges to Inter.naI Security...be accommodated under the present Constitution and laws particularly the powers conceded by the MOA-AD to the 5 Bangsamoro Juridical Entity (BJE, an...AFP under Magsaysay underwent organizational changes with the introduction of psychological warfare activities that .complemented the usual combat
Enhancing National Security in Hungary through the Development and Employment of Special Forces
2006-06-01
Low Intensity Conflict, Strategy, Hungary, Special Forces 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY...of Hungary in NATO has brought a penetrating change. As the member of an alliance system, Hungary cannot interpret in an unchanged manner the...more confident that in particular cases, operators will act in ways that the head of the agency would have acted had he or she been in their shoes
Marketing Strategy and Implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This report documents the preparation of materials for the marketing campaign that has been designed for middle and high school students in New Mexico to increase interest in participation in national security careers at the National Nuclear Security Administration. The materials and the marketing campaign build on the research that was previously completed, as well as the focus groups that were conducted. This work is a part of the National Nuclear Security Preparedness Project (NSPP). Previous research included outcome analysis to determine appropriate marketing strategies. The analysis was based upon focus groups with middle school and high school students, studentmore » interactions, and surveys completed by students to understand and gauge student interest in Science, Technology, Engineering, and Math (STEM) subjects, interest in careers at NNSA, future job considerations, and student desire to pursue post-secondary education. Further, through the focus groups, students were asked to attend a presentation on NNSA job opportunities and employee requirements. The feedback received from the students was utilized to develop the focus and components of a marketing campaign divided into DISCO (Discovering Intelligence and Security Career Opportunities) for the middle school age group and DISCO…..Your Way! for high school age groups. Both campaigns have an intertwined message that focuses on the education of students in the various national security career opportunities at NNSA using the STEM concepts and the notion that almost any career they can think of has a fit within NNSA. Further, a special emphasis has been placed on the importance of obtaining a national security clearance when working at NNSA and the steps that will need to be taken during middle school, high school, and college to be allowed this opportunity.« less
76 FR 81827 - Declassification of National Security Information
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-29
... prompt decision on the appeal. (b) [Reserved] Sec. 1260.82 What actions must NARA take with information... Declassification of National Security Information AGENCY: National Archives and Records Administration. ACTION... related to declassification of classified national security information in records transferred to NARA's...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO.... 552a) applies to the National Security Council (hereafter NSC), it provides the American public with... identifiable records and information from the National Security Council. (b) The NSC Staff, in addition to...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO.... 552a) applies to the National Security Council (hereafter NSC), it provides the American public with... identifiable records and information from the National Security Council. (b) The NSC Staff, in addition to...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO.... 552a) applies to the National Security Council (hereafter NSC), it provides the American public with... identifiable records and information from the National Security Council. (b) The NSC Staff, in addition to...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO.... 552a) applies to the National Security Council (hereafter NSC), it provides the American public with... identifiable records and information from the National Security Council. (b) The NSC Staff, in addition to...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Defense Other Regulations Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO.... 552a) applies to the National Security Council (hereafter NSC), it provides the American public with... identifiable records and information from the National Security Council. (b) The NSC Staff, in addition to...
Skilling Australians: Lessons from World War II National Workforce Development Programs
ERIC Educational Resources Information Center
Dymock, Darryl; Billett, Stephen
2010-01-01
Governments are currently mobilising their national workforces to compete effectively in a globalised economy where being export-effective and import-competitive are necessary to secure national economic and social goals. Australia is no exception here. Yet, in this country, as in others, similar mobilisations occurred in earlier times, most…
Education in Conflict and Crisis for National Security.
ERIC Educational Resources Information Center
McClelland, Charles A.
A basic assumption is that the level of conflict within and between nations will escalate over the next 50 years. Trying to "muddle through" using the tools and techniques of organized violence may yield national suicide. Therefore, complex conflict resolution skills need to be developed and used by some part of society to quell disorder…
Coping with Iran: Confrontation, Containment, or Engagement
2007-01-01
participating via videoconference from the UN in New York) Questions: Michael Hirsh (senior editor, Newsweek) David Ignatius (national security columnist , The...national security columnist , The Washington Post) HOW THE U.S. GOVERNMENT VIEWS IRAN R. Nicholas Burns The foundations of national security policy are...Michael Hirsh Senior Editor Newsweek David Ignatius National Security Columnist The Washington Post 2:15 P.M. -- Panel 3: What to Do
Anticipating the unintended consequences of security dynamics.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Backus, George A.; Overfelt, James Robert; Malczynski, Leonard A.
2010-01-01
In a globalized world, dramatic changes within any one nation causes ripple or even tsunamic effects within neighbor nations and nations geographically far removed. Multinational interventions to prevent or mitigate detrimental changes can easily cause secondary unintended consequences more detrimental and enduring than the feared change instigating the intervention. This LDRD research developed the foundations for a flexible geopolitical and socioeconomic simulation capability that focuses on the dynamic national security implications of natural and man-made trauma for a nation-state and the states linked to it through trade or treaty. The model developed contains a database for simulating all 229 recognizedmore » nation-states and sovereignties with the detail of 30 economic sectors including consumers and natural resources. The model explicitly simulates the interactions among the countries and their governments. Decisions among governments and populations is based on expectation formation. In the simulation model, failed expectations are used as a key metric for tension across states, among ethnic groups, and between population factions. This document provides the foundational documentation for the model.« less
78 FR 31525 - National Security Education Board; Notice of Federal Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-24
... Security Education Program Service Requirements Updates. 4:45 p.m.--Board Discussion. 5:30 p.m.--Adjourn... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), DoD. ACTION: Meeting notice. SUMMARY: Under the...
10 CFR 2.911 - Admissibility of restricted data or other national security information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...
76 FR 3098 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-19
...: National Security Agency/Central Security Service, Freedom of Information Act and Privacy Act Office, 9800..., Privacy Act and Mandatory Declassification Review Records. System Location: National Security Agency... Information Act; 5 U.S.C. 552a, The Privacy Act of 1974 (as amended); E.O. 13526, Classified National Security...
15 CFR 705.11 - Determination by the President and adjustment of imports.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.11 Determination by... national security, the President is required by Section 232(c) of the Trade Expansion Act of 1962, as...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-29
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70937; File No. SR-NSCC-2013-11] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change To Add a New Service to the National Securities Clearing Corporation's Obligation Warehouse (``OW...
10 CFR 2.911 - Admissibility of restricted data or other national security information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...
10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Information and Restricted Data. 95.35 Section 95.35 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tsai, H. C.; Chen, K.; Liu, Y. Y.
The US Department of Energy (DOE) [Environmental Management (EM), Office of Packaging and Transportation (EM-45)] Packaging Certification Program (PCP) has developed a radiofrequency identification (RFID) tracking and monitoring system for the management of nuclear materials packages during storage and transportation. The system, developed by the PCP team at Argonne National Laboratory, involves hardware modification, application software development, secured database and web server development, and irradiation experiments. In April 2008, Argonne tested key features of the RFID tracking and monitoring system in a weeklong, 1700 mile (2736 km) demonstration employing 14 empty type B fissile material drums of three designs (modelsmore » 9975, 9977 and ES-3100) that have been certified for shipment by the DOE and the US Nuclear Regulatory Commission. The demonstration successfully integrated global positioning system (GPS) technology for vehicle tracking, satellite/cellular (general packet radio service, or GPRS) technologies for wireless communication, and active RFID tags with multiple sensors (seal integrity, shock, temperature, humidity and battery status) on drums. In addition, the demonstration integrated geographic information system (GIS) technology with automatic alarm notifications of incidents and generated buffer zone reports for emergency response and management of staged incidents. The demonstration was sponsored by EM and the US National Nuclear Security Administration, with the participation of Argonne, Savannah River and Oak Ridge National Laboratories. Over 50 authorised stakeholders across the country observed the demonstration via secured Internet access. The DOE PCP and national laboratories are working on several RFID system implementation projects at selected DOE sites, as well as continuing device and systems development and widening applications beyond DOE sites and possibly beyond nuclear materials to include other radioactive materials.« less
Elbe, Stefan; Roemer-Mahler, Anne; Long, Christopher
2015-04-01
How do governments contribute to the pharmaceuticalization of society? Whilst the pivotal role of industry is extensively documented, this article shows that governments too are accelerating, intensifying and opening up new trajectories of pharmaceuticalization in society. Governments are becoming more deeply invested in pharmaceuticals because their national security strategies now aspire to defend populations against health-based threats like bioterrorism and pandemics. To counter those threats, governments are acquiring and stockpiling a panoply of 'medical countermeasures' such as antivirals, next-generation vaccines, antibiotics and anti-toxins. More than that, governments are actively incentivizing the development of many new medical countermeasures--principally by marshaling the state's unique powers to introduce exceptional measures in the name of protecting national security. At least five extraordinary policy interventions have been introduced by governments with the aim of stimulating the commercial development of novel medical countermeasures: (1) allocating earmarked public funds, (2) granting comprehensive legal protections to pharmaceutical companies against injury compensation claims, (3) introducing bespoke pathways for regulatory approval, (4) instantiating extraordinary emergency use procedures allowing for the use of unapproved medicines, and (5) designing innovative logistical distribution systems for mass drug administration outside of clinical settings. Those combined efforts, the article argues, are spawning a new, government-led and quite exceptional medical countermeasure regime operating beyond the conventional boundaries of pharmaceutical development and regulation. In the first comprehensive analysis of the pharmaceuticalization dynamics at play in national security policy, this article unearths the detailed array of policy interventions through which governments too are becoming more deeply imbricated in the pharmaceuticalization of society. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.
Integrating Safety with Science,Technology and Innovation at Los Alamos National Laboratory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rich, Bethany M
2012-04-02
The mission of Los Alamos National Laboratory (LANL) is to develop and apply science, technology and engineering solutions to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve emerging national security challenges. The most important responsibility is to direct and conduct efforts to meet the mission with an emphasis on safety, security, and quality. In this article, LANL Environmental, Safety, and Health (ESH) trainers discuss how their application and use of a kinetic learning module (learn by doing) with a unique fall arrest system is helping to address one the most common industrialmore » safety challenges: slips and falls. A unique integration of Human Performance Improvement (HPI), Behavior Based Safety (BBS) and elements of the Voluntary Protection Program (VPP) combined with an interactive simulator experience is being used to address slip and fall events at Los Alamos.« less
Secure Transportation of HEU in Romania
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-07-06
The National Nuclear Security Administration has announced the final shipments of Russian-origin highly enriched uranium (HEU) nuclear fuel from Romania. The material was removed and returned to Russia by air for storage at two secure nuclear facilities, making Romania the first country to remove all HEU since President Obama outlined his commitment to securing all vulnerable nuclear material around the world within four years. This was also the first time NNSA has shipped spent HEU by airplane, a development that will help accelerate efforts to meet the Presidents objective.
Implementing secure laptop-based testing in an undergraduate nursing program: a case study.
Tao, Jinyuan; Lorentz, B Chris; Hawes, Stacey; Rugless, Fely; Preston, Janice
2012-07-01
This article presents the implementation of secure laptop-based testing in an undergraduate nursing program. Details on how to design, develop, implement, and secure tests are discussed. Laptop-based testing mode is also compared with the computer-laboratory-based testing model. Five elements of the laptop-based testing model are illustrated: (1) it simulates the national board examination, (2) security is achievable, (3) it is convenient for both instructors and students, (4) it provides students hands-on practice, (5) continuous technical support is the key.
ERIC Educational Resources Information Center
Hoegl, Juergen K.
1986-01-01
Discusses the role of second-language proficiency from international, national, and state perspectives, including consideration of the need for such proficiency in science, technology, and research for economic development. Trends indicate that a more internationalized curricula in higher education and a greater demand for second-language…
ERIC Educational Resources Information Center
Schenck-Hamlin, Donna; Pierquet, Jennifer; McClellan, Chuck
2011-01-01
In the wake of the September 2001 attacks, the U.S. government founded the Department of Homeland Security (DHS) with responsibility to develop a National Infrastructure Protection Plan for securing critical infrastructures and key resources. DHS established interdisciplinary networks of academic expertise administered through Centers of…
From Absent to Active Voices: Securing Disability Equality within Higher Education
ERIC Educational Resources Information Center
Beauchamp-Pryor, Karen
2012-01-01
This article discusses the representation and participation of disabled students in the development of higher education policy and provision within the UK, at both a national and institutional level. Findings are drawn from a doctoral study, which identified the importance of student participation in securing equality and inclusion. Power…
3 CFR - Presidential Determination on Major Illicit Drug Transit or Major Illicit Drug Producing...
Code of Federal Regulations, 2013 CFR
2013-01-01
... is the combination of geographic, commercial, and economic factors that allow drugs to transit or be... economic opportunity, security, and the ability of the Afghan government to project the rule of law... country's wide-ranging national objectives to improve peace, security, and economic development. This year...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-20
....S. technologies and seize markets before the U.S. inventor is able to raise financing and secure a... develop updated criteria to evaluate the national security applications of patentable technologies [and... Orders 1. Should the USPTO institute a plan to identify patent applications relating to critical...
Effectiveness of the United Nations Security Council to Prevent Conflict Related Sexual Violence
2017-06-09
security. This thesis seeks to determine if the effectiveness of the UNSC’s efforts to prevent CRSV. In doing so, this thesis asks the following...leaders as they continue to develop CRSV preventive measures. The overall objective of this study is to 5 determine the relevancy, developmental
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hamlet, Jason; Pierson, Lyndon; Bauer, Todd
Supply chain security to detect, deter, and prevent the counterfeiting of networked and stand-alone integrated circuits (ICs) is critical to cyber security. Sandia National Laboratory researchers have developed IC ID to leverage Physically Unclonable Functions (PUFs) and strong cryptographic authentication to create a unique fingerprint for each integrated circuit. IC ID assures the authenticity of ICs to prevent tampering or malicious substitution.
FARM LABOR MARKET DEVELOPMENT.
ERIC Educational Resources Information Center
Department of Labor, Washington, DC.
PART ONE OF THE REPORT CONSISTED OF AN ANALYSIS OF TRENDS BETWEEN 1960 AND 1961 IN WAGES OF UNITED STATES FARM WORKERS IN MAJOR AREAS USING MEXICAN NATIONALS. THE DATA WERE DERIVED FROM PREVAILING-WAGE REPORTS RECEIVED BY THE BUREAU OF EMPLOYMENT SECURITY FROM AFFILIATED STATE EMPLOYMENT SECURITY AGENCIES. THE SURVEY RATES WERE USED BY THE…
Johannessen, A
2004-01-01
This is a summary of the Young Water Professionals Seminar involving more than 50 young people from all over the world working with water. The presentations and following discussion were very lively and were about how subsidies and trade barriers imposed by the developed countries are influencing the income-generating capacity of millions of people in the developing world. Even though this is a very complex issue not easily resolved during the seminar it was also clear that there are some fundamental problems that need to be addressed. The importance of looking for solutions at different levels (i.e. local, regional, national) was highlighted as well as the policy of double standards, preaching free trade but only for the benefit of overdeveloped countries themselves. Further it was discussed how to achieve basin security through food security, and managing water for food security. The conclusion was that win-win solutions would be made if agricultural subsidies were to be completely removed.
Water Shortage: Lessons in Conservation From the Great California Drought, 1976-1977
NASA Astrophysics Data System (ADS)
Showstack, Randy
Legislation moving quickly through both houses of the U.S. Congress would establish a fund to promote and support research and development to increase the security of the nation's water infrastructure from source to faucet.The House of Representatives bill, "The Water Infrastructure Security and Research and Development Act" (HR 3178), would provide $12 million per year for fiscal years 2002-2006 for a number of research areas. These include assessing water supply systems for physical vulnerabilities, including biological, chemical, and radiological contamination; devising real-time systems to monitor water for contamination; determining mitigation options; and upgrading security technologies.
2020 Foresight Forging the Future of Lawrence Livermore National Laboratory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chrzanowski, P.
2000-01-01
The Lawrence Livermore National Laboratory (LLNL) of 2020 will look much different from the LLNL of today and vastly different from how it looked twenty years ago. We, the members of the Long-Range Strategy Project, envision a Laboratory not defined by one program--nuclear weapons research--but by several core programs related to or synergistic with LLNL's national security mission. We expect the Laboratory to be fully engaged with sponsors and the local community and closely partnering with other research and development (R&D) organizations and academia. Unclassified work will be a vital part of the Laboratory of 2020 and will visibly demonstratemore » LLNL's international science and technology strengths. We firmly believe that there will be a critical and continuing role for the Laboratory. As a dynamic and versatile multipurpose laboratory with a national security focus, LLNL will be applying its capabilities in science and technology to meet the needs of the nation in the 21st century. With strategic investments in science, outstanding technical capabilities, and effective relationships, the Laboratory will, we believe, continue to play a key role in securing the nation's future.« less
Migrants, refugees and insecurity. Current threats to peace?
Lohrmann, R
2000-01-01
Since the early 1980s, international migration has moved beyond humanitarian, economic development, labor market and societal integration concerns, raising complex interactive security implications for governments of migrant sending, receiving and transit countries, as well as for multilateral bodies. This article examines the effects of international migration on varied understandings and perceptions of international security. It discusses why international migration has come to be perceived as a security issue, both in industrialized and developing countries. Questions are raised on the migration-security nexus and the way in which the concepts "security" and "migration" are used. The real and perceived impacts of international migration upon national and regional security, both in industrialized and developing countries, are analyzed. The policies developed by governments and multilateral agencies since the mid-1980s to mitigate the destabilizing effects of certain kinds of international population movement and human displacement are examined. The conclusions stress the need for the establishment of a comprehensive framework of international cooperation among origin and receiving countries and international organizations to address the destabilizing implications of international migration.
77 FR 34029 - National Security Education Board Members Meeting; Cancellation of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-08
.... to 2 p.m. at Defense Language and National Security Education Office, 1101 Wilson Boulevard, Suite..., Defense Language and National Security Education Office (DLNSEO), 1101 Wilson Boulevard, Suite 1210...
Combating terrorism : linking threats to strategies and resources testimony
DOT National Transportation Integrated Search
2000-07-26
This is the statement of Norman J. Rabkin, Director, National Security Preparedness Issues, National Security and International Affairs division before the Subcommittee on National Security, Veterans Affairs, and International Relations, Committee on...
Liberia: National Security Interests in Transformational Development
2008-03-25
can take advantage of their needy and impressionable stage of development. Lawrence Kohlberg advanced the theory that moral development and moral... Kohlberg , Essays on Moral Development: Vol. 2. The Philosophy of Moral Development (San Francisco: Harper & Row, 1984). 47 For more information on
The Exon-Florio National Security Test for Foreign Investment
2010-02-04
CRS Report for Congress Prepared for Members and Committees of Congress The Exon- Florio National Security Test for Foreign Investment...04 FEB 2010 2. REPORT TYPE 3. DATES COVERED 00-00-2010 to 00-00-2010 4. TITLE AND SUBTITLE The Exon- Florio National Security Test for Foreign...ANSI Std Z39-18 The Exon- Florio National Security Test for Foreign Investment Congressional Research Service Summary The Exon- Florio provision
Summary Report for the Radiation Detection for Nuclear Security Summer School 2014
DOE Office of Scientific and Technical Information (OSTI.GOV)
Runkle, Robert C.; Baciak, James E.; Woodring, Mitchell L.
Executive Summary The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the 3rd Radiation Detection for Nuclear Security Summer School from 16 – 27 June 2014. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectivesmore » of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security. In fact, we are beginning to see previous students both enroll in graduate programs (former undergraduates) and complete internships at agencies like the National Nuclear Security Administration.« less
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 2 2012-07-01 2012-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 2 2011-07-01 2011-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 2 2014-07-01 2014-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 2 2013-07-01 2013-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
15 CFR 930.122 - Necessary in the interest of national security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Trade (Continued) NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE OCEAN AND... Secretary for Review Related to the Objectives of the Act and National Security Interests § 930.122... proposed. Secretarial review of national security issues shall be aided by information submitted by the...
10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice...
Code of Federal Regulations, 2011 CFR
2011-04-01
... to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and... safeguarding of national security information received by the Commission from other agencies, to chair a... suggestions and complaints with respect to the Commission administration of its information security program...
77 FR 9214 - National Security Education Board Members Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-16
... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... meeting of the National Security Education Board. The purpose of the meeting is to review and make... Security Education Act, Title VII of Public Law 102- 183, as amended. DATES: March 15, 2012, from 9 a.m.-2...
10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carle, Steven F.
2011-05-04
This report describes the development, processes, and results of a hydrologic source term (HST) model for the CLEARWATER (U12q) and WINESKIN (U12r) tests located on Rainier Mesa, Nevada National Security Site, Nevada (Figure 1.1). Of the 61 underground tests (involving 62 unique detonations) conducted on Rainier Mesa (Area 12) between 1957 and 1992 (USDOE, 2015), the CLEARWATER and WINESKIN tests present many unique features that warrant a separate HST modeling effort from other Rainier Mesa tests.
National Technology Center and photonics
NASA Astrophysics Data System (ADS)
Vlannes, Nickolas P.
1992-05-01
A National Technology Center is proposed in order to meet the international challenges to the economy and security of the United States. This center would be tasked with the acquisition, analysis, assessment, and dissemination of worldwide scientific and technical information and data; technology transfer to the United States; and research and development in information and library sciences and technology. The National Technology Center would form a national network linking centers of excellence and expertise, and maintain a national technology library. With these functions, the National Technology Center has inherent requirements for technologies based on photonics, and will further motivate developments in this field.
5 CFR 1312.12 - Security Program Review Committee.
Code of Federal Regulations, 2011 CFR
2011-01-01
... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Security Program Review Committee. 1312...
5 CFR 1312.12 - Security Program Review Committee.
Code of Federal Regulations, 2010 CFR
2010-01-01
... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security Program Review Committee. 1312...
Sandia National Laboratories: National Security Missions: Nuclear Weapons
Technology Partnerships Business, Industry, & Non-Profits Government Universities Center for Development Agreement (CRADA) Strategic Partnership Projects, Non-Federal Entity (SPP/NFE) Agreements New , in which fundamental science, computer models, and unique experimental facilities come together so
77 FR 1076 - National Maritime Security Advisory Committee; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-09
...The National Maritime Security Advisory Committee (NMSAC) will meet on January 18-19, 2012 in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the public.
Livestock and food security: vulnerability to population growth and climate change.
Godber, Olivia F; Wall, Richard
2014-10-01
Livestock production is an important contributor to sustainable food security for many nations, particularly in low-income areas and marginal habitats that are unsuitable for crop production. Animal products account for approximately one-third of global human protein consumption. Here, a range of indicators, derived from FAOSTAT and World Bank statistics, are used to model the relative vulnerability of nations at the global scale to predicted climate and population changes, which are likely to impact on their use of grazing livestock for food. Vulnerability analysis has been widely used in global change science to predict impacts on food security and famine. It is a tool that is useful to inform policy decision making and direct the targeting of interventions. The model developed shows that nations within sub-Saharan Africa, particularly in the Sahel region, and some Asian nations are likely to be the most vulnerable. Livestock-based food security is already compromised in many areas on these continents and suffers constraints from current climate in addition to the lack of economic and technical support allowing mitigation of predicted climate change impacts. Governance is shown to be a highly influential factor and, paradoxically, it is suggested that current self-sufficiency may increase future potential vulnerability because trade networks are poorly developed. This may be relieved through freer trade of food products, which is also associated with improved governance. Policy decisions, support and interventions will need to be targeted at the most vulnerable nations, but given the strong influence of governance, to be effective, any implementation will require considerable care in the management of underlying structural reform. © 2014 The Authors. Global Change Biology Published by John Wiley & Sons Ltd.
The importance of establishing a national health security preparedness index.
Lumpkin, John R; Miller, Yoon K; Inglesby, Tom; Links, Jonathan M; Schwartz, Angela T; Slemp, Catherine C; Burhans, Robert L; Blumenstock, James; Khan, Ali S
2013-03-01
Natural disasters, infectious disease epidemics, terrorism, and major events like the nuclear incident at Fukushima all pose major potential challenges to public health and security. Events such as the anthrax letters of 2001, Hurricanes Katrina, Irene, and Sandy, severe acute respiratory syndrome (SARS) and West Nile virus outbreaks, and the 2009 H1N1 influenza pandemic have demonstrated that public health, emergency management, and national security efforts are interconnected. These and other events have increased the national resolve and the resources committed to improving the national health security infrastructure. However, as fiscal pressures force federal, state, and local governments to examine spending, there is a growing need to demonstrate both what the investment in public health preparedness has bought and where gaps remain in our nation's health security. To address these needs, the Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (PHPR), is creating an annual measure of health security and preparedness at the national and state levels: the National Health Security Preparedness Index (NHSPI).
Water Security - National and Global Issues
NASA Astrophysics Data System (ADS)
Tindall, J. A.; Campbell, A. A.; Moran, E. H.
2010-12-01
Water is fundamental to human life. Disruption of water supplies by the Water Threats and Hazards Triad (WTHT) — man-made, natural, and technological hazards — could threaten the delivery of vital human services, endanger public health and the environment, potentially cause mass casualties, and threaten population sustainability, social stability, and homeland security. Water distribution systems extend over vast areas and are therefore vulnerable to a wide spectrum of threats — from natural hazards such as large forest fires that result in runoff and debris flow that clog reservoirs, and reduce, disrupt, or contaminate water supply and quality to threats from natural, man-made, or political extremist attacks. Our research demonstrates how devising concepts and counter measures to protect water supplies will assist the public, policy makers, and planners at local, Tribal, State, and Federal levels to develop solutions for national and international water-security and sustainability issues. Water security is an issue in which the entire global community is stakeholders.
Strategic factors in the development of the National Technology Transfer Network
NASA Technical Reports Server (NTRS)
Root, Jonathan F.; Stone, Barbara A.
1993-01-01
Broad consensus among industry and government leaders has developed over the last decade on the importance of applying the U.S. leadership in research and development (R&D) to strengthen competitiveness in the global marketplace, and thus enhance national prosperity. This consensus has emerged against the backdrop of increasing economic competition, and the dramatic reduction of military threats to national security with the end of the Cold War. This paper reviews the key factors and considerations that shaped - and continue to influence - the development of the Regional Technoloty Transfer Centers (RTTC) and the National Technology Transfer Center (NTTC). Also, the future role of the national network in support of emerging technology policy initiatives will be explored.
Training on Transport Security of Nuclear/Radioactive Materials for Key Audiences
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pope, Ronald; Liu, Yung; Shuler, J.M.
Beginning in 2013, the U.S. Department of Energy (DOE) Packaging Certification Program (PCP), Office of Packaging and Transportation, Office of Environmental Management has sponsored a series of three training courses on Security of Nuclear and Other Radioactive Materials during Transport. These courses were developed and hosted by Argonne National Laboratory staff with guest lecturers from both the U.S. and international organizations and agencies including the U.S. Nuclear Regulatory Commission (NRC), Federal Bureau of Investigation (FBI), the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), DOE national laboratories, the International Atomic Energy Agency (IAEA), the World Nuclear Transport Institutemore » (WNTI), and the World Institute for Nuclear Security (WINS). Each of the three courses held to date were one-week in length. The courses delved in detail into the regulatory requirements for transport security, focusing on international and U.S.-domestic requirements and guidance documents. Lectures, in-class discussions and small group exercises, including tabletop (TTX) and field exercises were designed to enhance the learning objectives for the participants. For example, the field exercise used the ARG-US radio frequency identification (RFID) remote surveillance system developed by Argonne for DOE/PCP to track and monitor packages in a mock shipment, following in-class exercises of developing a transport security plan (TSP) for the mock shipment, performing a readiness review and identifying needed corrective actions. Participants were able to follow the mock shipment on the webpage in real time in the ARG-US Command Center at Argonne including “staged” incidents that were designed to illustrate the importance of control, command, communication and coordination in ensuring transport security. Great lessons were learned based on feedback from the participant’s course evaluations with the series of the courses. Since the development of the relevant teaching materials for the course have largely been completed, tailoring the course for targeted audiences becomes a relatively easy task, requiring less effort and providing more flexibility for both the lecturers and future participants. One-day or two-day courses with focus specifically on the U.S. transport security requirements can be delivered, at locations away from Argonne, by one or two principal lecturers to targeted audiences such as regulators, shippers, carriers, state and local law enforcement personnel, and emergency responders. This paper will highlight the lessons learned in hosting previous one-week courses and discuss the development of options for detailed and/or customized courses/workshops for targeted key audiences.« less
29 CFR 1606.3 - The national security exception.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 4 2010-07-01 2010-07-01 false The national security exception. 1606.3 Section 1606.3 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION GUIDELINES ON DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful...
29 CFR 1606.3 - The national security exception.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 29 Labor 4 2011-07-01 2011-07-01 false The national security exception. 1606.3 Section 1606.3 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION GUIDELINES ON DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful...
29 CFR 1606.3 - The national security exception.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 29 Labor 4 2012-07-01 2012-07-01 false The national security exception. 1606.3 Section 1606.3 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION GUIDELINES ON DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful...
29 CFR 1606.3 - The national security exception.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 29 Labor 4 2014-07-01 2014-07-01 false The national security exception. 1606.3 Section 1606.3 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION GUIDELINES ON DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful...
29 CFR 1606.3 - The national security exception.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 29 Labor 4 2013-07-01 2013-07-01 false The national security exception. 1606.3 Section 1606.3 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION GUIDELINES ON DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful...
77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-11
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...
The Superpowers: Nuclear Weapons and National Security. National Issues Forums.
ERIC Educational Resources Information Center
Mitchell, Greg; Melville, Keith
Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…
Evaluation of Different Features for Face Recognition in Video
2014-09-01
and Security Program (CSSP) which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public ...Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2014...deployment of innovative technologies for public safety and security practitioners to achieve specific objectives; 4. Threats/Hazards F – Major trans-border
Cyber Security Testing and Training Programs for Industrial Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Daniel Noyes
2012-03-01
Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less
Clark, Heather; Whybrow, Stephen; de Ruiter, Henri; McNeill, Geraldine
2018-01-01
Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and exported food. Nutrition security was defined as the total nutrient supply (domestic production, minus exports, plus imports) to meet population-level nutrient requirements. The results showed that the UK was nutrition secure over the period 1961–2011 for energy, macronutrients and key micronutrients, with the exception of total carbohydrates and fibre, which may be due to the loss of fibre incurred by processing cereals into refined products. The supply of protein exceeded population requirements and could be met with domestic production alone. Even excluding all meat there was sufficient protein for population requirements. The supply of total fat, saturated fat and sugar considerably exceeded the current dietary recommendation. As regards nutrition security in 2010, the UK was reliant on imported foods to meet energy, fibre, total carbohydrate, iron, zinc and vitamin A requirements. This analysis demonstrates the importance of including nutrients other than energy to determine the adequacy of the food supply. The methodology also provides an alternative perspective on food security and self-sufficiency by assessing the dependency on imports to meet population level nutritional requirements. PMID:29489830
Macdiarmid, Jennie I; Clark, Heather; Whybrow, Stephen; de Ruiter, Henri; McNeill, Geraldine
2018-01-01
Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and exported food. Nutrition security was defined as the total nutrient supply (domestic production, minus exports, plus imports) to meet population-level nutrient requirements. The results showed that the UK was nutrition secure over the period 1961-2011 for energy, macronutrients and key micronutrients, with the exception of total carbohydrates and fibre, which may be due to the loss of fibre incurred by processing cereals into refined products. The supply of protein exceeded population requirements and could be met with domestic production alone. Even excluding all meat there was sufficient protein for population requirements. The supply of total fat, saturated fat and sugar considerably exceeded the current dietary recommendation. As regards nutrition security in 2010, the UK was reliant on imported foods to meet energy, fibre, total carbohydrate, iron, zinc and vitamin A requirements. This analysis demonstrates the importance of including nutrients other than energy to determine the adequacy of the food supply. The methodology also provides an alternative perspective on food security and self-sufficiency by assessing the dependency on imports to meet population level nutritional requirements.
5 CFR 1312.8 - Standard identification and markings.
Code of Federal Regulations, 2011 CFR
2011-01-01
... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.8 Standard identification and markings... or event for declassification that corresponds to the lapse of the information's national security...
5 CFR 1312.8 - Standard identification and markings.
Code of Federal Regulations, 2010 CFR
2010-01-01
... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.8 Standard identification and markings... or event for declassification that corresponds to the lapse of the information's national security...
Unbalanced Stability: Applying Lessons from American Cities in Stability Operations
2011-05-19
teenagers congregating on street corners, public solicitation for prostitution, begging, public drinking, verbal harassment of women on the street, and...United Nations Security Council, “United Nations Security Council Resolution 1590 (2005).” http://www.un.org/ga/search/view_doc.asp?symbol=S/RES/ 1590 (2005...Security Council. “United Nations Security Council Resolution 1590 (2005).” United Nations. http://www.un.org/ga/search/view_doc.asp?symbol=S/RES/ 1590
Arms Control and National Security: Revealed through Two Case Studies
1988-03-01
national security. Those in the service, while charged to carry out the orders of those appointed over them, possess a potential to influence national...the sixth point , of the stated six major national security goals of the present Administration. Not everyone would [ agree with such a placement...the other side concede some point at the bargaining table. 0 A defense bargain is a relative term relating to how much security or strength a
Department of Energy: Nuclear S&T workforce development programs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bingham, Michelle; Bala, Marsha; Beierschmitt, Kelly
The U.S. Department of Energy (DOE) national laboratories use their expertise in nuclear science and technology (S&T) to support a robust national nuclear S&T enterprise from the ground up. Traditional academic programs do not provide all the elements necessary to develop this expertise, so the DOE has initiated a number of supplemental programs to develop and support the nuclear S&T workforce pipeline. This document catalogs existing workforce development programs that are supported by a number of DOE offices (such as the Offices of Nuclear Energy, Science, Energy Efficiency, and Environmental Management), and by the National Nuclear Security Administration (NNSA) andmore » the Naval Reactor Program. Workforce development programs in nuclear S&T administered through the Department of Homeland Security, the Nuclear Regulatory Commission, and the Department of Defense are also included. The information about these programs, which is cataloged below, is drawn from the program websites. Some programs, such as the Minority Serving Institutes Partnership Programs (MSIPPs) are available through more than one DOE office, so they appear in more than one section of this document.« less
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Communication security in open health care networks.
Blobel, B; Pharow, P; Engel, K; Spiegel, V; Krohn, R
1999-01-01
Fulfilling the shared care paradigm, health care networks providing open systems' interoperability in health care are needed. Such communicating and co-operating health information systems, dealing with sensitive personal medical information across organisational, regional, national or even international boundaries, require appropriate security solutions. Based on the generic security model, within the European MEDSEC project an open approach for secure EDI like HL7, EDIFACT, XDT or XML has been developed. The consideration includes both securing the message in an unsecure network and the transport of the unprotected information via secure channels (SSL, TLS etc.). Regarding EDI, an open and widely usable security solution has been specified and practically implemented for the examples of secure mailing and secure file transfer (FTP) via wrapping the sensitive information expressed by the corresponding protocols. The results are currently prepared for standardisation.
National Synchrotron Light Source II
Hill, John; Dooryhee, Eric; Wilkins, Stuart; Miller, Lisa; Chu, Yong
2018-01-16
NSLS-II is a synchrotron light source helping researchers explore solutions to the grand energy challenges faced by the nation, and open up new regimes of scientific discovery that will pave the way to discoveries in physics, chemistry, and biology â advances that will ultimately enhance national security and help drive the development of abundant, safe, and clean energy technologies.
Religious Conflicts and Education in Nigeria: Implications for National Security
ERIC Educational Resources Information Center
Ushe, Ushe Mike
2015-01-01
The persistent religious conflicts and insecurity in Nigeria has given meaningful Nigerians a cause for deep concern in recent times. Many of them wonder why religion which used to be the cohesive factor and core of national unity, peaceful co-existence and national development has become a tool for political manipulation, violence, destruction of…
12 CFR 1.3 - Limitations on dealing in, underwriting, and purchase and sale of securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... sale of securities. (a) Type I securities. A national bank may deal in, underwrite, purchase, and sell Type I securities for its own account. The amount of Type I securities that the bank may deal in...) Type II securities. A national bank may deal in, underwrite, purchase, and sell Type II securities for...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Designation of senior official to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and... COMMISSION Functions § 140.20 Designation of senior official to oversee Commission use of national security...
40 CFR 1068.225 - What are the provisions for exempting engines/equipment for national security?
Code of Federal Regulations, 2010 CFR
2010-07-01
... engines/equipment for national security? 1068.225 Section 1068.225 Protection of Environment ENVIRONMENTAL... security? (a) An engine/equipment is exempt without a request if it will be used or owned by an agency of...) Manufacturers may request a national security exemption for engines/equipment not meeting the conditions of...
32 CFR 2103.51 - Information Security Oversight Committee.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Information Security Oversight Committee. 2103... BE DECLASSIFIED Implementation and Review § 2103.51 Information Security Oversight Committee. The NCS Information Security Oversight Committee shall be chaired by the Staff Counsel of the National Security...
32 CFR 2103.51 - Information Security Oversight Committee.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Oversight Committee. 2103... BE DECLASSIFIED Implementation and Review § 2103.51 Information Security Oversight Committee. The NCS Information Security Oversight Committee shall be chaired by the Staff Counsel of the National Security...
49 CFR 8.31 - Industrial security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 1 2011-10-01 2011-10-01 false Industrial security. 8.31 Section 8.31.../ACCESS Access to Information § 8.31 Industrial security. (a) Background. The National Industrial Security... classified pursuant to Executive Order 12356 of April 2, 1982, National Security Information, or its...
49 CFR 8.31 - Industrial security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 1 2012-10-01 2012-10-01 false Industrial security. 8.31 Section 8.31.../ACCESS Access to Information § 8.31 Industrial security. (a) Background. The National Industrial Security... classified pursuant to Executive Order 12356 of April 2, 1982, National Security Information, or its...
Sandia National Laboratories: National Security Missions: Global Security
Involvement News News Releases Media Contacts & Resources Lab News Image Gallery Publications Annual Library Events Careers View All Jobs Students & Postdocs Internships & Co-ops Fellowships Security Image Cyber and Infrastructure Security Advanced analyses and technologies for securing the
Numerical Simulations of 3D Seismic Data Final Report CRADA No. TC02095.0
DOE Office of Scientific and Technical Information (OSTI.GOV)
Friedmann, S. J.; Kostov, C.
This was a collaborative effort between Lawrence Livermore National Security, LLC (formerly The Regents of the University of Califomia)/Lawrence-Livermore National Laboratory (LLNL) and Schlumberger Cambridge Research (SCR), to develop synthetic seismic data sets and supporting codes.
Code of Federal Regulations, 2010 CFR
2010-01-01
... adjustable rate preferred stock, money market (auction rate) preferred stock, or other newly developed...) and the National Market System, i.e., the top tier of the National Association of Securities Dealers... shall be understood to be present whenever the FDIC determines there is a high probability that the...
76 FR 70984 - National Assessment Governing Board; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-16
... be discussed/disclosed in an open meeting. Premature disclosure of these secure test items and... Education, National Assessment Governing Board. ACTION: Notice of Open and Closed Meeting Sessions. SUMMARY... Hoc, Assessment Development, and Executive Committee. Meetings Ad Hoc Committee: Open Session: 8:30 a...
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program IMPLEMENTATION OF SECTION 1316 OF THE NATIONAL FLOOD INSURANCE ACT OF 1968 § 73.2 Definitions. (a) Except as otherwise provided in this... or ordinances intended to discourage or restrict development or occupancy of flood-prone areas are...
ERIC Educational Resources Information Center
Rabina, Debbie L.
2000-01-01
Discusses the development of a national information policy in Israel. Topics include political climate; security concerns; censorship; lack of openness; progress in the peace process; technical innovativeness; a desire to join the international community; and legislation, including privacy protection, freedom of information, and copyright.…
FY2011 Engineering Innovations, Research, and Technology Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hamilton, Kip; Martz, Harry E.; Poyneer, Lisa A.
2012-04-24
This report summarizes key research, development, and technology advancements in Lawrence Livermore National Laboratory’s Engineering Directorate for FY2011. These efforts exemplify Engineering’s nearly 60-year history of developing and applying the technology innovations needed for the Laboratory’s national security missions, and embody Engineering’s mission to “Enable program success today and ensure the Laboratory’s vitality tomorrow.
5 CFR 1312.1 - Purpose and authority.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.1 Purpose and authority. This subpart sets forth the procedures for the classification and declassification of national security information in the possession of...
77 FR 75182 - President's National Security Telecommunications Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-19
... Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. ACTION: Committee... Security Telecommunications Advisory Committee (NSTAC) will meet on Friday, January 11, 2013, via... related to national security and emergency preparedness telecommunications policy. Agenda: The NSTAC...
National Center for Border Security and Immigration
Research Contributing to the Development of "Smart Machines" August 21, 2014 Research Opportunity with DARPA August 21, 2014 Internship Opportunity with the White House Liaison's Office at the Department of Homeland Security August 21, 2014 Pages 1 2 3 4 5 6 7 8 next ⺠last » Recent Newsletter
Code of Federal Regulations, 2012 CFR
2012-10-01
..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...
Code of Federal Regulations, 2014 CFR
2014-10-01
..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...
Code of Federal Regulations, 2013 CFR
2013-10-01
..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...
The policy of import substitution as the basis for economic security and well-being of society
NASA Astrophysics Data System (ADS)
Makasheva, Yu S.; Makasheva, N. P.; Gromova, A. S.; Andreeva, N. V.; Ishtunov, S. A.
2016-09-01
The study presents the analysis of import substitution opportunities on separate branches of economic activity, preceding the realization of import substitution policy with the aim to support national economic security, which is essential for the contemporary society welfare insurance. Currently, social well-being is considered to be the reflection of economic activity, the instrument of state influence on the society, as well as an indicator of the social security system. Due to the fact that Russia is integrated into the world economy, the foreign-economic policy currently is playing an important role in the development of national security and the state's interest to the spheres of economy considering external and internal threats. Decline in external economic conditions may result in serious consequences for the functioning and development of the country as well as for the trade and investment activities, which will further lead to the decline in export, withdrawal of capital, recession of industrial production, trade and investment sphere, fall of GDP and living standards. Thus, considering the current state of instability in the world economy and the growing political tension in relation to Russian Federation, the measures to increase economic security in the country should be taken. The policy of import substitution is considered to be one of the major solutions nowadays.
The Proliferation Of Unmanned Aerial Vehicles And The Threat To The United States
2016-02-10
and in other cases, technology enables the violence. Regardless of the reason, nations invest heavily in research and development to develop new...anyone the ability to purchase and operate it. This proliferation in UAV technology will pose a significant threat to our national security, which must be...terrorism is not a new threat faced by nations ; unfortunately, terrorism has existed for almost as long as civilization. The first documented use of
Code of Federal Regulations, 2011 CFR
2011-07-01
... Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO IMPLEMENT THE PRIVACY ACT... National Security Affairs (hereinafter the “Assistant”), or the Deputy Assistant to the President for National Security Affairs (hereinafter the “Deputy Assistant”), acting in his name, shall issue a...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO IMPLEMENT THE PRIVACY ACT... National Security Affairs (hereinafter the “Assistant”), or the Deputy Assistant to the President for National Security Affairs (hereinafter the “Deputy Assistant”), acting in his name, shall issue a...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO IMPLEMENT THE PRIVACY ACT... National Security Affairs (hereinafter the “Assistant”), or the Deputy Assistant to the President for National Security Affairs (hereinafter the “Deputy Assistant”), acting in his name, shall issue a...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO IMPLEMENT THE PRIVACY ACT... National Security Affairs (hereinafter the “Assistant”), or the Deputy Assistant to the President for National Security Affairs (hereinafter the “Deputy Assistant”), acting in his name, shall issue a...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Relating to National Defense NATIONAL SECURITY COUNCIL RULES AND REGULATIONS TO IMPLEMENT THE PRIVACY ACT... National Security Affairs (hereinafter the “Assistant”), or the Deputy Assistant to the President for National Security Affairs (hereinafter the “Deputy Assistant”), acting in his name, shall issue a...
2014-09-01
Security (DHS). This research explores how the determination, and more importantly, the urgency of the nation’s leaders to show resiliency , has created...2002 represented the blueprint for a nation of resiliency that unified the government and its community citizenry while deploying measures of...nation of pride and resiliency but also the owner of a complex inwardly focused, national security organization. To examine the JGAs between EM and HS
A National Security Staff for the 21st Century
2012-12-01
President to respond to the Con - gress with a detailed organizational plan for imple- menting the National Security Strategy. vi vii While many of the...the new National Security Staff and was a major con - tributor to key PNSR study efforts, including Forging a New Shield (November 2008), Turning...foundations for a strategic partnership with Con - gress for transforming our national security system to meet the rigors of the 21st century. Part 1 of
77 FR 45721 - Consolidated Audit Trail
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-01
...The Securities and Exchange Commission (``Commission'') is adopting Rule 613 under the Securities Exchange Act of 1934 (``Exchange Act'' or ``Act'') to require national securities exchanges and national securities associations (``self-regulatory organizations'' or ``SROs'') to submit a national market system (``NMS'') plan to create, implement, and maintain a consolidated order tracking system, or consolidated audit trail, with respect to the trading of NMS securities, that would capture customer and order event information for orders in NMS securities, across all markets, from the time of order inception through routing, cancellation, modification, or execution.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-15
... extremist violence and terrorism that threaten the interests and national security of the United States... developing expertise on implementing highly focused social media campaigns; and (ii) perform such other...
Hyperspectral Sensors Final Report CRADA No. TC02173.0
DOE Office of Scientific and Technical Information (OSTI.GOV)
Priest, R. E.; Sauvageau, J. E.
This was a collaborative effort between Lawrence Livermore National Security, LLC as manager and operator of Lawrence Livermore National Laboratory (LLNL) and Science Applications International Corporation (SAIC), National Security Space Operations/SRBU, to develop longwave infrared (LWIR) hyperspectral imaging (HSI) sensors for airborne and potentially ground and space, platforms. LLNL has designed and developed LWIR HSI sensors since 1995. The current generation of these sensors has applications to users within the U.S. Department of Defense and the Intelligence Community. User needs are for multiple copies provided by commercial industry. To gain the most benefit from the U.S. Government’s prior investments inmore » LWIR HSI sensors developed at LLNL, transfer of technology and know-how from LLNL HSI experts to commercial industry was needed. The overarching purpose of the CRADA project was to facilitate the transfer of the necessary technology from LLNL to SAIC thereby allowing the U.S. Government to procure LWIR HSI sensors from this company.« less
14 CFR 1203.900 - Establishment.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.900 Establishment. Pursuant to Executive Order 12958, “National Security Information,” and the National Aeronautics and Space Act of 1958, as amended, there is established...
75 FR 45154 - National Security Division; Agency Information Collection Activities:
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-02
... DEPARTMENT OF JUSTICE [OMB Number 1124-0003] National Security Division; Agency Information Collection Activities: Proposed Collection; Comments Requested ACTION: 60-Day Notice of Information...), National Security Division (NSD), will be submitting the following information collection request to the...
14 CFR 1203.900 - Establishment.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.900 Establishment. Pursuant to Executive Order 12958, “National Security Information,” and the National Aeronautics and Space Act of 1958, as amended, there is established...
Education and Strategic Research Collaborations
Los Alamos National Laboratory National Security Education Center Image Search Site submit LaboratoryNational Security Education Center Menu Program Offices Energy Security Council New Mexico Consortium Geophysics, Planetary Physics, Signatures Events Collaborations for education and strategic research, student
75 FR 29781 - President's National Security Telecommunications Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-27
...] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs... Security Telecommunications Advisory Committee (NSTAC) will be meeting by teleconference; the meeting will... telecommunications policy. Notice of this meeting is given under the Federal Advisory Committee Act (FACA), Public...
32 CFR 2001.23 - Classification marking in the electronic environment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...
32 CFR 2001.23 - Classification marking in the electronic environment.
Code of Federal Regulations, 2012 CFR
2012-07-01
... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...
32 CFR 2001.23 - Classification marking in the electronic environment.
Code of Federal Regulations, 2013 CFR
2013-07-01
... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...
32 CFR 2001.23 - Classification marking in the electronic environment.
Code of Federal Regulations, 2014 CFR
2014-07-01
... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...