Code of Federal Regulations, 2014 CFR
2014-07-01
... under the Economic Espionage Act of 1996, Pub. L. 104-294, effective October 11, 1996. 0.64-5 Section 0... Division § 0.64-5 Policy with regard to bringing charges under the Economic Espionage Act of 1996, Pub. L... the Economic Espionage Act of 1996 (the “EEA”) (18 U.S.C. 1831 et seq.), or use a violation under...
Code of Federal Regulations, 2011 CFR
2011-07-01
... under the Economic Espionage Act of 1996, Pub. L. 104-294, effective October 11, 1996. 0.64-5 Section 0... Division § 0.64-5 Policy with regard to bringing charges under the Economic Espionage Act of 1996, Pub. L... the Economic Espionage Act of 1996 (the “EEA”) (18 U.S.C. 1831 et seq.), or use a violation under...
Code of Federal Regulations, 2012 CFR
2012-07-01
... under the Economic Espionage Act of 1996, Pub. L. 104-294, effective October 11, 1996. 0.64-5 Section 0... Division § 0.64-5 Policy with regard to bringing charges under the Economic Espionage Act of 1996, Pub. L... the Economic Espionage Act of 1996 (the “EEA”) (18 U.S.C. 1831 et seq.), or use a violation under...
Code of Federal Regulations, 2013 CFR
2013-07-01
... under the Economic Espionage Act of 1996, Pub. L. 104-294, effective October 11, 1996. 0.64-5 Section 0... Division § 0.64-5 Policy with regard to bringing charges under the Economic Espionage Act of 1996, Pub. L... the Economic Espionage Act of 1996 (the “EEA”) (18 U.S.C. 1831 et seq.), or use a violation under...
Annual Report to Congress on Foreign Economic Collection and Industrial Espionage, FY 2008
2009-07-23
Warcraft —could offer access to information that would be valuable to economic collectors or industrial espionage in the future. The virtual world ...Industrial Espionage, 2007. Economic espionage cases went up slightly and nearly every day brought reports—in the press and in the classified world —of...reports—in the press and in the classified world —of new cyber attacks against US Government and business entities. Additionally, the increasing use of
28 CFR 12.22 - Material contents of registration statement.
Code of Federal Regulations, 2014 CFR
2014-07-01
... HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1... detailed statement setting forth the nature of the registrant's knowledge of the espionage... instruction or training received by the registrant in the espionage, counterespionage, or sabotage service or...
28 CFR 12.22 - Material contents of registration statement.
Code of Federal Regulations, 2011 CFR
2011-07-01
... HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1... detailed statement setting forth the nature of the registrant's knowledge of the espionage... instruction or training received by the registrant in the espionage, counterespionage, or sabotage service or...
28 CFR 12.22 - Material contents of registration statement.
Code of Federal Regulations, 2010 CFR
2010-07-01
... HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1... detailed statement setting forth the nature of the registrant's knowledge of the espionage... instruction or training received by the registrant in the espionage, counterespionage, or sabotage service or...
28 CFR 12.22 - Material contents of registration statement.
Code of Federal Regulations, 2013 CFR
2013-07-01
... HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1... detailed statement setting forth the nature of the registrant's knowledge of the espionage... instruction or training received by the registrant in the espionage, counterespionage, or sabotage service or...
28 CFR 12.22 - Material contents of registration statement.
Code of Federal Regulations, 2012 CFR
2012-07-01
... HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1... detailed statement setting forth the nature of the registrant's knowledge of the espionage... instruction or training received by the registrant in the espionage, counterespionage, or sabotage service or...
Changes in Espionage by Americans: 1947-2007
2008-03-01
of the 11 most recent cases have involved terrorists, either as recipients of information, by persons working with accused terrorists at...recent spies have relied on computers, electronic information retrieval and storage, and the Internet. The most recent cases suggest that global...cases in which individuals began espionage between 1990 and 2007 illustrate the findings in this report. Personal Attributes Most espionage by
Technophilic hubris and espionage styles during the Cold War.
Macrakis, Kristie
2010-06-01
During the Cold War the United States developed an espionage style that reflected its love affair with technology (technophilia) whereas the Soviet Union and the East Bloc continued a tradition of using humans to collect intelligence. This essay places the origins and development of these espionage styles during the Cold War in historical and social context, and assesses their strengths and weaknesses by drawing on examples from particular cases. While the United States won the Cold War, the East Bloc won the spy wars because of a more effective espionage style. I conclude with some reflections on the uses of history for future policy, and suggest areas for further study.
The Expanding Spectrum of Espionage by Americans, 1947-2015
2017-08-01
time expressed concern about a decline in American values when , during the Cold War, so many young people were willing to betray their country’s...Herbig & Wiskoff, 2002). The third PERSEREC espionage report was published in 2008, when there were 173 Americans to consider. This report shifted the...civilian or volunteer versus recruited spy, people were divided into three cohorts based on when they began espionage and analyzed accordingly. For
Domestic Security Cooperation: A Unified Approach to Homeland Security and Defense
2012-09-01
counter the threats to homeland security that included the Espionage Act of 1917 and the Sedition Act of 1918. National Defense Act of 1916...the threats to homeland security that included the Espionage Act of 1917 and the Sedition Act of 1918. The Espionage Act of 1917 outlawed interfering...years or both.”12 The Sedition Act of 1918 broadened this law by including the U.S. government and prohibited uttering, printing, writing, or
Code of Federal Regulations, 2010 CFR
2010-07-01
... espionage, sabotage, sedition or treason, or conspiring with, or aiding or abetting another to commit such..., including vessels and harbor craft therein; arson, unlawful trafficking in drugs, espionage, sabotage, or...
Code of Federal Regulations, 2012 CFR
2012-07-01
... espionage, sabotage, sedition or treason, or conspiring with, or aiding or abetting another to commit such..., including vessels and harbor craft therein; arson, unlawful trafficking in drugs, espionage, sabotage, or...
Code of Federal Regulations, 2014 CFR
2014-07-01
... espionage, sabotage, sedition or treason, or conspiring with, or aiding or abetting another to commit such..., including vessels and harbor craft therein; arson, unlawful trafficking in drugs, espionage, sabotage, or...
Code of Federal Regulations, 2013 CFR
2013-07-01
... espionage, sabotage, sedition or treason, or conspiring with, or aiding or abetting another to commit such..., including vessels and harbor craft therein; arson, unlawful trafficking in drugs, espionage, sabotage, or...
48 CFR 1852.223-75 - Major breach of safety or security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... of safeguarding against espionage, sabotage, crime (including computer crime), or attack. A major... of safeguarding against espionage, sabotage, crime (including computer crime), or attack. A major...
48 CFR 1852.223-75 - Major breach of safety or security.
Code of Federal Regulations, 2013 CFR
2013-10-01
... of safeguarding against espionage, sabotage, crime (including computer crime), or attack. A major... of safeguarding against espionage, sabotage, crime (including computer crime), or attack. A major...
48 CFR 1852.223-75 - Major breach of safety or security.
Code of Federal Regulations, 2014 CFR
2014-10-01
... of safeguarding against espionage, sabotage, crime (including computer crime), or attack. A major... of safeguarding against espionage, sabotage, crime (including computer crime), or attack. A major...
48 CFR 1852.223-75 - Major breach of safety or security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... of safeguarding against espionage, sabotage, crime (including computer crime), or attack. A major... of safeguarding against espionage, sabotage, crime (including computer crime), or attack. A major...
Espionage scandal leads science news.
Haley, S M
2001-05-18
Two Japanese molecular biologists are charged with espionage in a case that could strain scientific relations between the U.S. and Japan, report both Nature and Science in their top stories this week.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Definitions. 12.1 Section 12.1 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE... received instruction or assignment in the espionage, counterespionage, or sabotage service or tactics of a...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Definitions. 12.1 Section 12.1 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE... received instruction or assignment in the espionage, counterespionage, or sabotage service or tactics of a...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Definitions. 12.1 Section 12.1 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE... received instruction or assignment in the espionage, counterespionage, or sabotage service or tactics of a...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Definitions. 12.1 Section 12.1 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE... received instruction or assignment in the espionage, counterespionage, or sabotage service or tactics of a...
Annual Report to Congress on Foreign Economic Collection and Industrial Espionage - 2004
2005-04-01
Administration ( DTSA ) • Department of Energy (DOE) • Department of Justice (DOJ) • Department of State, including the Bureau of Intelligence and...Threat Reduction Agency DTSA Defense Technology Security Administration EAR Export Administration Regulations 18 EEA Economic Espionage Act of 1996
ERIC Educational Resources Information Center
Parrini, Michelle; Williams, Charles F.
2005-01-01
For much of the nineteenth century, the U.S. did not allocate many resources to intelligence gathering. Many Americans were wary of espionage, partly because of the disreputable association of espionage with the Pinkerton National Detective Agency, the nation's first private detective and police agency. In the realm of twentieth-century…
The Rhetoric of Industrial Espionage: The Case of "Starwood v. Hilton"
ERIC Educational Resources Information Center
Jameson, Daphne A.
2011-01-01
When Starwood Hotels charged Hilton Hotels with industrial espionage, the case hinged on an employment agreement that two executives had violated. The rhetoric of the employment agreement contrasted greatly with that of the corporation's own code of business conduct. Whereas the private agreement stressed narrow self-interest, the public code…
Trial by Newspaper: The Strange Case of Dr. Karl Muck.
ERIC Educational Resources Information Center
Kagan, Sheldon S.
1993-01-01
Examines the case of Dr. Karl Muck, conductor of the Boston Symphony Orchestra who was accused of espionage in 1917. Suggests that the espionage charge was a fiction created by newspapers, beginning with "The Providence Journal." Concludes that Muck admitted to being a spy rather than reveal the name of the woman with whom he had an…
Domestic Security Cooperation: A Unified Approach to Homeland Security and Defense
2012-05-17
recommend non-materiel or materiel approaches 8 David A. Shirk, “Transnational Crime , U.S...the Sedition Act of 1918, captured this periods approach to homeland security and defense. The Espionage Act of 1917 outlawed interfering with any...10,000 or imprisonment for not more than twenty years or both.26 The Sedition Act of 1918 broadened the laws set out in the Espionage Act of 1917 by
Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization
2015-12-01
industrial base sectors…The information targeted could potentially be used to benefit China’s defense industry.”10 While there are likely classified analyses...on Global Conflict and Cooperation, January 2014), 2–3, http://escholarship.org/uc/item/7s48w1ck; Maggie Marcum, “Assessing High-Risk, High- Benefit ...government hacktivists conduct cyber espionage against domestic targets, foreign governments, military networks, and private businesses to benefit their
Code of Federal Regulations, 2011 CFR
2011-07-01
..., including vessels and harbor craft therein; arson, unlawful trafficking in drugs, espionage, sabotage, or treason. (h) Drunkenness on the job or addiction to the use of narcotic drugs, without adequate evidence...
Thermonuclear milestones: (2) Beginnings of the Soviet H-bomb program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Goncharov, G.A.
1996-11-01
Early Soviet theoretical work on thermonuclear ignition was adied by espionage, but many important ideas were conceived and developed independently {copyright} {ital 1996 American Institute of Physics.}
The Literature of Competitive Intelligence.
ERIC Educational Resources Information Center
Walker, Thomas D.
1994-01-01
Describes competitive intelligence (CI) literature in terms of its location, quantity, authorship, length, and problems of bibliographic access. Highlights include subject access; competitive intelligence research; espionage and security; monographs; and journals. (21 references) (LRW)
Lessons Learned, Headquarters, 2d Infantry Division
responsibilities under the Armistice Agreement of 1953 in sector; (2) conduct anti-infiltration, anti-raiding, counter-espionage, and counter-sabotage activities; and (3) implement 2d Infantry Division portion of EUSA Cold War program.
32 CFR 117.56 - Foreign ownership, control or influence (FOCI).
Code of Federal Regulations, 2014 CFR
2014-07-01
... action plan: (A) Record of economic and government espionage against U.S. targets. (B) Record of... financial viability independent of foreign interests. (H) Elimination or resolution of problem debt. (I...
19 CFR 122.183 - Denial of access.
Code of Federal Regulations, 2014 CFR
2014-04-01
...) Destruction of an aircraft or aircraft facility (18 U.S.C. 32); (xiii) Murder; (xiv) Assault with intent to murder; (xv) Espionage; (xvi) Sedition; (xvii) Kidnapping or hostage taking; (xviii) Treason; (xix) Rape...
19 CFR 122.183 - Denial of access.
Code of Federal Regulations, 2013 CFR
2013-04-01
...) Destruction of an aircraft or aircraft facility (18 U.S.C. 32); (xiii) Murder; (xiv) Assault with intent to murder; (xv) Espionage; (xvi) Sedition; (xvii) Kidnapping or hostage taking; (xviii) Treason; (xix) Rape...
Teaching Political Science with Chillers and Thrillers.
ERIC Educational Resources Information Center
Neuse, Steven M.
1980-01-01
Discusses using popular detective and espionage fiction in courses related to area politics, international relations, political terrorism, socialization, and bureaucratic politics. Suggests several novels and ways in which they may be integrated into courses. (KC)
Code of Federal Regulations, 2010 CFR
2010-10-01
... contractor how to transmit the application to the United States Patent Office in accordance with procedures... patent, may be a violation of 18 U.S.C. 792, et seq. (Chapter 37—Espionage and Censorship), and related...
22 CFR 120.27 - U.S. criminal statutes.
Code of Federal Regulations, 2010 CFR
2010-04-01
... (relating to espionage involving defense or classified information) or § 2339A of such title (relating to... Destructive Weapons Act of 2004, relating to missile systems designed to destroy aircraft (18 U.S.C. 2332g...
Industrial espionage today and information wars of tomorrow
NASA Astrophysics Data System (ADS)
Joyal, Paul
1996-03-01
In this report we review case histories of industrial espionage publicized in the media and in Congressional hearings. The threat to the United Stages as the world's largest investor in R&D is magnified by the transition from a cold war military confrontation of the super powers to an economic competition in global markets. To sustain their market share, France, Japan and Russia have initiated national programs to acquire U.S. technical know-how. Former intelligence staff now distill fragments of sensitive information into meaningful knowledge to guide industrial and national efforts to ascertain dominance. This threat is amplified by the exponential proliferation of global communication networks, like INTERENET, that reach into corporate America and permit unseen adversaries to probe the vast U.S. data stores for unprotected intelligence. Counter intelligence in industrial espionage by the United Stages on a national level is virtually impossible because of public scrutiny in our open society. On the positive side, the upheaval of a rapid transition from high-tension and high economic stability to low-tension and high economic instability is prompting international collaboration against international terrorism. On the corporate level, strategic alliances with foreign firms are expanding to sustain competitiveness and innovation in areas of specialty. A national security plan to protect the U.S. information resources is needed; and a viable policy to operate our information highways as safe conduits for electronic business. The well being of the global economy, not just that of our nation, is at stake and should not be left to chance and provocation.
Thrills, spills and pills: Bond, Benzedrine and the pharmacology of peace.
Goodman, Sam
2010-06-01
This paper examines the conjunction of pharmacological science and espionage fiction of the post-war era. This paper argues that, during the 1950s, the relatively new science of pharmacology propounded the possibility that illness and human deficiency could be treated in a way that better reflected the post-war zeitgeist. The use of pharmacological medicine, perceived as cleaner and quicker than more 'bodily' forms of treatment, represented progress in contemporary medical science. It is argued that this philosophy extended to more overt means of pharmacological application, directly related to the geopolitical concerns of the 'Cold War'. A growing form of popular literature in this period was the espionage novel. This paper argues that the benefits proffered by pharmacology were incorporated into the fabric of espionage fiction, specifically the James Bond novels of Ian Fleming. Here, it is demonstrated how Fleming used pharmacological knowledge of Benzedrine throughout his novels. His works illustrate a belief that the augmentation of the spy's natural ability with pharmacological science would award decisive advantage in the Cold War conflict played out in spy fiction. However, the relationship between public use of Benzedrine and awareness of its side effects changed during the period of Fleming's publications, moving from a position of casual availability to one of controlled prescription. It is argued that the recognition of the dangers associated with the drug were over-ruled in favour of the benefits its use presented to the state. The continued use of the drug by Bond illustrates how the concerns of the nation are given priority over the health, and life, of the individual.
Chinese Cyber Economic Espionage: Motivations And Responses
2016-05-26
scarcity at home and abroad made production more expensive; pillaging of natural resources coupled with ecologically unfriendly industrial production...urgency and enabled by a connected world—became state policy. Regardless of moral or ethical judgments (which, from a realist perspective, are largely
Through Enemy Eyes: A Soviet View of U.S. Intelligence
1980-06-01
Pentagon, and frequently its intelligence departments, while possessing the newest technical means of espionage, artificial earth satellites included...government as proof of official membership in the intellignece community. The characterization of the Hoover Institute of Stanford University is typical
Code of Federal Regulations, 2010 CFR
2010-04-01
... a pardon of the offense by the President of the United States, such penalty is not applied in... espionage and censorship), chapter 105 (relating to sabotage), or chapter 115 (relating to treason, sedition...
Non-Deployables: An Increasing Challenge for the Army
2010-04-01
under criminal investigation for desertion, spying, espionage, aiding the enemy, treason, sedition , or subversive activities or who are under arrest...Armed Services Committee Testimony Opening Remarks (as delivered), February 25, 2010, http://www.army.mil/- speeches /2010/03/01/35133-feb-25- 2010
Information Practice and Malpractice. . .Do We Need Malpractice Insurance?
ERIC Educational Resources Information Center
Mintz, Anne P.
1984-01-01
Relates interview responses of seven information brokers on proper practice of information and extent of malpractice (e.g., industrial espionage, breaches of client or source confidentiality). Types of protection against malpractice--contracts, good educational background for entry-level positions, continuing education, personal values,…
28 CFR 12.25 - Amended registration statement.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Amended registration statement. 12.25 Section 12.25 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...
Arab Stereotypes in Popular Fiction.
ERIC Educational Resources Information Center
Terry, Janice J.
1983-01-01
Most popular fictional plots involving the Middle East--adventure stories, espionage, and themes of Western dependency on Arab oil--portray the Israelies as the good guys and the Arabs as the villians. People must be made aware that fictional literature is prejudiced and racially biased against Arabs. (RM)
28 CFR 12.25 - Amended registration statement.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Amended registration statement. 12.25 Section 12.25 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...
28 CFR 12.23 - Deficient registration statement.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Deficient registration statement. 12.23 Section 12.23 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...
28 CFR 12.25 - Amended registration statement.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Amended registration statement. 12.25 Section 12.25 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...
28 CFR 12.25 - Amended registration statement.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Amended registration statement. 12.25 Section 12.25 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...
28 CFR 12.25 - Amended registration statement.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Amended registration statement. 12.25 Section 12.25 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...
28 CFR 12.23 - Deficient registration statement.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Deficient registration statement. 12.23 Section 12.23 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...
28 CFR 12.23 - Deficient registration statement.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Deficient registration statement. 12.23 Section 12.23 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...
28 CFR 12.23 - Deficient registration statement.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Deficient registration statement. 12.23 Section 12.23 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...
28 CFR 12.23 - Deficient registration statement.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Deficient registration statement. 12.23 Section 12.23 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...
Code of Federal Regulations, 2010 CFR
2010-07-01
... of the National Security Division, which will consult, as necessary, with the Computer Crime and... Attorney General, the Deputy Attorney General, the Assistant Attorney General for National Security, or the...
Evaluating the risk of industrial espionage
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bott, T.F.
1998-12-31
A methodology for estimating the relative probabilities of different compromise paths for protected information by insider and visitor intelligence collectors has been developed based on an event-tree analysis of the intelligence collection operation. The analyst identifies target information and ultimate users who might attempt to gain that information. The analyst then uses an event tree to develop a set of compromise paths. Probability models are developed for each of the compromise paths that user parameters based on expert judgment or historical data on security violations. The resulting probability estimates indicate the relative likelihood of different compromise paths and provide anmore » input for security resource allocation. Application of the methodology is demonstrated using a national security example. A set of compromise paths and probability models specifically addressing this example espionage problem are developed. The probability models for hard-copy information compromise paths are quantified as an illustration of the results using parametric values representative of historical data available in secure facilities, supplemented where necessary by expert judgment.« less
Economic Espionage Penalty Enhancement Act
Sen. Kohl, Herb [D-WI
2011-03-30
Senate - 12/08/2011 Placed on Senate Legislative Calendar under General Orders. Calendar No. 255. (All Actions) Notes: For further action, see H.R.6029, which became Public Law 112-269 on 1/14/2013. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Do You Lock Your Network Doors? Some Network Management Precautions.
ERIC Educational Resources Information Center
Neray, Phil
1997-01-01
Discusses security problems and solutions for networked organizations with Internet connections. Topics include access to private networks from electronic mail information; computer viruses; computer software; corporate espionage; firewalls, that is computers that stand between a local network and the Internet; passwords; and physical security.…
28 CFR 12.20 - Filing of registration statement.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Filing of registration statement. 12.20 Section 12.20 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Photocopies. 12.41 Section 12.41 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.41 Photocopies. (a) Photocopies of...
28 CFR 12.70 - Partial compliance not deemed compliance.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Partial compliance not deemed compliance. 12.70 Section 12.70 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...
28 CFR 12.40 - Public examination.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Public examination. 12.40 Section 12.40 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.40 Public examination...
28 CFR 12.20 - Filing of registration statement.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Filing of registration statement. 12.20 Section 12.20 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...
28 CFR 12.4 - Inquiries concerning application of act.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Inquiries concerning application of act. 12.4 Section 12.4 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...
28 CFR 12.40 - Public examination.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Public examination. 12.40 Section 12.40 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.40 Public examination...
28 CFR 12.40 - Public examination.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Public examination. 12.40 Section 12.40 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.40 Public examination...
28 CFR 12.70 - Partial compliance not deemed compliance.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Partial compliance not deemed compliance. 12.70 Section 12.70 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Photocopies. 12.41 Section 12.41 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.41 Photocopies. (a) Photocopies of...
28 CFR 12.4 - Inquiries concerning application of act.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Inquiries concerning application of act. 12.4 Section 12.4 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...
28 CFR 12.70 - Partial compliance not deemed compliance.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Partial compliance not deemed compliance. 12.70 Section 12.70 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...
28 CFR 12.4 - Inquiries concerning application of act.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Inquiries concerning application of act. 12.4 Section 12.4 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...
28 CFR 12.20 - Filing of registration statement.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Filing of registration statement. 12.20 Section 12.20 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...
28 CFR 12.20 - Filing of registration statement.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Filing of registration statement. 12.20 Section 12.20 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Photocopies. 12.41 Section 12.41 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.41 Photocopies. (a) Photocopies of...
28 CFR 12.20 - Filing of registration statement.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Filing of registration statement. 12.20 Section 12.20 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Photocopies. 12.41 Section 12.41 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.41 Photocopies. (a) Photocopies of...
28 CFR 12.40 - Public examination.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Public examination. 12.40 Section 12.40 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.40 Public examination...
28 CFR 12.70 - Partial compliance not deemed compliance.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Partial compliance not deemed compliance. 12.70 Section 12.70 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...
28 CFR 12.70 - Partial compliance not deemed compliance.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Partial compliance not deemed compliance. 12.70 Section 12.70 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Photocopies. 12.41 Section 12.41 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.41 Photocopies. (a) Photocopies of...
28 CFR 12.4 - Inquiries concerning application of act.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Inquiries concerning application of act. 12.4 Section 12.4 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Definitions. 12.1 Section 12.1 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.1 Definitions. As used in this part...
28 CFR 12.40 - Public examination.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Public examination. 12.40 Section 12.40... ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.40 Public examination. Registration statements shall be available for public examination at the offices of the Registration Unit...
Annual Report to Congress on Foreign Economic Collection and Industrial Espionage: 1998
1998-01-01
representatives of Owens - Corning Corporation, a primary PPG competitor. Both subjects were charged under Title 18 U.S.C., Section 1832 (Theft of Trade...information to an FBI undercover agent posing as a representative of Owens - Corning . Steven Davis stole and disclosed Gillette Company trade secrets to
28 CFR 12.30 - Burden of establishing availability of exemptions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Burden of establishing availability of exemptions. 12.30 Section 12.30 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...
28 CFR 12.30 - Burden of establishing availability of exemptions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Burden of establishing availability of exemptions. 12.30 Section 12.30 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...
28 CFR 12.21 - Time within which registration statement must be filed.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Time within which registration statement must be filed. 12.21 Section 12.21 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...
28 CFR 12.2 - Administration of act.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Administration of act. 12.2 Section 12.2 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.2 Administration of...
28 CFR 12.3 - Prior registration with the Foreign Agents Registration Unit.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Prior registration with the Foreign Agents Registration Unit. 12.3 Section 12.3 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...
28 CFR 12.3 - Prior registration with the Foreign Agents Registration Unit.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Prior registration with the Foreign Agents Registration Unit. 12.3 Section 12.3 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...
28 CFR 12.30 - Burden of establishing availability of exemptions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Burden of establishing availability of exemptions. 12.30 Section 12.30 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...
28 CFR 12.21 - Time within which registration statement must be filed.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Time within which registration statement must be filed. 12.21 Section 12.21 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...
28 CFR 12.21 - Time within which registration statement must be filed.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Time within which registration statement must be filed. 12.21 Section 12.21 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...
28 CFR 12.30 - Burden of establishing availability of exemptions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Burden of establishing availability of exemptions. 12.30 Section 12.30 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...
28 CFR 12.21 - Time within which registration statement must be filed.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Time within which registration statement must be filed. 12.21 Section 12.21 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...
28 CFR 12.3 - Prior registration with the Foreign Agents Registration Unit.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Prior registration with the Foreign Agents Registration Unit. 12.3 Section 12.3 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...
Mission Possible: READ! Teens Produce Their Own Summer Reading Game.
ERIC Educational Resources Information Center
Kellicker, Patricia; Warren, Jesse Cole
1998-01-01
Describes "Mission Possible," a summer reading game with an espionage theme developed by young adult readers and the Boulder (Colorado) Public Library. Highlights include instructions for playing the game, sample activity sheets, beginning and culminating activities, daily record keeping, prizes, player evaluations of the game, and…
28 CFR 12.2 - Administration of act.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Administration of act. 12.2 Section 12.2 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.2 Administration of...
28 CFR 12.3 - Prior registration with the Foreign Agents Registration Unit.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Prior registration with the Foreign Agents Registration Unit. 12.3 Section 12.3 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...
ERIC Educational Resources Information Center
Levitt, Nina
2007-01-01
For the past seven years, the author has been researching the representations of women who were engaged in a range of espionage activities during World War II. It seems much of people's knowledge about women spies is formed by popular representations, which are often, and intriguingly, full of stereotypes and half-truths. The skilled and heroic…
28 CFR 12.2 - Administration of act.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Administration of act. 12.2 Section 12.2 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.2 Administration of...
28 CFR 12.2 - Administration of act.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Administration of act. 12.2 Section 12.2 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.2 Administration of...
28 CFR 12.21 - Time within which registration statement must be filed.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Time within which registration statement must be filed. 12.21 Section 12.21 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...
28 CFR 12.3 - Prior registration with the Foreign Agents Registration Unit.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Prior registration with the Foreign Agents Registration Unit. 12.3 Section 12.3 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...
28 CFR 12.2 - Administration of act.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Administration of act. 12.2 Section 12.2 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.2 Administration of...
28 CFR 12.30 - Burden of establishing availability of exemptions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Burden of establishing availability of exemptions. 12.30 Section 12.30 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...
14 CFR 1274.936 - Breach of safety or security.
Code of Federal Regulations, 2013 CFR
2013-01-01
.... (a) Security is the condition of safeguarding against espionage, sabotage, crime (including computer... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Breach of safety or security. 1274.936... security. Breach of Safety or Security July 2002 Safety is the freedom from those conditions that can cause...
14 CFR 1274.936 - Breach of safety or security.
Code of Federal Regulations, 2010 CFR
2010-01-01
.... (a) Security is the condition of safeguarding against espionage, sabotage, crime (including computer... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Breach of safety or security. 1274.936... security. Breach of Safety or Security July 2002 Safety is the freedom from those conditions that can cause...
14 CFR 1274.936 - Breach of safety or security.
Code of Federal Regulations, 2011 CFR
2011-01-01
.... (a) Security is the condition of safeguarding against espionage, sabotage, crime (including computer... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Breach of safety or security. 1274.936... security. Breach of Safety or Security July 2002 Safety is the freedom from those conditions that can cause...
Dynamic Training Environments of the Future
2008-03-13
for cyber attacks, espionage, & command and control MMORPG used to generate revenue through the sale of in-game items for real-world currency...The video game is the new media in cyberspace, it can be used by us and it will be used against us The MMORPG is the emergence of a new society Types
The Great Dinosaur Feud: Science against All Odds
ERIC Educational Resources Information Center
Clary, Renee; Wandersee, James; Carpinelli, Amy
2008-01-01
In the 19th century, the race to uncover dinosaur fossils and name new dinosaur species inspired two rival scientists, Edward Drinker Cope and Othniel Charles Marsh, to behave in ways that were the antithesis of scientific methods. Subterfuge, theft, and espionage were the ingredients of the Great Dinosaur Feud. Because students often enjoy…
Congressional Panel Seeks To Curb Access of Foreign Students to U.S. Supercomputers.
ERIC Educational Resources Information Center
Kiernan, Vincent
1999-01-01
Fearing security problems, a congressional committee on Chinese espionage recommends that foreign students and other foreign nationals be barred from using supercomputers at national laboratories unless they first obtain export licenses from the federal government. University officials dispute the data on which the report is based and find the…
2010-04-01
erupt in the region. 29 Media reports of the “Titan Rain” espionage operation highlighted the ability of alleged state-sponsored Chinese hackers to...February 2010. Mordini, Emilio and Massari, Sonia, “Body, Biometrics and Identity”, In Bioethics , Volume 22, Number 9 2008, p488-498. Mostrous
NASA Astrophysics Data System (ADS)
Orlov, Yuri
2006-04-01
I will share my general thoughts on safe haven for scholars at risk, based on my own experience, and will discuss scholars at risk in Russia. At the present time, these are mostly scientists falsely accused of espionage. I will highlight the special issues this fact raises for providing support or safe haven for such scientists.
U.S.-RUSSIA TIES: Spy Conviction Strains Science Collaborations.
Stone, R
2000-12-15
The conviction last week in Russia of U.S. businessman Edward Pope on charges of espionage may add to already growing tensions in scientific collaborations between the two countries, according to officials on both sides. The recent strains appear to be a reaction to a broad range of national security concerns in each nation.
Satire, Surveillance, and the State: A Classified Primer
ERIC Educational Resources Information Center
Bogad, L. M.
2007-01-01
This article explores the use of ironic performance in education, particularly around issues of human rights. I examine my own efforts to engage audiences with the history of domestic espionage and sabotage by the intelligence agencies of the United States. This is a history well known to some marginalized counterpublics (see Fraser, 1997), but…
ERIC Educational Resources Information Center
Turner, Judith Axler
1988-01-01
Soviet intelligence agents have been collecting scientific and technical documents in research libraries to identify emerging technology before its components become classified or restricted. Librarians are also recruited as spies. However, asking librarians to identify suspicious library users would violate ethics and intellectual freedom. (MSE)
The strategic measures for the industrial security of small and medium business.
Lee, Chang-Moo
2014-01-01
The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures.
Marking the enemy, marking the other : the intersection of national security and diversity.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wilson, G. D.
2001-01-01
In recent years, Los Alamos National Laboratory (LANL) has alternately been criticized for being too cozy with foreign scientists and too quick to scapegoat or profile workers with foreign ancestries. In the wake of the investigation of alleged espionage that focused on Taiwanese-born American nuclear scientist Wen Ho Lee, political leaders and the news media questioned the Lab's commitment to security and the wisdom of its close collaborations with foreign scientists. Wen Ho Lee was of course an American citizen and not a foreign scientist, and many of his supporters felt that his Asian ancestry made him too convenient ofmore » a target in a case focused on Chinese espionage. Thus, charges of racial profiling and scapegoating were also aimed at the Lab, the Department of Energy, and the Federal Bureau of Investigation. In the wake of the controversy some Asian American groups have been encouraging a boycott of the national laboratories run by the Department of Energy, and at Los Alamos, the number of Asian Americans applying for jobs, post docs, and student positions is substantially down.« less
High-Tech Approaches to Breeching Examination Security. Espionage 101.
ERIC Educational Resources Information Center
Colton, Gregg D.
Technology has provided the public with the ability to steal the contents of multiple examinations in a short time period and at minimal cost. No examination is safe from compromise, and the only variable is the extent and sophistication used to bring about the compromise or theft. With the easy availability of micro-video equipment, audio…
Preventing and Profiling Malicious Insider Attacks
2012-04-01
malicious insiders. This research program could also be extended to look at general human factors issues surrounding information security behaviours ... behaviours . This research also draws on corresponding studies into fraud and espionage in non IT scenarios. A range of preventative measures is...This includes motivating factors, personality traits and observable behaviours that may assist organisations in the detection and profiling of
J. Edgar Hoover and the Black Press in World War II.
ERIC Educational Resources Information Center
Washburn, Patrick S.
Holding enormous if controversial power as Director of the Federal Bureau of Investigation (FBI), J. Edgar Hoover was sometimes controlled unexpectedly at the highest reaches of government, as illustrated by his failed attempt to obtain an Espionage Act indictment against the black press during World War II. Following anarchist bombings in 1919,…
Cybersecurity: Authoritative Reports and Resources
2013-10-25
Security Technologies Reporting Data Breaches: Is Federal Legislation Needed to Protect Consumers ? July 18, 2013 Energy and Commerce Commerce ...Protect Consumers ? July 18, 2013 Energy and Commerce Oversight and Investigation Cyber Espionage and the Theft of U.S. Intellectual Property and...protection for sensitive consumer data and timely notification in case of breach June 15, 2011 Energy and Commerce Commerce , Manufacturing, and
Crossing Canonical Boundaries: Espionage Fiction in the Writing Classroom.
ERIC Educational Resources Information Center
Marsee, Mickey
One of the biggest complaints shared by writing teachers is that students lack a sense of self. Writing handbooks and teachers are full of advice and exercises pointed at assisting students in finding their voice, their persona as writers. One method that may assist writing students in finding that voice would introduce students to spy fiction.…
The Case for Inclusion of Competitive Teams in Security Education
ERIC Educational Resources Information Center
Serapiglia, Anthony
2016-01-01
Through industry news as well as contemporary reporting, the topic of computer security has become omnipresent in our daily lives. Whether the news is about corporate data breaches, international cyber espionage, or personal data compromises and identity theft--EVERYONE has had to deal with digital security in some way. Because of this, one of the…
2013-06-01
Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage,” 9. 57 Lolita C. Baldor, “Chinese Cyber Attacks On U.S. Continue...the Secretary of Defense, 2009. Baldor, Lolita C. “Chinese Cyber Attacks on U.S. Continue Totally Unabated, Leon Panetta.” Huffington Post (2012
U.S.-China Relations: An Overview of Policy Issues
2013-08-01
consul at the Embassy of Ecuador in London.7 Carney indicated that the White House believed the Chinese central government in Beijing was involved in...the U.S. agenda is commercial cyber espionage that the U.S. government says appears to be directly attributable to official Chinese actors. Other...Trade Organization (WTO) Commitments ................... 38 China and the WTO Government Procurement Agreement
The Strategic Measures for the Industrial Security of Small and Medium Business
Lee, Chang-Moo
2014-01-01
The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures. PMID:24955414
DoE Weapons Laboratories: Actions Needed to Strengthen EEO Oversight
2002-04-01
compliance evaluations—because their employment of minorities and women appears to differ from industry averages. According to OFCCP officials, OFCCP...American accused of espionage, have called into question the equitable treatment of minorities and women in personnel actions at these laboratories in...Professionals Show Statistically Significant Differences for Minority Men and Women and White Women Compared with White Men, While Others Do Not 23
A Layered Social and Operational Network Analysis
2007-03-01
organizations, networks and individuals” (OPOTUS, 2006: 5). These transnational threats, which compromise the security of the US , consist of...The focus of criminal groups is money ; the trafficking of 2-7 drugs or people, the money laundering , and the corruption are a means to generate...assassination is used (National Defense University, 1999:250). 2-8 Economic and industrial espionage, bank fraud, financial market manipulation, and
An Ontology for Insider Threat Indicators Development and Applications
2014-11-01
An Ontology for Insider Threat Indicators Development and Applications Daniel L. Costa , Matthew L. Collins, Samuel J. Perl, Michael J. Albrethsen...services, commit fraud against an organization, steal intellectual property, or conduct national security espionage, sabotaging systems and data, as...engineering plans from the victim organization’s computer systems to his new employer. The insider accessed a web server with an administrator account
Achieving Accountability in Cyberspace: Revolution or Evolution?
2014-01-01
hours, the malware propagates throughout both networks and begins to beacon to a site known for its state - sponsored cyberspace espionage activities...installation in the United States , communications personnel in a tenant unit, whose primary unclassified operating network is neither owned nor...protect its unclas- sified proprietary network. A known nation- state actor gains access to the company’s network and begins to exfil- trate megabytes
ERIC Educational Resources Information Center
Adebiaye, Richmond
2010-01-01
The proliferation of web-based communication tools like email clients vis-a-vis Yahoo mail, Gmail, and Hotmail have led to new innovations in web-based communication. Email users benefit greatly from this technology, but lack of security of these tools can put users at risk of loss of privacy, including identity theft, corporate espionage, and…
Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis
2006-12-01
had drawn attention by displaying concerning behaviors prior to the act of sabotage [Keeney 2005]. These behaviors included • tardiness , truancy... Philippines , Joseph Estrada, visiting the presidential palace with his wife and traveling to the Philippines to visit Estrada in the hospital. This...Aragoncillo was not authorized to view, access, download, or print information related to the Philippines —he had no need to know. However, this lack
ERIC Educational Resources Information Center
Perry, Douglas
In February 1942 (two months after the attack on Pearl Harbor, Hawaii) President Franklin Roosevelt, as commander-in-chief, issued Executive Order 9066 to relocate all persons of Japanese ancestry, both citizens and aliens, inland and away from the Pacific military zone. The Order was to prevent espionage and to protect persons of Japanese descent…
Internet Governance and National Security
2012-01-01
the conflict created by headline- grabbing exploits of ad hoc hacker networks or nation-state-inspired cor porate espionage.5 Malicious actors add...governance of critical Internet re sources and their impact on US national security are often overlooked. Foreign efforts to alter the technical...crime, espio nage, and other forms of cyber conflict rather than on the issues related to governance of critical Internet resources, development of
Cyberwar and B.H. Liddell Hart’s Indirect Approach
2016-06-10
outbreak of WWII, and in the years immediately thereafter, British Government leaders and several academics branded LH a snake oil salesman and accused him...industries at $6 billion to $20 billion, with a big part owning to oil industry losses.” Cyber attacks against the oil industry are compelling because this...Strike Fighter. The article noted that 144 It is likely that cyber espionage targeting the oil
2008-11-01
Israel’s military sales to China , inadequate Israeli protection of U.S. intellectual property, and espionage-related cases. 275 Sharon Sadeh...Brazil, Canada, Germany, and Turkey. China has been a major client, although Israel has backed off on some sales activity after protests from the...Israel to cancel the sale to China of the Phalcon, an advanced, airborne early-warning system. In 2005 the U.S. Department of Defense was angered by
The State of Integrated Air and Missile Defense Held in Laurel, Maryland on July 14, 2011
2011-07-14
compromised from servers (-22%) 86% were discovered by a third party (+25%) 96% of breaches were avoidable (+-0) Source 2011 Data Breach Investigations...Foreign Espionage - Terrorists - State Sponsored Attacks UNCLASSIFIED UNCLASSIFIED 11 What commonalities exist? How do breaches occur? Verizon Data ... Breach Study “Breaching organizations still doesn’t typically require highly sophisticated attacks, most victims are a target of opportunity rather
The Challenge of Small Satellite Systems to the Space Security Environment
2012-03-01
Space, 1945–1995, (New York: Dodd, Mead & Company, Inc. 1984), 142. 40 Moltz, The Politics of Space Security, 93. 41William E. Burrows , Deep Black...90 Stares, The Militarization of Space, 170. 91 Ibid. 92 Burrows , Deep Black, 279- 280. 30 to gather together in 1978 at the request...www.technologynewsroom.com/press_releases/company_releases.aspx?sto ry=522. Burrows , William E. Deep Black: Space Espionage and National Security
A World of Locked-In System: The Pivot & U.S. Military Power
2013-03-01
scientific and industrial espionage, bribery , and theft of intellectual property.21 At the same time, China bought foreign companies and traded products to...failure to make clear that the institution demands absolute integrity of its people can lead to unethical 10 behavior and compromise of the...make hard, ethical decisions and having the duty to report unethical behavior. Service members must never take for granted the legacy of public support
NATIONAL SECURITY: Relief, Rebukes Follow Agreement on Lee.
Lawler, A
2000-09-15
What began as an explosive case of alleged nuclear espionage is expected to end quietly soon when physicist Wen Ho Lee walks free from an Albuquerque, New Mexico, courtroom after 9 months in jail. The ignominious collapse of the government's case and Lee's release have embarrassed federal prosecutors. However, the news was a relief to Asian-American researchers and others who say Lee's status as a suspect had heightened racial tensions at the national labs.
The Applicability of Army Design Methodology to the Federal Bureau of Investigation
2011-05-19
fighting crime , terrorism and espionage, while responding to new threats by organizing, equipping and adapting. Throughout the gangster era of the 1930s...the FBI armed its agents for the first time, and organized itself to fight gangsters who were accustomed to committing violent crimes and crossing...to transform the FBI into an effective domestic intelligence agency with the goal of preventing terrorist attacks and serious crime .7 These efforts
Detachment 101 in the CBI: An Unconventional Warfare Paradigm for Contemporary Special Operations
2010-05-13
Theater. According to historian Clayton Newell , “Roosevelt, a long-time China booster, convinced Churchill to appease the Generalissimo by inviting him to...Clayton R. Newell , Burma, 1942: The U.S. Army Campaigns of World War II (Pamphlet) (Washington, D.C.: U.S. Government Printing Office. 1995), 10...Chalou explains, “They had absolutely no appreciation of the potential of resistance forces, espionage, sabotage and other clandestine operations. Their
Challenges in the Protection of US Critical Infrastructure in the Cyber Realm
2014-05-22
their nature and motivation and the need to differentiate attacks in case of individual attributions ( criminal , espionage, and hacktivist attack vs ...also difficult to distinguish between acts of war and criminal acts. For example, it is natural for the military to be ambiguous as to whether an...must be addressed. The resultant cyber security issues challenge everyone. This prompts the question, what is the nature of the US military
Target Revitalization for Espionage in American Industry: New Directions for the Coming Decade
1993-09-01
Peninsular Malaysia X Spratly Islands X Paracel Islands X Senkaku Islands X Sabah "V Nuclear Armed, Nuclear Capability, or Threshold Nuclear Capability X...Territories "+ Bosnia-Herzegovina, Croatia, Yugoslavia "+ Kuril Islands Canrt-The Oirneg1P WOU-4..22 "+ Peninsular Malaysia "+ Spratly Islands "+ Paracel...Intelligence 22 THE THEORETICAL DIMENSION 24 Figure 3-1: Continuum of Social Stability 25 Differential Social Disintegration 26 Figure 3-2: Model of
Mitigating Insider Sabotage and Espionage: A Review of the United States Air Force’s Current Posture
2009-03-01
published on ins ider threat, to include the variables that come into play and historical case studies. Existing insider threat models are discussed ...problem, including the initial development of a logical da ta mod el and a system dynamics model. This chapter also discusses the selection of the...Finally, Chapter V provides a summary of the research along with a discussion of its conclusions and impact. Recommendations for future research
NUCLEAR ESPIONAGE: Report Details Spying on Touring Scientists.
Malakoff, D
2000-06-30
A congressional report released this week details dozens of sometimes clumsy attempts by foreign agents to obtain nuclear secrets from U.S. nuclear scientists traveling abroad, ranging from offering scientists prostitutes to prying off the backs of their laptop computers. The report highlights the need to better prepare traveling researchers to safeguard secrets and resist such temptations, say the two lawmakers who requested the report and officials at the Department of Energy, which employs the scientists.
VideoBeam portable laser communicator
NASA Astrophysics Data System (ADS)
Mecherle, G. Stephen; Holcomb, Terry L.
1999-01-01
A VideoBeamTM portable laser communicator has been developed which provides full duplex communication links consisting of high quality analog video and stereo audio. The 3.2-pound unit resembles a binocular-type form factor and has an operational range of over two miles (clear air) with excellent jam-resistance and low probability of interception characteristics. The VideoBeamTM unit is ideally suited for numerous military scenarios, surveillance/espionage, industrial precious mineral exploration, and campus video teleconferencing applications.
2009-07-01
newspapers of the leftist persuasions were banned under the Espionage Act of 1917 and the Sedition Act of 1918. Id. 38 Id. 39 Id.; see also Near v... speech ). 40 VAUGHN, supra note 25, at 85. The 1941 War Powers Act banned publishing material on subjects such as military plans, intelligence...to trigger a war crime under Article 85, para. 3(e). Protocol I, supra note 4, art. 85(3). 170 Protocol I, supra note 4, art. 48. Article 48’s
DOE Office of Scientific and Technical Information (OSTI.GOV)
Holloway, D.
1993-05-01
In this article, Russian bomb designers answer the KGB's claim that espionage, not science, produced the Soviet bomb. Yuli Khariton and Yuri Smirnov wholly reject the argument that Soviet scientists can claim little credit for the first Soviet bomb. In a lecture delivered at the Kurchatov Institute, established in 1943 when Igor Kurchatov became the director of the Soviet nuclear weapons project, Khariton and Smironov point to the work done by Soviet nuclear physicists before 1941 and refute assertions that have been made in Western literature regarding the hydrogen bomb.
Rep. Lamborn, Doug [R-CO-5
2014-04-01
House - 04/16/2014 Referred to the Subcommittee on Immigration and Border Security. (All Actions) Notes: For further action, see S.2195, which became Public Law 113-100 on 4/18/2014. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
2014-12-12
nexus of intelligence and technology is like a new toy for a small child . The President, the CIA, and the entire intelligence community have become...that could. The espionage trade was developed by using the technology available at the time, and incorporating any means available to collect relevant...reduced immediate need, such as an ongoing or developing conflict or war, is it responsible to maintain a capability just in case, where there may be an
The Spanish Emergency Military Unit: Military Capabilities in a Civilian Environment
2015-05-23
of Weapons of Mass Destruction X X X Irregular Immigration X X X Espionage X Disasters and Emergencies X X X Maritime Vulnerability X...needs. The magnitude of the disaster, and the mishandling of the initial response, forced the governor of Florida, Mr. Lawton Chiles , to request for...Cruz Roja en el envío de ayuda a Haití y Chile .” 6 October 2010. Accessed 3 December 2014. http://www.defensa.gob.es/ gabinete/notasPrensa/2010/06
2015-06-01
Katherine Herbig, Espionage by the Numbers: A Statistical Overview, accessed April 14, 2015, http://www.wright.edu/rsp/Security/Treason/Numbers.htm 5...submitted for top-secret clearances with “derogatory financial information.”43 The debt amount reviewed was $500 in delinquency for at least 120 days, which...Investigative Service’s (DIS) “ delinquent debt criteria with amount of delinquent debt” and Defense Central Index of Investigation’s (DCII) final
The PRC Medium and Long-Term National Science and Technology Development Plan: A Manifesto to Steal
2015-02-17
rise in Chinese espionage cases, lax export laws in Hong Kong and recent changes to U.S. visa laws U.S. lawmakers must increase the focus on the...and embedded overseas Chinese scholars, importation of foreign technology through Hong Kong , joint ventures and export relationships with foreign...particularly hardware - to the PRC is through Hong Kong front companies. As example, just last year on 10 November 2014 a PRC national from Hong Kong
2011-05-19
65Peter La Franchi . “East Asia remains focus of UAV spy activity as US Defence watchdog releases suspected espionage report.” Flight Global ...drone fired one of the first UAV launched missiles in America’s “ Global War on Terror,” when it engaged and destroyed a vehicle carrying the...from the tactical small UAV, to theater and global strike and intelligence, surveillance, and reconnaissance assets organic to primarily the U.S
Polygraph Screening of Physicists and Spies
NASA Astrophysics Data System (ADS)
Lykken, David
2000-03-01
You will be invited to imagine yourself a scientist at the weapons laboratory at Los Alamos. You have just been ordered, pursuant to DOE Secretary Richardson's directive, to submit to a polygraph or ``lie detector" test, the Test for Espionage and Sabotage or TES. This talk will help you to picture yourself being tested and to predict whether you will pass or fail the TES. It will also explain why your passing or failing will have little to do with whether you are in fact a spy or not.
2009-07-01
ences. But why devote space in an intelligence publication to teen fiction, even if it is about spies? First, what we read when we are younger...themselves necessarily jumping off the cliff. Finally, the best teen fiction contains all the elements of good fiction for adults, including compelling...success of the quintessential espionage genre with his teen spy thriller Storm- breaker. Like any good thriller, the book begins with a hook: “When the
2013-05-16
major new institutes 1n neuroscience and genomic medicine; and redeveloped much of its campus. In 2007, Dr. Vest was elected to serve as president of...which is a hearing unto itself— ‘‘the largest transfer of wealth in history’’ as the Director of NSA has called cyber attacks against us. So when...Navy 47 Army 43 Govt. Contractor 42 Air Force - 23 CIA -15 State _.. 12 FBI .8 NSA .5 University Employee ~6 Marines 1114 DIA 1114 ~ DoD
2007-11-01
whether the latter are serving near or far in espionage missions. This experiment started on 6/25/1958. It involved telepathy , and it ended with a 70...Atlantic. Rather, a new kind ofweapon was used in this operation, namely parapsychology - by using a specialized diver and telepathy . (11-22... dream that a flame emerged from him, spread throughout the land, and started to bum everyone that had an encounter with it. He told of his dream to
Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense
NASA Astrophysics Data System (ADS)
Spafford, Eugene H.
The number and sophistication of cyberattacks continues to increase, but no national policy is in place to confront them. Critical systems need to be built on secure foundations, rather than the cheapest general-purpose platform. A program that combines education in cyber security, increasing resources for law enforcement, development of reliable systems for critical applications, and expanding research support in multiple areas of security and reliability is essential to combat risks that are far beyond the nuisances of spam email and viruses, and involve widespread espionage, theft, and attacks on essential services.
The Weldability of Heat-Resisting Alloys (N-102)
1945-12-05
Report on TiU „SLDAQIL1TY CF Hg*WM8|STIW *LLO* S (3-132) by A. L. FJSIU), F. K. 3L0O14, AND G. ft. LXiJHEftl "W«B inriM Aim STEKL CORPOrtAilON...document contain* information affecting the national defense of th« United States within the meaning of the Espionage Act, U. S C. 60; 31 and 32. Its...Stewart, executive Secretary, OoftD Copy ;:o. 8 - Clyde ..illiai.; s , Chief, .<ar Metallurgy Division (Div. lo), NDRC and Chairman, .iar Metallurgy
[open quotes]Sonya[close quotes] explains
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moss, N.
This article describes observations of Ruth Werner from when she was an agent of the Soviet espionage service (code name [open quotes]Sonya[close quotes]) as related in her interview with the author. The main topics covered in the interview include her opinion and relationship with Klaus Fuchs, the German-born British physicist who passed the secrets of the first atomic bomb to the Russians, and her views on German reunification. Ruth focuses her discussion on her dedication to making the world a better place and the disillusionment she has felt as she reminisces about her past.
Brainwashing, LSD, and CIA: historical and ethical perspective.
Buckman, J
1977-01-01
The history of various attempts at thought control and chemical warfare is briefly reviewed. Brainwashing, thought control, industrial and national espionage, and covert activities are becoming more sophisticated. These issues have been revived and accentuated by the Vietnam war, the Middle East Crisis, Watergate, the CIA investigations and the Patty Hearst trial. Historical perspective and the ethical implications of these activities are explored. It is suggested that there is a growing level of individual and international mistrust amounting to paranoia and complicating the issues of individual freedom, civil rights and human experimentation.
[Little known pages of the biography of Ia.V.Villie].
Budko, A A; Shabunin, A V; Zhuravlev, D A
2005-05-01
On the base of complex study of archival data and available historical literature the stories connected with Yakov Vasilyevich Villie are discussed. The exact date of his death is given, the causes of existing contradictions are presented. Villie's relations with representatives of our medicine are described. The authors also discuss the problem, which was touched in the middle of XX century, i. e. the Villie's charge of espionage. Together with famous works of Russian authors the materials of foreign investigators devoted to this problem are used.
NASA Astrophysics Data System (ADS)
Charbonneau, Rebecca
2018-01-01
Cold War mythology is rife with stories about secrecy, competition, espionage, and animosity. Yet the history behind the myth-- the overlooked scientists collaborating outside of the aims of the state-- also tells an interesting story. This paper examines the challenges of international scientific collaboration during the Cold War, focusing especially on a case study concerning Soviet radio astronomer Iosif Samuilovich Shklovskii and U.S. astrophysicist Carl Sagan, and their collaborative work on the search for extraterrestrial intelligence (SETI). Despite the hyper-politics that instigated and fueled the Space Race, SETI was held up as an ideal internationalist science, with the lofty goal of uniting all of humanity by situating it within a cosmic community. Although the internationalism of SETI discourse is not entirely unfounded due to its roots in international collaboration, further research indicates that such internationalism was in reality instilled with geopolitics, international conflict, and even espionage. That said, however, the cultural and philosophical perspectives of individual SETI scientists led them to operate within the tensions between national and ideological restraints and their own personal philosophical perspectives. In reviewing the letters of correspondence, conference proceedings, interviews, transcripts of lectures, and autobiographical writings of early-SETI radio astronomers, this paper ultimately argues that, although SETI was not the ideal internationalist science it was portrayed as, SETI pioneers were able to connect and form international networks within a contentious system which often centred on the restriction of free information and international collaboration through their mutual unconventional scientific interests, and facilitated by their personal utopian futurist philosophies.
Insider Alert 1.0 Beta Version
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abbott, Robert
2004-02-01
Insider Alert 1.0 Beta Version supports interactive selection and graphical display of data generated by the Sandia Cognitive Framework, which simulates the examination of security data by experts of various specialties. Insider Alert also encompasses the configuration and data files input to the Cognitive Framework for this application. Insider Alert 1.0 Beta Version is a computer program for analyzing data indicative of possible espionage or improper handling of data by employees at Sandia National Laboratories (or other facilities with comparable policies and procedures for managing sensitive information) It prioritizes and displays information for review by security analysts.
Intellectual property and information controversy (II)
NASA Astrophysics Data System (ADS)
Aoyama, Hirokazu
As advanced information has been proceeded rapidly, intellectual property has become more important than ever as business resources of enterprises. Based on the former report by the author "present status of and trend in intellectual property" this paper describes "information" related intellectual property controversy which have been occurred, that is, 1) affairs related to computer hardwares and softwares (the case of compatible machines and OS, the case of application softwares, computer crimes) and 2) affairs on trade secret (the case of revealing enterprises'secret, the case of industrial espionage). It also discusses how intellectual property should be protected and utilized from now on.
Russian scientists save American secrets
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sagdeev, R.
1993-05-01
Many have feared that the collapse of the Soviet Union has created new opportunities for would-be nuclear proliferators. Until recently, those dangers have seemed mainly theoretical. However, the former Soviet world was recently on the brink of breaching the Nuclear Non-Proliferation Treaty (NPT) from an unexpected corner -- the KGB. This article discusses the irony that a move to publicize Russia's files on early Soviet espionage activities in the United States would originate from the KGB. It is of note that a publication of such secrets could have been useful to countries currently trying to develop a basic nuclear bomb.
NASA Astrophysics Data System (ADS)
Hou, Chang-Yu; Shtengel, Kirill; Refael, Gil
2014-03-01
Can one transfer information encoded in Majorana modes between two distinct platforms? Or must one read out the information before transferring it to a new medium? We explore this question, and find that not only can information be transfered, but in some cases a fermionic occupation number can be stored non-locally by Majorana modes localized in two distinct p-wave superconductors with opposite chirality, as long as some tunneling contact between the two exists. This work is supported in part by the DARPA- QuEST program, NSF award DMR-0748925, the Packard foundation and the IQIM, an NSF center supported in part by the Moore fundation.
2014-12-01
SatelliteShortagesMayChokeOffMilitaryDroneExpansion.aspx; G. Ryan Faith and Mariel John , “Space Report 2011” in Authoritative Guide to Global Space Activity,” ed. Micah Walter-Range (Colorado Springs...Werner, “Cover Story”; John Walcott, “Chinese Espionage Campaign Targets U.S. Space Technology,” Bloomberg, 18 April 2012, http://www.bloomberg.com...frus1969-76v25.pdf; Walter J. Boyne , The Two O’Clock War: The 1973 Yom Kippur Conflict and the Airlift That Saved Israel, 1st ed. (New York: Thomas
Rubin, G James; Page, Lisa; Morgan, Oliver; Pinder, Richard J; Riley, Paul; Hatch, Stephani; Maguire, Helen; Catchpole, Mike; Simpson, John; Wessely, Simon
2007-12-01
To identify public perceptions of the risk to health after the poisoning of Alexander Litvinenko with polonium-210 (210Po) in London and to assess the impact of public health communications. Cross sectional telephone survey and qualitative interviews. London, United Kingdom. 1000 people completed the cross sectional survey and 86 potentially exposed people completed the qualitative interviews. Perception of risk to personal health after the 210Po incident. Qualitative interviews were analysed with an emphasis on information needs. 11.7% of the survey sample (n=117) perceived their health to be at risk. Aside from personal variables the main predictors of perceived risk to health were believing that the incident was related to terrorism (odds ratio 2.7, 95% confidence interval 1.5 to 4.6) rather than to espionage, that it was targeted at the wider public rather than one person (5.9, 3.2 to 10.9), and that it could affect people who had not been in the contaminated area (3.2, 2.1 to 5.1). Participants in the qualitative interviews were generally satisfied with the information they had received, although they would have preferred more information about their individual risk of exposure, the results of their urine tests, and the health implications of the incident. Perceptions of the public that the 210Po incident in London in 2006 was related to espionage helped to reassure them that the risks to personal health were low. In the event of future incidents it is important to ensure that detailed, comprehensible information about the risks of any exposure is available.
Page, Lisa; Morgan, Oliver; Pinder, Richard J; Riley, Paul; Hatch, Stephani; Maguire, Helen; Catchpole, Mike; Simpson, John; Wessely, Simon
2007-01-01
Objectives To identify public perceptions of the risk to health after the poisoning of Alexander Litvinenko with polonium-210 (210Po) in London and to assess the impact of public health communications. Design Cross sectional telephone survey and qualitative interviews. Setting London, United Kingdom. Participants 1000 people completed the cross sectional survey and 86 potentially exposed people completed the qualitative interviews. Main outcome measures Perception of risk to personal health after the 210Po incident. Qualitative interviews were analysed with an emphasis on information needs. Results 11.7% of the survey sample (n=117) perceived their health to be at risk. Aside from personal variables the main predictors of perceived risk to health were believing that the incident was related to terrorism (odds ratio 2.7, 95% confidence interval 1.5 to 4.6) rather than to espionage, that it was targeted at the wider public rather than one person (5.9, 3.2 to 10.9), and that it could affect people who had not been in the contaminated area (3.2, 2.1 to 5.1). Participants in the qualitative interviews were generally satisfied with the information they had received, although they would have preferred more information about their individual risk of exposure, the results of their urine tests, and the health implications of the incident. Conclusions Perceptions of the public that the 210Po incident in London in 2006 was related to espionage helped to reassure them that the risks to personal health were low. In the event of future incidents it is important to ensure that detailed, comprehensible information about the risks of any exposure is available. PMID:17975252
Computer Ethics and Cyber Laws to Mental Health Professionals
Raveesh, B N; Pande, Sanjay
2004-01-01
The explosive growth of computer and communications technology raises new legal and ethical challenges that reflect tensions between individual rights and societal needs. For instance, should cracking into a computer system be viewed as a petty prank, as trespassing, as theft, or as espionage? Should placing copyrighted material onto a public file server be treated as freedom of expression or as theft? Should ordinary communications be encrypted using codes that make it impossible for law-enforcement agencies to perform wiretaps? As we develop shared understandings and norms of behaviour, we are setting standards that will govern the information society for decades to come. PMID:21408035
Computer ethics and cyber laws to mental health professionals.
Raveesh, B N; Pande, Sanjay
2004-04-01
The explosive growth of computer and communications technology raises new legal and ethical challenges that reflect tensions between individual rights and societal needs. For instance, should cracking into a computer system be viewed as a petty prank, as trespassing, as theft, or as espionage? Should placing copyrighted material onto a public file server be treated as freedom of expression or as theft? Should ordinary communications be encrypted using codes that make it impossible for law-enforcement agencies to perform wiretaps? As we develop shared understandings and norms of behaviour, we are setting standards that will govern the information society for decades to come.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dingell, J.D.
1991-02-01
The Department of Energy's (DOE) Lawrence Livermore National Laboratory, located in Livermore, California, generates and controls large numbers of classified documents associated with the research and testing of nuclear weapons. Concern has been raised about the potential for espionage at the laboratory and the national security implications of classified documents being stolen. This paper determines the extent of missing classified documents at the laboratory and assesses the adequacy of accountability over classified documents in the laboratory's custody. Audit coverage was limited to the approximately 600,000 secret documents in the laboratory's custody. The adequacy of DOE's oversight of the laboratory's secretmore » document control program was also assessed.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cheeseman, R.J.
1987-04-01
The Warsaw Pact countries obtain U.S. technologies by legal and illegal means. Methods of collection include espionage, overt collection, acquisition by scientific and educational exchange participants, and illegal trade activities. Examples of methods used by the Warsaw Pact countries (except the USSR) are provided. The US faces barriers to preventing loss of its technologies. Among these are resistance from US business interests, insufficient cooperation between US government agencies and overseas allies, lack of US counterintelligence personnel, and the openess of American society. The study concludes that the Warsaw Pact's countries have narrowed NATO's qualitative lead in weaponry as a resultmore » of the Warsaw Pact's acquisition effort.« less
Subquantum information and computation
NASA Astrophysics Data System (ADS)
Valentini, Antony
2002-08-01
It is argued that immense physical resources -- for nonlocal communication, espionage, and exponentially-fast computation -- are hidden from us by quantum noise, and that this noise is not fundamental but merely a property of an equilibrium state in which the universe happens to be at the present time. It is suggested that `non-quantum' or nonequilibrium matter might exist today in the form of relic particles from the early universe. We describe how such matter could be detected and put to practical use. Nonequilibrium matter could be used to send instantaneous signals, to violate the uncertainty principle, to distinguish non-orthogonal quantum states without disturbing them, to eavesdrop on quantum key distribution, and to outpace quantum computation (solving NP-complete problems in polynomial time).
NASA Technical Reports Server (NTRS)
Denning, Peter J.
1989-01-01
Two new books about intrusions and computer viruses remind us that attacks against our computers on networks are the actions of human beings. Cliff Stoll's book about the hacker who spent a year, beginning in Aug. 1986, attempting to use the Lawrence Berkeley Computer as a stepping-stone for access to military secrets is a spy thriller that illustrates the weaknesses of our password systems and the difficulties in compiling evidence against a hacker engaged in espionage. Pamela Kane's book about viruses that attack IBM PC's shows that viruses are the modern version of the old problem of a Trojan horse attack. It discusses the most famous viruses and their countermeasures, and it comes with a floppy disk of utility programs that will disinfect your PC and thwart future attack.
Schizophrenic delusions in Seoul, Shanghai and Taipei: a transcultural study.
Kim, K.; Hwu, H.; Zhang, L. D.; Lu, M. K.; Park, K. K.; Hwang, T. J.; Kim, D.; Park, Y. C.
2001-01-01
In this transcultural study of schizophrenic delusions among patients in Seoul, Shanghai and Taipei, we discovered that both the frequency and content of delusions differed among the three groups; and that these differences could perhaps be explained by varying sociocultural and political situations. Delusional themes that are sensitive to sociocultural or political situations include guilt, love/sex, religion, somatic damage, economy/business and politics. Delusions regarding longevity, love/sex, dysmorphophobia/dysosmophobia, religion or supernatural matters, and espionage/spy stories were most frequent in Seoul patients. Those in Taipei predominantly had delusions about possession, religion or supernatural matters, hypnotism, and mass media/computers. Shanghai patients often had delusions of poisons, being prickled by poisoned needles, their brain and viscera extracted and being a family member of political authorities. PMID:11289407
Left-Wing Extremism: The Current Threat
DOE Office of Scientific and Technical Information (OSTI.GOV)
Karl A. Seger
2001-04-30
Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders frommore » that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.« less
Schizophrenic delusions in Seoul, Shanghai and Taipei: a transcultural study.
Kim, K; Hwu, H; Zhang, L D; Lu, M K; Park, K K; Hwang, T J; Kim, D; Park, Y C
2001-02-01
In this transcultural study of schizophrenic delusions among patients in Seoul, Shanghai and Taipei, we discovered that both the frequency and content of delusions differed among the three groups; and that these differences could perhaps be explained by varying sociocultural and political situations. Delusional themes that are sensitive to sociocultural or political situations include guilt, love/sex, religion, somatic damage, economy/business and politics. Delusions regarding longevity, love/sex, dysmorphophobia/dysosmophobia, religion or supernatural matters, and espionage/spy stories were most frequent in Seoul patients. Those in Taipei predominantly had delusions about possession, religion or supernatural matters, hypnotism, and mass media/computers. Shanghai patients often had delusions of poisons, being prickled by poisoned needles, their brain and viscera extracted and being a family member of political authorities.
Smallshaw, Joan E; Vitetta, Ellen S
2012-01-01
In this chapter we discuss vaccines to protect against the highly toxic plant-derived toxin, ricin. Due to its prevalence, ease of use, and stability it has been used in sporadic incidents of espionage. There is also concern that it will be used as an agent of bioterrorism. As a result there has been a great deal of interest in developing a safe vaccine or antidote to protect humans, and in particular soldiers and first responders. Although multiple types of vaccines have been tested, at this time two recombinant vaccines are the leading candidates for the national vaccine stockpile. In terms of passive post-exposure protection, monoclonal neutralizing antibodies that passively protect animals are also under development. These vaccines and antibodies are discussed in the context of the toxicity and structure of ricin.
Maneuverability and mobility in palm-sized legged robots
NASA Astrophysics Data System (ADS)
Kohut, Nicholas J.; Birkmeyer, Paul M.; Peterson, Kevin C.; Fearing, Ronald S.
2012-06-01
Palm sized legged robots show promise for military and civilian applications, including exploration of hazardous or difficult to reach places, search and rescue, espionage, and battlefield reconnaissance. However, they also face many technical obstacles, including- but not limited to- actuator performance, weight constraints, processing power, and power density. This paper presents an overview of several robots from the Biomimetic Millisystems Laboratory at UC Berkeley, including the OctoRoACH, a steerable, running legged robot capable of basic navigation and equipped with a camera and active tail; CLASH, a dynamic climbing robot; and BOLT, a hybrid crawling and flying robot. The paper also discusses, and presents some preliminary solutions to, the technical obstacles listed above plus issues such as robustness to unstructured environments, limited sensing and communication bandwidths, and system integration.
Security Management and Safeguards Office
NASA Technical Reports Server (NTRS)
Bewley, Nathaniel M.
2004-01-01
The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are in a safe environment.
Spy the Lie: Detecting Malicious Insiders
DOE Office of Scientific and Technical Information (OSTI.GOV)
Noonan, Christine F.
Insider threat is a hard problem. There is no ground truth, there are innumerable variables, and the data is sparse. The types of crimes and abuses associated with insider threats are significant; the most serious include espionage, sabotage, terrorism, embezzlement, extortion, bribery, and corruption. Malicious activities include an even broader range of exploits, such as negligent use of classified data, fraud, cybercrime, unauthorized access to sensitive information, and illicit communications with unauthorized recipients. Inadvertent action or inaction without malicious intent (e.g., disposing of sensitive documents incorrectly) can also cause harm to an organization. This review article will explore insider threat,more » specifically behaviors, beliefs, and current debates within the field. Additionally particular focus is given to deception, a significant behavioral component of the malicious insider. Finally, research and policy implications for law enforcement and the intelligence community are addressed.« less
Quick-fix proposals to reorganize Energy Department draw concern
NASA Astrophysics Data System (ADS)
Showstack, Randy
The crisis prompting the current call to restructure the U.S. Department of Energy could just as easily have been the agency's failures in managing major environmental cleanup projects or other management problems, say some DOE watchers. But the “crisis du jour” bringing pressure on the agency to change its mode of operations stems from recent alarming reports of national security lapses and Chinese espionage at DOE. Congress currently is considering a handful of separate bills that could restructure or even dismantle the agency. However, on July 12, a bipartisan group of seven key congressmen urged House of Representatives Speaker Dennis Hastert (R-Ill.) to oppose any hasty and haphazard efforts at reform, which they said needs careful, bipartisan legislation that brings about changes along with protection of national security, safety, health, and the environment.
Academic espionage: dysfunctional aspects of the publish or perish ethic.
Mensah, L L
1982-11-01
There are many dysfunctional manifestations relative to the tenure and promotion process. These are disruptive to academic life. Much of this is encouraged by the university because of their publish or perish ethic. Excellence in classroom teaching and success in the field of clinical and human endeavours are not highly valued in deliberations to grant tenure and advancement in academic rank. Research and publications are the major yardsticks upon which a faculty member is judged. This prevailing perspective poses a dilemma for many nursing faculty who have high clinical workloads and have not been socialized for academic survival. The pressures to publish and research can be achieved in a realistic and non-stressful way. Three aspects seem to be particularly relevant to facilitate this achievement; these are: anticipatory planning, balancing the workload, and understanding the interpersonal dimensions of collegiality.
POCIT portable optical communicators: VideoBeam and EtherBeam
NASA Astrophysics Data System (ADS)
Mecherle, G. Stephen; Holcomb, Terry L.
1999-12-01
LDSC is developing the POCITTM (Portable Optical Communication Integrated Transceiver) family of products which now includes VideoBeamTM and the latest addition, EtherBeamTM. Each is a full duplex portable laser communicator: VideoBeamTM providing near-broadcast- quality analog video and stereo audio, and EtherBeamTM providing standard Ethernet connectivity. Each POCITTM transceiver consists of a 3.5-pound unit with a binocular- type form factor, which can be manually pointed, tripod- mounted or gyro-stabilized. Both units have an operational range of over two miles (clear air) with excellent jam- resistance and low probability of interception characteristics. The transmission wavelength of 1550 nm enables Class I eyesafe operation (ANSI, IEC). The POCITTM units are ideally suited for numerous miliary scenarios, surveillance/espionage, industrial precious mineral exploration, and campus video teleconferencing applications.
Assessing the Macro-Level Correlates of Malware Infections Using a Routine Activities Framework.
Holt, Thomas J; Burruss, George W; Bossler, Adam M
2018-05-01
The ability to gain unauthorized access to computer systems to engage in espionage and data theft poses a massive threat to individuals worldwide. There has been minimal focus, however, on the role of malicious software, or malware, which can automate this process. This study examined the macro-correlates of malware infection at the national level by using an open repository of known malware infections and utilizing a routine activities framework. Negative inflated binomial models for counts indicated that nations with greater technological infrastructure, more political freedoms, and with less organized crime financial impact were more likely to report malware infections. The number of Computer Emergency Response Teams (CERTs) in a nation was not significantly related with reported malware infection. The implications of the study for the understanding of malware infection, routine activity theory, and target-hardening strategies are discussed.
Cavin, Susan
2006-07-01
The author conducted sociological interviews of 12 OSS spies (7 male, 5 female) who were operatives in France during World War II (WW II). The Office of Strategic Services (OSS) existed from 1941 to 1945 and was later renamed the CIA in 1947. This paper includes family studies of six close relatives of OSS vets and observation of 400 OSS veterans at the 50th anniversary of WW II. Three of the 12 OSS veterans who had been tortured by the Gestapo still suffered from PTSD-startle symptoms after 50 years; those three also suffered massive strokes in later life. The majority of OSS vets, regardless of gender, exhibited "war excitement" when talking about the war 50 years later. Most saw the war as the highpoint of their lives. War excitement needs more careful study within PTSD circles.
Inference or Enaction? The Impact of Genre on the Narrative Processing of Other Minds
Carney, James; Wlodarski, Rafael; Dunbar, Robin
2014-01-01
Do narratives shape how humans process other minds or do they presuppose an existing theory of mind? This study experimentally investigated this problem by assessing subject responses to systematic alterations in the genre, levels of intentionality, and linguistic complexity of narratives. It showed that the interaction of genre and intentionality level are crucial in determining how narratives are cognitively processed. Specifically, genres that deployed evolutionarily familiar scenarios (relationship stories) were rated as being higher in quality when levels of intentionality were increased; conversely, stories that lacked evolutionary familiarity (espionage stories) were rated as being lower in quality with increases in intentionality level. Overall, the study showed that narrative is not solely either the origin or the product of our intuitions about other minds; instead, different genres will have different—even opposite—effects on how we understand the mind states of others. PMID:25470279
Update on POCIT portable optical communicators: VideoBeam and EtherBeam
NASA Astrophysics Data System (ADS)
Mecherle, G. Stephen; Holcomb, Terry L.
2000-05-01
LDSC is developing the POCITTM (Portable Optical Communication Integrated Transceiver) family of products which includes VideoBeamTM and the latest addition, EtherBeamTM. Each is a full duplex portable laser communicator: VideoBeamTM providing near-broadcast- quality analog video and stereo audio, and EtherBeamTM providing standard Ethernet connectivity. Each POCITTM transceiver consists of a 3.5-pound unit with a binocular- type form factor, which can be manually pointed, tripod- mounted or gyro-stabilized. Both units have an operational range of over two miles (clear air) with excellent jam- resistance and low probability of interception characteristics. The transmission wavelength of 1550 nm enables Class 1 eyesafe operation (ANSI, IEC). The POCITTM units are ideally suited for numerous military scenarios, surveillance/espionage, industrial precious mineral exploration, and campus video teleconferencing applications. VideoBeam will be available second quarter 2000, followed by EtherBeam in third quarter 2000.
Inference or enaction? The impact of genre on the narrative processing of other minds.
Carney, James; Wlodarski, Rafael; Dunbar, Robin
2014-01-01
Do narratives shape how humans process other minds or do they presuppose an existing theory of mind? This study experimentally investigated this problem by assessing subject responses to systematic alterations in the genre, levels of intentionality, and linguistic complexity of narratives. It showed that the interaction of genre and intentionality level are crucial in determining how narratives are cognitively processed. Specifically, genres that deployed evolutionarily familiar scenarios (relationship stories) were rated as being higher in quality when levels of intentionality were increased; conversely, stories that lacked evolutionary familiarity (espionage stories) were rated as being lower in quality with increases in intentionality level. Overall, the study showed that narrative is not solely either the origin or the product of our intuitions about other minds; instead, different genres will have different-even opposite-effects on how we understand the mind states of others.
Modeling Human Behavior to Anticipate Insider Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.; Hohimer, Ryan E.
2011-06-09
The insider threat ranks among the most pressing cybersecurity challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach providesmore » automated support for the detection of high-risk behavioral “triggers” to help focus the analyst’s attention and inform the analysis. Designed to be domain independent, the system may be applied to many different threat and warning analysis/sensemaking problems.« less
The use of tags in monitoring limits on mobile missiles
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fetter, S.
1987-03-01
Three tagging systems were considered in this paper: as a supplement to on-site inspection (OSI), as a supplement to national technical means (NTM), and as a supplement to site surveillance systems. Each system would require a different type of tag, perhaps ranging from microchip tags with infrared transponders to navigation receivers. Use of tags as a supplement to OSIs may be the simplest system to implement because it places the least demands on technology. Tags may make OSI more acceptable by replacing humans with remote sensors, thereby decreasing the perceived potential for espionage. Using tags as a supplement to NTMmore » decreases the necessity for human OSI even further, but places higher demands on technology and may affect the normal operation of deployment areas. Site surveillance systems using tags have the potential for excellent missile verification, but they may be excessively intrusive and expensive, and could have a large effect on the normal operation of declared facilities.« less
LANL Safeguards and Security Assurance Program. Revision 6
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1995-04-03
The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impactsmore » on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms.« less
Shared signals and the potential for phylogenetic espionage between plants and animals.
Schultz, Jack C
2002-07-01
Until recently, the study and understanding of plant and animal signalling and response mechanisms have developed independently. Recent biochemical and molecular work is producing a growing list of elements involved in responses to biotic and abiotic stimuli that are very similar across kingdoms. Some of the more interesting examples of these include prostaglandin/octadecanoid-mediated responses to wounding, steroid-based signalling systems, and pathogen-recognition mechanisms. Some of these similarities probably represent evolutionary convergence; others may be ancestral to plants and animals. Ecological and evolutionary implications of such overlaps include the existence of pathogens that can cause disease in plants and animals, the ability of herbivores to manipulate plant responses, usurpation of microbial mechanisms and genes by herbivorous animals and plants, evolution of plant defenses exploiting shared signals in animals, and the medicinal use of plants by humans. Comparative study of the signalling and response mechanisms used by plants, animals, and microbes provides novel and useful insights to the ecology and evolution of interactions across kingdoms.
Advancing science diplomacy: Indonesia and the US Naval Medical Research Unit.
Smith, Frank L
2014-12-01
Science diplomacy supposedly builds international cooperation through scientific and technical exchange. In practice, however, there are important but often overlooked instances where it might create conflict instead--as with accusations of espionage surrounding the US Naval Medical Research Unit 2 (NAMRU-2) in Indonesia. Did American science diplomacy backfire in Indonesia and, if so, why? Most literature fails to anticipate this possibility, let alone explain it, since science diplomacy is rarely subject to critical analysis. Rather than shun politics or, similarly, simply blame the demise of NAMRU-2 on the military or avian influenza, I consider both the successes and failures of this research unit in the context of Indonesia's transition to democracy and America's legacy from the Cold War. Based on this history, I propose that the effects of science diplomacy depend on strategic communication and exchange, as well as elite influence and material incentives. Therefore, by challenging the conventional wisdom about science diplomacy, NAMRU-2 can help advance the theory and practice of this potentially useful tool of statecraft.
Biggest Radio-Telescope in Northern Europe, the RT-32 in Latvia
NASA Astrophysics Data System (ADS)
Monstein, Christian
2014-08-01
Hidden in the dense coastal forests of Slítere a mysterious ex-Soviet spy center is now used for science. Almost everyone including me who entered the site of the two large radio telescopes called Irbene, are amazed by the surrealistic atmosphere of the abandoned ghost town and two large radio dish antennas in the middle of nowhere. This article will tell more about this site; see also [1]. As the Cold War between the US and USSR entered the space age, the need for Space espionage led to the Soviets designing ways to track and decode signals from US satellites. The project began in 1967 when the remote areas of the Ventspils district were allocated for secret buildup of a site codenamed "Starlet". The location was chosen because of low population and dense forest areas of Slí;tere that also were part of the Soviet border zone - ensuring that no strangers could ever discover it.
NASA Astrophysics Data System (ADS)
Ignat, V.
2016-08-01
Advanced industrial countries are affected by technology theft. German industry annually loses more than 50 billion euros. The main causes are industrial espionage and fraudulent copying patents and industrial products. Many Asian countries are profiteering saving up to 65% of production costs. Most affected are small medium enterprises, who do not have sufficient economic power to assert themselves against some powerful countries. International organizations, such as Interpol and World Customs Organization - WCO - work together to combat international economic crime. Several methods of protection can be achieved by registering patents or specific technical methods for recognition of product originality. They have developed more suitable protection, like Hologram, magnetic stripe, barcode, CE marking, digital watermarks, DNA or Nano-technologies, security labels, radio frequency identification, micro color codes, matrix code, cryptographic encodings. The automotive industry has developed the method “Manufactures against Product Piracy”. A sticker on the package features original products and it uses a Data Matrix verifiable barcode. The code can be recorded with a smartphone camera. The smartphone is connected via Internet to a database, where the identification numbers of the original parts are stored.
U. S. statutes of general interest to safeguards and security officers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cadwell, J.J.
1988-01-01
A handbook of enforcement provisions of Federal law and regulations was prepared for use by U.S. DOE Security Inspectors. This handbook provides security inspectors for the U.S. Department of Energy, security officers at Nuclear Regulatory Licensee facilities, and others with a single document containing most of the Federal law provisions available to assist them in enforcing agency regulations. The handbook contains selected enforcement provisions of Titles 18, 42 and 50 of the United States Code (USC). Topical coverage of Title 18 includes Espionage and Misrepresentation or Impersonation; Theft and Embezzlement; Malicious Mischief; Conspiracy; Search and Seizure. A miscellaneous section dealsmore » with explosives, blackmail, firearms, and other subjects. Certain enforcement sections of Title 42 of the USC (The Atomic Energy Act) and of the Internal Security Act of the United States Code (Title 50) are also provided. Finally, relevant parts of the Federal Property Management Regulations of Title 50, Chapter 101 of the Code of Federal Regulations are presented. A comprehensive index is provided based on key words.« less
[The German-Jewish psychiatrist James Lewin. A twice forgotten victim].
Steinberg, H; Somburg, O; Boocock, G R B
2012-01-01
This study focuses on the life and psychiatric publications of James Lewin (1887-1937) who is a classic example of a person who has been forgotten in both the political and historical realms. His works are based on original and philosophical ideas of which this study investigates two in detail. On the one hand it examines Lewin's call for a psychopathology which describes the phenomenological basis and psychological structure of pathological states and experience regardless of the clinical evaluation of these states. On the other hand it explores his theory of situational psychoses as laid out in his MD thesis. For him this group of psychoses was to include prison psychoses and other psychogenic reactive psychoses that had been described shortly before. After World War I, Lewin worked for a long period as a neuropsychiatrist in his own practice in Berlin. However, as a Jew in Germany he faced increasing fascist oppression and emigrated to Soviet Russia in 1936. Yet, as archival sources show, he was put to death 1 year later within the framework of Stalin's purges, having been accused of conducting espionage on behalf of the Gestapo.
Low escape-rate genome safeguards with minimal molecular perturbation of Saccharomyces cerevisiae.
Agmon, Neta; Tang, Zuojian; Yang, Kun; Sutter, Ben; Ikushima, Shigehito; Cai, Yizhi; Caravelli, Katrina; Martin, James A; Sun, Xiaoji; Choi, Woo Jin; Zhang, Allen; Stracquadanio, Giovanni; Hao, Haiping; Tu, Benjamin P; Fenyo, David; Bader, Joel S; Boeke, Jef D
2017-02-21
As the use of synthetic biology both in industry and in academia grows, there is an increasing need to ensure biocontainment. There is growing interest in engineering bacterial- and yeast-based safeguard (SG) strains. First-generation SGs were based on metabolic auxotrophy; however, the risk of cross-feeding and the cost of growth-controlling nutrients led researchers to look for other avenues. Recent strategies include bacteria engineered to be dependent on nonnatural amino acids and yeast SG strains that have both transcriptional- and recombinational-based biocontainment. We describe improving yeast Saccharomyces cerevisiae -based transcriptional SG strains, which have near-WT fitness, the lowest possible escape rate, and nanomolar ligands controlling growth. We screened a library of essential genes, as well as the best-performing promoter and terminators, yielding the best SG strains in yeast. The best constructs were fine-tuned, resulting in two tightly controlled inducible systems. In addition, for potential use in the prevention of industrial espionage, we screened an array of possible "decoy molecules" that can be used to mask any proprietary supplement to the SG strain, with minimal effect on strain fitness.
Tamper-indicating seals : practices, problems, and standards
DOE Office of Scientific and Technical Information (OSTI.GOV)
Johnston, R. G.
2003-01-01
Tamper-indicating seals have been used by customs officials for over 7,000 years. Today, seals are widely used to help counter theft, smuggling, sabotage, vandalism, terrorism, and espionage. Despite their antiquity and modern widespread use, however, there remains considerable confusion about seals, as well as a lot of misconceptions, wishful thinking, sloppy terminology, and poor practice. The absence of meaningful norms and standards, together with the surprisingly limited amount of research and development (R&D) in the field of tamper detection, has also hindered the effective use of seals. The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory has intensively studiedmore » tamper-indicating seals for the last 12 years. We have engaged in vulnerability assessments, R&D, consulting, and training for over two dozen United States government agencies and private companies, as well as for the International Atomic Energy Agency (IAEA) and Euratom. The VAT has also analyzed over 200 different types of seals in detail. This paper summarizes some of our conclusions, recommendations, and warnings regarding seals and tamper detection.« less
After the data breach: Managing the crisis and mitigating the impact.
Brown, Hart S
2016-01-01
Historically, the unauthorised access and theft of information was a tactic used between countries as part of espionage campaigns, during times of conflict as well as for personal and criminal purposes. The consumers of the information were relatively isolated and specific. As information became stored and digitised in larger quantities in the 1980s the ability to access mass amounts of records at one time became possible. The expertise needed to remotely access and exfiltrate the data was not readily available and the number of markets to monetise the data was limited. Over the past ten years, shadow networks have been used by criminals to collaborate on hacking techniques, exchange hacking advice anonymously and commercialise data on the black market. The intersection of these networks along with the unintentional losses of information have resulted in 5,810 data breaches made public since 2005 (comprising some 847,807,830 records) and the velocity of these events is increasing. Organisations must be prepared for a potential breach event to maintain cyber resiliency. Proper management of a breach response can reduce response costs and can serve to mitigate potential reputational losses.
NASA Astrophysics Data System (ADS)
Richman, Barbara T.
Although ‘a substantial and serious technology transfer [to the Soviet Union] exists,’ open communication of federally funded research does not damage our national security, according to Dale R. Corson, president emeritus of Cornell University and chairman of the National Academy of Sciences' Panel on Scientific Communication and National Security. Corson characterized those technology transfers at a recent press conference on the panel's findings, which are summarized in their report, ‘Science Communications and National Security’ (Eos, October 5, p. 801).‘A net flow of products, processes, and ideas is continually moving from the United States and its allies to the Soviet Union, through both overt and covert means,’ Corson said. While some of this technology transfer has not compromised national security (‘in part because a technology in question had little or no military significance’), a ‘substantial portion of the transfer has been damaging to national security,’ Corson explained. The ‘damaging transfers’ occur through the ‘legal as well as illegal sale of products, through transfers via third countries, and through a highly organized espionage operation.’
Vulnerability of water supply systems to cyber-physical attacks
NASA Astrophysics Data System (ADS)
Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi
2016-04-01
The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.
Why can Taiwan utilize criminal law to discipline physicians?
Ger, Jiin
2009-04-01
Modern medicine was first introduced into Taiwan by missionary hospitals in 1865. However, Japanese governors following Japan's medical reform applied modern medicine as the standard of practice in the year 1896. They also imported 150 doctors from Japan to promote public hygiene and control infectious diseases, such as malaria, plague, cholera, dysentery, etc. The reasons that the Courts started to use criminal law to deal with medical malpractice during 1950-1960s may be attributed to the following: costly and ineffective civil actions, chaotic medical licensing, a period of upheaval during the 1947 massacre (228 incident), Chinese Civil War (1947-1949), political unrest, "White Terror" and "Espionage Act" during the period of martial law (1949-1987), social injustice and economic depression. The general environment for medical practice in Taiwan has changed greatly in the past 60years. It is time for us to look around the world to set up standards of negligence for both clinical and criminal cases as soon as possible. In the mean time, the Department of Health should consider adopting the Good Medical Practice guidelines from the United Kingdom to strengthen the administrative power to regulate physicians' behaviors.
Security systems engineering overview
NASA Astrophysics Data System (ADS)
Steele, Basil J.
1997-01-01
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.
Low escape-rate genome safeguards with minimal molecular perturbation of Saccharomyces cerevisiae
Agmon, Neta; Tang, Zuojian; Yang, Kun; Sutter, Ben; Ikushima, Shigehito; Cai, Yizhi; Caravelli, Katrina; Martin, James A.; Sun, Xiaoji; Choi, Woo Jin; Zhang, Allen; Stracquadanio, Giovanni; Hao, Haiping; Tu, Benjamin P.; Fenyo, David; Bader, Joel S.
2017-01-01
As the use of synthetic biology both in industry and in academia grows, there is an increasing need to ensure biocontainment. There is growing interest in engineering bacterial- and yeast-based safeguard (SG) strains. First-generation SGs were based on metabolic auxotrophy; however, the risk of cross-feeding and the cost of growth-controlling nutrients led researchers to look for other avenues. Recent strategies include bacteria engineered to be dependent on nonnatural amino acids and yeast SG strains that have both transcriptional- and recombinational-based biocontainment. We describe improving yeast Saccharomyces cerevisiae-based transcriptional SG strains, which have near-WT fitness, the lowest possible escape rate, and nanomolar ligands controlling growth. We screened a library of essential genes, as well as the best-performing promoter and terminators, yielding the best SG strains in yeast. The best constructs were fine-tuned, resulting in two tightly controlled inducible systems. In addition, for potential use in the prevention of industrial espionage, we screened an array of possible “decoy molecules” that can be used to mask any proprietary supplement to the SG strain, with minimal effect on strain fitness. PMID:28174266
Talmon, Y; Abrahams, A; Guy, N
1994-07-01
Disturbances of psychotic intensity resulting from external trauma at times of crisis and tension have been described in the literature, particularly in combat reactions, including the Saddam syndrome. Acute psychoses as reactions to mystical-religious fervor have also been described. We describe 2 clusters of patients admitted with an acute, delusional, psychotic picture against the background of the Vanunu treason trial and later the strong messianic expectations aroused among the followers of the Rebbe of Lubavitch. Both of these events received extensive coverage in the Israeli press and electronic telecommunication media. The emergence of the mental disturbances and the content of the psychoses were linked to the particularly strident and dramatic media coverage of these 2 events. The impact of the reports of wide-spread messianic fantasies in the contemporary news bulletins on those with preexisting premorbid sensitivity was sufficient to trigger the psychoses. The delusional content was topical, and not that of the traditional psychotic delusions such as that of being Napoleon. This emphasizes that not only an authentic major external trauma such as a war is capable of triggering psychosis, but also emotionladen, stressful news items, frequently repeated in the media (such as reports of espionage or messianic fervor), may have similar effects.
Confidentiality, electronic health records, and the clinician.
Graves, Stuart
2013-01-01
The advent of electronic health records (EHRs) to improve access and enable research in the everyday clinical world has simultaneously made medical information much more vulnerable to illicit, non-beneficent uses. This wealth of identified, aggregated data has and will attract attacks by domestic governments for surveillance and protection, foreign governments for espionage and sabotage, organized crime for illegal profits, and large corporations for "legal" profits. Against these powers with almost unlimited resources no security scheme is likely to prevail, so the design of such systems should include appropriate security measures. Unlike paper records, where the person maintaining and controlling the existence of the records also controls access to them, these two functions can be separated for EHRs. By giving physical control over access to individual records to their individual owners, the aggregate is dismantled, thereby protecting the nation's identified health information from large-scale data mining or tampering. Control over the existence and integrity of all the records--yet without the ability to examine their contents--would be left with larger institutions. This article discusses the implications of all of the above for the role of the clinician in assuring confidentiality (a cornerstone of clinical practice), for research and everyday practice, and for current security designs.
Axelrod, Robert; Iliev, Rumen
2014-01-28
Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran's nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide.
Kennedy, Jonathan
2017-10-01
This article investigates whether the United States' counterinsurgency operations have inhibited polio eradication efforts in northwestern Pakistan, the world's last major reservoir of polio. Anecdotal evidence suggests that militants disrupt polio vaccination programs because of suspicions that campaigns are a cover for gathering intelligence on Central Intelligence Agency (CIA) drone targets. This paper analyzes national-level quantitative data to test this argument. Between 2004 and 2012, the number of polio cases in Pakistan closely mirrored the number of drone strikes. But from 2013 onward, polio cases increased while drone strikes fell. This can be explained by the CIA's use of a fake immunization campaign in a failed attempt to obtain the DNA of Osama bin Laden's relatives prior to his assassination in 2011. This seemingly vindicated militants' suspicions that vaccination programs were a cover for espionage. Militants consequently intensified their disruption of immunization campaigns, resulting in an increase in polio cases in Pakistan, as well as in Afghanistan, Syria, and Iraq. For politicians and military planners, drones are attractive because they are said to harm fewer civilians than conventional methods of warfare. However, this paper demonstrates that drone strikes had negative effects on the well-being of civilians in Pakistan and further afield because they undermined global efforts to eradicate polio.
Axelrod, Robert; Iliev, Rumen
2014-01-01
Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran’s nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide. PMID:24474752
Optical field encryption for secure transmission of data
NASA Astrophysics Data System (ADS)
Fraser, Colin B.; Harvey, Andrew R.
2004-12-01
The growing awareness of the vulnerability of information transmitted on communication systems within the government, military and commercial sectors, has stimulated a number of areas of research within the optical community to design optical hardware encryption systems providing inherent immunity to espionage techniques. This paper describes a hardware optical encryption technique that utilises off the shelf telecommunication equipment and negates the necessity for an independent key distribution system with respect to the data transmission system, as is common with alternative encryption system implementations. This method also lends itself easily to fiber optic or free space communication and is applicable within any optical waveband. The encryption-decryption of the optical signal is achieved through low coherence optical interferometry. This requires the instantaneous processing and analysis of the signal, optically, to retrieve the relevant optical phase information hidden in the transmitted optical noise. This technology allows an authorised user to transmit encrypted information at a high data rate securely, while maintaining opaqueness to an unauthorised observer that data transmission is occurring. As the instantaneous optical field properties of the signals present in the system are essential to the optical encryption - decryption process, the system is inherently protected against electronic recording and advances in computational decryption algorithms. For organisations wishing to protect sensitive data and levels of communication activity these are highly desirable features.
Pathogen espionage: multiple bacterial adrenergic sensors eavesdrop on host communication systems.
Karavolos, Michail H; Winzer, Klaus; Williams, Paul; Khan, C M Anjam
2013-02-01
The interactions between bacterial pathogens and their eukaryotic hosts are vital in determining the outcome of infections. Bacterial pathogens employ molecular sensors to detect and facilitate adaptation to changes in their niche. The sensing of these extracellular signals enables the pathogen to navigate within mammalian hosts. Intercellular bacterial communication is facilitated by the production and sensing of autoinducer (AI) molecules via quorum sensing. More recently, AI-3 and the host neuroendocrine (NE) hormones adrenaline and noradrenaline were reported to display cross-talk for the activation of the same signalling pathways. Remarkably, there is increasing evidence to suggest that enteric bacteria sense and respond to the host NE stress hormones adrenaline and noradrenaline to modulate virulence. These responses can be inhibited by α and β-adrenergic receptor antagonists implying a bacterial receptor-based sensing and signalling cascade. In Escherichia coli O157:H7 and Salmonella, QseC has been proposed as the adrenergic receptor. Strikingly, there is an increasing body of evidence that not all the bacterial adrenergic responses require signalling through QseC. Here we provide additional hypotheses to reconcile these observations implicating the existence of alternative adrenergic receptors including BasS, QseE and CpxA and their associated signalling cascades with major roles in interkingdom communication. © 2012 Blackwell Publishing Ltd.
Passive and Active Vaccination Strategies to Prevent Ricin Poisoning
Pincus, Seth H.; Smallshaw, Joan E.; Song, Kejing; Berry, Jody; Vitetta, Ellen S.
2011-01-01
Ricin toxin (RT) is derived from castor beans, produced by the plant Ricinus communis. RT and its toxic A chain (RTA) have been used therapeutically to arm ligands that target disease-causing cells. In most cases these ligands are cell-binding monoclonal antibodies (MAbs). These ligand-toxin conjugates or immunotoxins (ITs) have shown success in clinical trials [1]. Ricin is also of concern in biodefense and has been classified by the CDC as a Class B biothreat. Virtually all reports of RT poisoning have been due to ingestion of castor beans, since they grow abundantly throughout the world and are readily available. RT is easily purified and stable, and is not difficult to weaponize. RT must be considered during any “white powder” incident and there have been documented cases of its use in espionage [2,3]. The clinical syndrome resulting from ricin intoxication is dependent upon the route of exposure. Countermeasures to prevent ricin poisoning are being developed and their use will depend upon whether military or civilian populations are at risk of exposure. In this review we will discuss ricin toxin, its cellular mode of action, the clinical syndromes that occur following exposure and the development of pre- and post-exposure approaches to prevent of intoxication. PMID:22069761
Passive and active vaccination strategies to prevent ricin poisoning.
Pincus, Seth H; Smallshaw, Joan E; Song, Kejing; Berry, Jody; Vitetta, Ellen S
2011-09-01
Ricin toxin (RT) is derived from castor beans, produced by the plant Ricinus communis. RT and its toxic A chain (RTA) have been used therapeutically to arm ligands that target disease-causing cells. In most cases these ligands are cell-binding monoclonal antibodies (MAbs). These ligand-toxin conjugates or immunotoxins (ITs) have shown success in clinical trials [1]. Ricin is also of concern in biodefense and has been classified by the CDC as a Class B biothreat. Virtually all reports of RT poisoning have been due to ingestion of castor beans, since they grow abundantly throughout the world and are readily available. RT is easily purified and stable, and is not difficult to weaponize. RT must be considered during any "white powder" incident and there have been documented cases of its use in espionage [2,3]. The clinical syndrome resulting from ricin intoxication is dependent upon the route of exposure. Countermeasures to prevent ricin poisoning are being developed and their use will depend upon whether military or civilian populations are at risk of exposure. In this review we will discuss ricin toxin, its cellular mode of action, the clinical syndromes that occur following exposure and the development of pre- and post-exposure approaches to prevent of intoxication.
Review of marine animals and bioinspired robotic vehicles: Classifications and characteristics
NASA Astrophysics Data System (ADS)
Zimmerman, S.; Abdelkefi, A.
2017-08-01
Marine robots are a developing topic for military, scientific, and environmental missions. However, most existing marine robots are either limited to flight or limited to swimming. Therefore, the combination of both provides endless possibilities for tasks, such as espionage, pollution and marine wildlife surveillance, and border protection. Applying bioinspiration and biomimetics not only camouflages the robot, but also increases the efficiency of already perfected designs. Because bioinspiration and aerial-aquatic locomotion are the main attraction for this article, this review gathers the characteristics of aerial-aquatic animals useful for such designs. These animals are diving birds and flying fish, specifically plunge-diving birds, surface-diving birds, both plunge- and surface-diving birds, two-winger flying fish, and four-winger flying fish. The overview of the current marine bioinspired and non-bioinspired robots that are both aerial and aquatic are also presented, followed by the limitations and recommendations of the bioinspired robots. It is shown by a comparison between the bioinspired robot and its corresponding animal that the existing robotic systems are not truly bioinspired. The main traits these systems are missing are replicating the exact weight, size, muscle movement, and skin texture of the biological animal. In order to have efficient robots, bioinspiration needs to be perfected. Doing so requires not only the basic design to be replicated, but every detail of the system to be imitated.
Security systems engineering overview
DOE Office of Scientific and Technical Information (OSTI.GOV)
Steele, B.J.
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, andmore » counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hochberg, J.G.; Jackson, K.A.; McClary, J.F.
1993-05-01
Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approachmore » to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hochberg, J.G.; Jackson, K.A.; McClary, J.F.
1993-01-01
Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approachmore » to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Low, M; Matthew02 Miller, M; Thomas Reilly, T
2007-04-30
Washington Safety Management Solutions (WSMS) provides criticality safety services to Washington Savannah River Company (WSRC) at the Savannah River Site. One activity at SRS is the Container Surveillance and Storage Capability (CSSC) Project, which will perform surveillances on 3013 containers (hereafter referred to as 3013s) to verify that they meet the Department of Energy (DOE) Standard (STD) 3013 for plutonium storage. The project will handle quantities of material that are greater than ANS/ANSI-8.1 single parameter mass limits, and thus required a Nuclear Criticality Safety Evaluation (NCSE). The WSMS methodology for conducting an NCSE is outlined in the WSMS methods manual.more » The WSMS methods manual currently follows the requirements of DOE-O-420.1B, DOE-STD-3007-2007, and the Washington Savannah River Company (WSRC) SCD-3 manual. DOE-STD-3007-2007 describes how a NCSE should be performed, while DOE-O-420.1B outlines the requirements for a Criticality Safety Program (CSP). The WSRC SCD-3 manual implements DOE requirements and ANS standards. NCSEs do not address the Nuclear Criticality Safety (NCS) of non-reactor nuclear facilities that may be affected by overt or covert activities of sabotage, espionage, terrorism or other security malevolence. Events which are beyond the Design Basis Accidents (DBAs) are outside the scope of a double contingency analysis.« less
Hitch-hiking parasitic wasp learns to exploit butterfly antiaphrodisiac
Huigens, Martinus E.; Pashalidou, Foteini G.; Qian, Ming-Hui; Bukovinszky, Tibor; Smid, Hans M.; van Loon, Joop J. A.; Dicke, Marcel; Fatouros, Nina E.
2009-01-01
Many insects possess a sexual communication system that is vulnerable to chemical espionage by parasitic wasps. We recently discovered that a hitch-hiking (H) egg parasitoid exploits the antiaphrodisiac pheromone benzyl cyanide (BC) of the Large Cabbage White butterfly Pieris brassicae. This pheromone is passed from male butterflies to females during mating to render them less attractive to conspecific males. When the tiny parasitic wasp Trichogramma brassicae detects the antiaphrodisiac, it rides on a mated female butterfly to a host plant and then parasitizes her freshly laid eggs. The present study demonstrates that a closely related generalist wasp, Trichogramma evanescens, exploits BC in a similar way, but only after learning. Interestingly, the wasp learns to associate an H response to the odors of a mated female P. brassicae butterfly with reinforcement by parasitizing freshly laid butterfly eggs. Behavioral assays, before which we specifically inhibited long-term memory (LTM) formation with a translation inhibitor, reveal that the wasp has formed protein synthesis-dependent LTM at 24 h after learning. To our knowledge, the combination of associatively learning to exploit the sexual communication system of a host and the formation of protein synthesis-dependent LTM after a single learning event has not been documented before. We expect it to be widespread in nature, because it is highly adaptive in many species of egg parasitoids. Our finding of the exploitation of an antiaphrodisiac by multiple species of parasitic wasps suggests its use by Pieris butterflies to be under strong selective pressure. PMID:19139416
Hitch-hiking parasitic wasp learns to exploit butterfly antiaphrodisiac.
Huigens, Martinus E; Pashalidou, Foteini G; Qian, Ming-Hui; Bukovinszky, Tibor; Smid, Hans M; van Loon, Joop J A; Dicke, Marcel; Fatouros, Nina E
2009-01-20
Many insects possess a sexual communication system that is vulnerable to chemical espionage by parasitic wasps. We recently discovered that a hitch-hiking (H) egg parasitoid exploits the antiaphrodisiac pheromone benzyl cyanide (BC) of the Large Cabbage White butterfly Pieris brassicae. This pheromone is passed from male butterflies to females during mating to render them less attractive to conspecific males. When the tiny parasitic wasp Trichogramma brassicae detects the antiaphrodisiac, it rides on a mated female butterfly to a host plant and then parasitizes her freshly laid eggs. The present study demonstrates that a closely related generalist wasp, Trichogramma evanescens, exploits BC in a similar way, but only after learning. Interestingly, the wasp learns to associate an H response to the odors of a mated female P. brassicae butterfly with reinforcement by parasitizing freshly laid butterfly eggs. Behavioral assays, before which we specifically inhibited long-term memory (LTM) formation with a translation inhibitor, reveal that the wasp has formed protein synthesis-dependent LTM at 24 h after learning. To our knowledge, the combination of associatively learning to exploit the sexual communication system of a host and the formation of protein synthesis-dependent LTM after a single learning event has not been documented before. We expect it to be widespread in nature, because it is highly adaptive in many species of egg parasitoids. Our finding of the exploitation of an antiaphrodisiac by multiple species of parasitic wasps suggests its use by Pieris butterflies to be under strong selective pressure.
Audit of the management and cost of the Department of Energy`s protective forces
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1994-07-01
The Department of Energy`s safeguards and security program is designed to provide appropriate, efficient, and effective protection of the Department`s nuclear weapons, nuclear materials, facilities, and classified information. These items must be protected against theft, sabotage, espionage, and terrorist activity, with continuing emphasis on protection against the insider threat. The purpose of the audit was to determine if protective forces were efficiently managed and appropriately sized in light of the changing missions and current budget constraints. The authors found that the cost of physical security at some sites had grown beyond those costs incurred when the site was in fullmore » production. This increase was due to a combination of factors, including concerns about the adequacy of physical security, reactions to the increase in terrorism in the early 1980s with the possibility of hostile attacks, and the selection of security system upgrades without adequate consideration of cost effectiveness. Ongoing projects to upgrade security systems were not promptly reassessed when missions changed and levels of protection were not determined in a way which considered the attractiveness of the material being protected. The authors also noted several opportunities for the Department to improve the operational efficiency of its protective force operations, including, eluminating overtime paid to officers prior to completion of the basic 40-hour workweek, paying hourly wages of unarmed guards which are commensurate with their duties, consolidating protective force units, transferring law enforcement duties to local law agencies, eliminating or reducing paid time to exercise, and standardizing supplies and equipment used by protective force members.« less
Value-Range Analysis of C Programs
NASA Astrophysics Data System (ADS)
Simon, Axel
In 1988, Robert T. Morris exploited a so-called buffer-overflow bug in finger (a dæmon whose job it is to return information on local users) to mount a denial-of-service attack on hundreds of VAX and Sun-3 computers [159]. He created what is nowadays called a worm; that is, a crafted stream of bytes that, when sent to a computer over the network, utilises a buffer-overflow bug in the software of that computer to execute code encoded in the byte stream. In the case of a worm, this code will send the very same byte stream to other computers on the network, thereby creating an avalanche of network traffic that ultimately renders the network and all computers involved in replicating the worm inaccessible. Besides duplicating themselves, worms can alter data on the host that they are running on. The most famous example in recent years was the MSBlaster32 worm, which altered the configuration database on many Microsoft Windows machines, thereby forcing the computers to reboot incessantly. Although this worm was rather benign, it caused huge damage to businesses who were unable to use their IT infrastructure for hours or even days after the appearance of the worm. A more malicious worm is certainly conceivable [187] due to the fact that worms are executed as part of a dæmon (also known as "service" on Windows machines) and thereby run at a privileged level, allowing access to any data stored on the remote computer. While the deletion of data presents a looming threat to valuable information, even more serious uses are espionage and theft, in particular because worms do not have to affect the running system and hence may be impossible to detect.
Mobile Transactional Modelling: From Concepts to Incremental Knowledge
NASA Astrophysics Data System (ADS)
Launders, Ivan; Polovina, Simon; Hill, Richard
In 1988, Robert T. Morris exploited a so-called buffer-overflow bug in finger (a dæmon whose job it is to return information on local users) to mount a denial-of-service attack on hundreds of VAX and Sun-3 computers [159]. He created what is nowadays called a worm; that is, a crafted stream of bytes that, when sent to a computer over the network, utilises a buffer-overflow bug in the software of that computer to execute code encoded in the byte stream. In the case of a worm, this code will send the very same byte stream to other computers on the network, thereby creating an avalanche of network traffic that ultimately renders the network and all computers involved in replicating the worm inaccessible. Besides duplicating themselves, worms can alter data on the host that they are running on. The most famous example in recent years was the MSBlaster32 worm, which altered the configuration database on many Microsoft Windows machines, thereby forcing the computers to reboot incessantly. Although this worm was rather benign, it caused huge damage to businesses who were unable to use their IT infrastructure for hours or even days after the appearance of the worm. A more malicious worm is certainly conceivable [187] due to the fact that worms are executed as part of a dæmon (also known as "service" on Windows machines) and thereby run at a privileged level, allowing access to any data stored on the remote computer. While the deletion of data presents a looming threat to valuable information, even more serious uses are espionage and theft, in particular because worms do not have to affect the running system and hence may be impossible to detect.
U-2 with fictitious NASA markings to support CIA cover story for pilot Gary Powers, shot down over S
NASA Technical Reports Server (NTRS)
1960-01-01
After Francis Gary Powers was shot down over the Soviet Union during a CIA spy flight on 1 May 1960, NASA issued a press release with a cover story about a U-2 conducting weather research that may have strayed off course after the pilot 'reported difficulties with his oxygen equipment.' To bolster the cover-up, a U-2 was quickly painted in NASA markings, with a fictitious NASA serial number, and put on display for the news media at the NASA Flight Research Center at Edwards Air Force Base on 6 May 1960. The next day, Soviet Premier Nikita Kruschev exposed the cover-up by revealing that the pilot had been captured, and espionage equipment had been recovered from the wreckage. 7 May 1956 - NACA Director Dr. Hugh L. Dryden issues a press release stating that U-2 aircraft are conducting weather research for NACA with Air Force support from Watertown, Nevada. 22 May 1956 - A second press release is issued with cover story for U-2 aircraft operating overseas. 1 May 1960 - Francis Gary Powers is shot down near Sverdlovsk. 6 May 1960 - U-2 with fictitious NASA serial number and NASA markings is shown to news media to bolster cover story of NASA weather research flights with U-2. 7 May 1960 - Soviet Premier Kruschev announces capture and confession of Powers. 1960 - Dr. Hugh L. Dryden tells senate committee that some 200 U-2 flights carrying NASA weather instrumentation have taken place since 1956. 2 April 1971 - NASA receives two U-2C aircraft for high-altitude research.
Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hernandez Jimenez, Jarilyn M; Chen, Qian; Nichols, Jeff A.
Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report bymore » Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.« less
NASA Technical Reports Server (NTRS)
Barnett, Traci M.
2004-01-01
Safety and security is very important at NASA. The Security Management and Safeguards Office goal is ensure safety and security for all NASA Lewis and Plum Brook Station visitors and workers. The office protects against theft, sabotage, malicious damage, espionage, and other threats or acts of violence. There are three types of security at NASA: physical, IT, and personnel. IT is concerned with sensitive and classified information and computers. Physical security includes the officers who check visitors and workers in and patrol the facility. Personnel security is concerned with background checks during hiring. During my internship, I met people from and gained knowledge about all three types of security. I primarily worked with Dr. Richard Soppet in physical security. During my experience with physical security, I observed and worked with many aspects of it. I attended various security meetings at both NASA Lewis and Plum Brook. The meetings were about homeland security and other improvements that will be made to both facilities. I also spent time with a locksmith. The locksmith makes copies of keys and unlocks doors for people who need them. I rode around in a security vehicle with an officer as he patrolled. I also observed the officer make a search of a visitor s vehicle. All visitors vehicles are searched upon entering NASA. I spent time and observed in the dispatch office. The officer answers calls and sends out officers when needed. The officer also monitors the security cameras. My primary task was completing an emergency response manual. This manual would assist local law enforcement and fire agencies in case of an emergency. The manual has pictures and descriptions of the buildings. It also contains the information about hazards inside of the buildings. This information will be very helpul to law enforcement so that when called upon during an emergency, they will not create an even bigger problem with collateral damage.
Kennedy, Jonathan; McKee, Martin; King, Lawrence
2015-09-30
There is widespread agreement that civil war obstructs efforts to eradicate polio. It is suggested that Islamist insurgents have a particularly negative effect on vaccination programmes, but this claim is controversial. We analyse cross-national data for the period 2003-14 using negative binomial regressions to investigate the relationship between Islamist and non-Islamist insurgency and the global distribution of polio. The dependent variable is the annual number of polio cases in a country according to the WHO. Insurgency is operationalized as armed conflict between the state and an insurgent organization resulting in ≥25 battle deaths per year according to the Uppsala Conflict Data Programme. Insurgencies are divided into Islamist and non-Islamist insurgencies. We control for other possible explanatory variables. Islamist insurgency did not have a significant positive relationship with polio throughout the whole period. But in the past few years - since the assassination of Osama bin Laden in 2011- Islamist insurgency has had a strong effect on where polio cases occur. The evidence for a relationship between non-Islamist insurgency and polio is less compelling and where there is a relationship it is either spurious or driven by ecological fallacy. Only particular forms of internal armed conflict - those prosecuted by Islamist insurgents - explain the current global distribution of polio. The variation over time in the relationship between Islamist insurgency and polio suggests that Islamist insurgent's hostility to polio vaccinations programmes is not the result of their theology, as the core tenets of Islam have not changed over the period of the study. Rather, our analysis indicates that it is a plausibly a reaction to the counterinsurgency strategies used against Islamist insurgents. The assassination of Osama bin Laden and the use of drone strikes seemingly vindicated Islamist insurgents' suspicions that immunization drives are a cover for espionage activities.
Insider Threat - Material Control and Accountability Mitigation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Powell, Danny H; Elwood Jr, Robert H; Roche, Charles T
2011-01-01
The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur bymore » an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with compensating mitigation can decrease the risk of an insider performing a malicious act without detection.« less
NASA Technical Reports Server (NTRS)
Branch, Drew Alexander
2014-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to communication among the military branches legionnaires. With advanced persistent threats (APTs) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated, patched and secured state in a launch control system environment. Attacks on critical systems are becoming more and more relevant and frequent. Nation states are hacking into critical networks that might control electrical power grids or water dams as well as carrying out advanced persistent threat (APTs) attacks on government entities. NASA, as an organization, must protect its self from attacks from all different types of attackers with different motives. Although the International Space Station was created, there is still competition between the different space programs. With that in mind, NASA might get attacked and breached for various reasons such as espionage or sabotage. My project will provide a way for NASA to complete an in house penetration test which includes: asset discovery, vulnerability scans, exploit vulnerabilities and also provide forensic information to harden systems. Completing penetration testing is a part of the compliance requirements of the Federal Information Security Act (FISMA) and NASA NPR 2810.1 and related NASA Handbooks. This project is to demonstrate how in house penetration testing can be conducted that will satisfy all of the compliance requirements of the National Institute of Standards and Technology (NIST), as outlined in FISMA. By the end of this project, I hope to have carried out the tasks stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, as well as policies and procedures.
Validating agent based models through virtual worlds.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lakkaraju, Kiran; Whetzel, Jonathan H.; Lee, Jina
As the US continues its vigilance against distributed, embedded threats, understanding the political and social structure of these groups becomes paramount for predicting and dis- rupting their attacks. Agent-based models (ABMs) serve as a powerful tool to study these groups. While the popularity of social network tools (e.g., Facebook, Twitter) has provided extensive communication data, there is a lack of ne-grained behavioral data with which to inform and validate existing ABMs. Virtual worlds, in particular massively multiplayer online games (MMOG), where large numbers of people interact within a complex environ- ment for long periods of time provide an alternative sourcemore » of data. These environments provide a rich social environment where players engage in a variety of activities observed between real-world groups: collaborating and/or competing with other groups, conducting battles for scarce resources, and trading in a market economy. Strategies employed by player groups surprisingly re ect those seen in present-day con icts, where players use diplomacy or espionage as their means for accomplishing their goals. In this project, we propose to address the need for ne-grained behavioral data by acquiring and analyzing game data a commercial MMOG, referred to within this report as Game X. The goals of this research were: (1) devising toolsets for analyzing virtual world data to better inform the rules that govern a social ABM and (2) exploring how virtual worlds could serve as a source of data to validate ABMs established for analogous real-world phenomena. During this research, we studied certain patterns of group behavior to compliment social modeling e orts where a signi cant lack of detailed examples of observed phenomena exists. This report outlines our work examining group behaviors that underly what we have termed the Expression-To-Action (E2A) problem: determining the changes in social contact that lead individuals/groups to engage in a particular behavior. Results from our work indicate that virtual worlds have the potential for serving as a proxy in allocating and populating behaviors that would be used within further agent-based modeling studies.« less
The truth will out: interrogative polygraphy ("lie detection") with event-related brain potentials.
Farwell, L A; Donchin, E
1991-09-01
The feasibility of using Event Related Brain Potentials (ERPs) in Interrogative Polygraphy ("Lie Detection") was tested by examining the effectiveness of the Guilty Knowledge Test designed by Farwell and Donchin (1986, 1988). The subject is assigned an arbitrary task requiring discrimination between experimenter-designated targets and other, irrelevant stimuli. A group of diagnostic items ("probes"), which to the unwitting are indistinguishable from the irrelevant items, are embedded among the irrelevant. For subjects who possess "guilty knowledge" these probes are distinct from the irrelevants and are likely to elicit a P300, thus revealing their possessing the special knowledge that allows them to differentiate the probes from the irrelevants. We report two experiments in which this paradigm was tested. In Experiment 1, 20 subjects participated in one of two mock espionage scenarios and were tested for their knowledge of both scenarios. All stimuli consisted of short phrases presented for 300 ms each at an interstimulus interval of 1550 ms. A set of items were designated as "targets" and appeared on 17% of the trials. Probes related to the scenarios also appeared on 17% of the trials. The rest of the items were irrelevants. Subjects responded by pressing one switch following targets, and the other following irrelevants (and, of course, probes). ERPs were recorded from FZ, CZ, and PZ. As predicted, targets elicited large P300s in all subjects. Probes associated with a given scenario elicited a P300 in subjects who participated in that scenario. A bootstrapping method was used to assess the quality of the decision for each subject. The algorithm declared the decision indeterminate in 12.5% of the cases. In all other cases a decision was made. There were no false positives and no false negatives: whenever a determination was made it was accurate. The second experiment was virtually identical to the first, with identical results, except that this time 4 subjects were tested, each of which had a minor brush with the law. Subjects were tested to determine whether they possessed information on their own "crimes." The results were as expected; the Guilty Knowledge Test determined correctly which subject possessed which information. The implications of these data both for the practice of Interrogative Polygraphy and the interpretation of the P300 are discussed.
Computer loss experience and predictions
NASA Astrophysics Data System (ADS)
Parker, Donn B.
1996-03-01
The types of losses organizations must anticipate have become more difficult to predict because of the eclectic nature of computers and the data communications and the decrease in news media reporting of computer-related losses as they become commonplace. Total business crime is conjectured to be decreasing in frequency and increasing in loss per case as a result of increasing computer use. Computer crimes are probably increasing, however, as their share of the decreasing business crime rate grows. Ultimately all business crime will involve computers in some way, and we could see a decline of both together. The important information security measures in high-loss business crime generally concern controls over authorized people engaged in unauthorized activities. Such controls include authentication of users, analysis of detailed audit records, unannounced audits, segregation of development and production systems and duties, shielding the viewing of screens, and security awareness and motivation controls in high-value transaction areas. Computer crimes that involve highly publicized intriguing computer misuse methods, such as privacy violations, radio frequency emanations eavesdropping, and computer viruses, have been reported in waves that periodically have saturated the news media during the past 20 years. We must be able to anticipate such highly publicized crimes and reduce the impact and embarrassment they cause. On the basis of our most recent experience, I propose nine new types of computer crime to be aware of: computer larceny (theft and burglary of small computers), automated hacking (use of computer programs to intrude), electronic data interchange fraud (business transaction fraud), Trojan bomb extortion and sabotage (code security inserted into others' systems that can be triggered to cause damage), LANarchy (unknown equipment in use), desktop forgery (computerized forgery and counterfeiting of documents), information anarchy (indiscriminate use of crypto without control), Internet abuse (antisocial use of data communications), and international industrial espionage (governments stealing business secrets). A wide variety of safeguards are necessary to deal with these new crimes. The most powerful controls include (1) carefully controlled use of cryptography and digital signatures with good key management and overriding business and government decryption capability and (2) use of tokens such as smart cards to increase the strength of secret passwords for authentication of computer users. Jewelry-type security for small computers--including registration of serial numbers and security inventorying of equipment, software, and connectivity--will be necessary. Other safeguards include automatic monitoring of computer use and detection of unusual activities, segmentation and filtering of networks, special paper and ink for documents, and reduction of paper documents. Finally, international cooperation of governments to create trusted environments for business is essential.
Overview of Scientific Freedom and National Security
NASA Astrophysics Data System (ADS)
Lerch, Irving
2000-04-01
The subject of our scrutiny is very much in the news, punctuated with nouns and modifiers both inflammatory and mundane such as espionage, justice, scientific accountability and scientific freedom. And while our discussion will focus on these issues, I want to raise some of the pragmatic questions that bear on the foundation of our support for international science. Beneath questions of guilt and the loss of secrets in the Wen Ho Lee case lay the inherent tension between the tradition of open exchange in the scientific enterprise and the need to protect the nation's security. How this balance is to be achieved in a democratic society has bedeviled us ever since the Manhattan project heralded the emergence of science and technology as instruments of great national power. If we do not find this balance, we run the risk of damaging some of the most important intellectual treasures that the US has produced the Department of Energy's national laboratories and the entire system that we call the international scientific enterprise. For while the superheated charges of lax security and criminal negligence have led some to call for ``firewalls" to isolate and protect the secrets in our weapons labs, such measures may have severe consequences for weapons and non-weapons labs alike and their many associated universities. It's estimated that from 70% to as much as 80% in the expansion of our economy is technology-driven, derived from the most productive system of scientific innovation in the world. This is also true of our national security. Science is indispensable to the development and maintenance of the nation's arsenals. The Department of Energy's Nuclear Stockpile Stewardship Program is central to the safety and reliability of American nuclear weapons and to our hope for a worldwide ban on nuclear tests. But this program will fail without a continuing intense development effort based on cutting-edge science. And a great deal of the science needed is being pursued in fundamental non-weapons-related research around the world. Science expresses the collective intelligence of humankind and it cannot be impounded by any nation. As is true of the world's economy, so is science global. Any impediment to the exchange of ideas serves only to isolate and degrade both international and domestic inquiry. We are faced with two important exigencies: we must safeguard our strategic secrets and maintain our scientific vigor. What we cannot do is permit fear and distrust to drive away our most productive scientists from the national labs and discourage the recruitment of the next generation of young, gifted scientists. We cannot tolerate the abuses of what our national security is designed to protect the Bill of Rights and our Constitutional guarantees. We cannot allow unthinking generalizations that place a cloud of suspicion over Americans and visitors from abroad simply because of their ethnicity. How we achieve this is the question at the core of this symposium.
Development and Demonstration of a Security Core Component
DOE Office of Scientific and Technical Information (OSTI.GOV)
Turke, Andy
In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more datamore » about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from “normal,” CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSM’s built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that “real world” training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipient’s SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.« less