Science.gov

Sample records for homeland security conference

  1. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  2. Homeland Security and Information.

    ERIC Educational Resources Information Center

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  3. U.S. Homeland Security R&D Budgets

    SciTech Connect

    Halvorson, C S

    2009-03-30

    The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.

  4. Homeland Security Technical Group update and a snapshot of Homeland Security research budgets

    NASA Astrophysics Data System (ADS)

    Saito, Theodore T.

    2006-05-01

    An overview of this conference (#6203) will include an overview of the program. A summary of the background and activities of SPIE's Global Homeland Security Technical Group, especially the Port and Harbor Security and Drinking Water Safety sub-committees will be included. Highlights and interesting aspects of the FY 06 & 07 Department of Homeland Security Budgets will be briefly discussed as well as the FY 07 Federal R&D budget focusing on Homeland Security.

  5. Homeland Security A Selected Bibliography

    DTIC Science & Technology

    2006-05-01

    Constructing Consensus: Homeland Security as a Symbol of Government Politics and Administration.” Government Information Quarterly 22 (2005): 152... Information Quarterly 21, no. 4 (2004): 420-438. Available from Wilson OmniFile. Relyea, Harold C. “Organizing for Homeland Security.” Presidential...169. Available from Wilson OmniFile. Relyea, Harold C. “Homeland Security and Information Sharing: Federal Policy Considerations.” Government

  6. Structuring Homeland Security

    DTIC Science & Technology

    2002-04-09

    20 AIRPORT SECURITY .............................................................................................. 20...using an existing command and control structure. Since September 11, 2001 airport security has been of heightened importance to the American public...In order to use Reserves to provide airport security the airports themselves should be made federal property. This would allow greater flexibility for

  7. 77 FR 55218 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-07

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of partially closed Federal Advisory Committee meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will...: Homeland Security Advisory Council, Department of Homeland Security, Mailstop 0450, 245 Murray Lane...

  8. 75 FR 26782 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-12

    ... No: 2010-11293] DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0039] Homeland Security Advisory... Committee Meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will meet via teleconference for the purpose of reviewing the final report of the HSAC's Quadrennial (Homeland Security)...

  9. 76 FR 58813 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-22

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of open teleconference Federal Advisory Committee meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will... message. Fax: (202) 282-9207 Mail: Homeland Security Advisory Council, Department of Homeland...

  10. 75 FR 59278 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-27

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of Closed Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will meet on... message. Fax: (202) 282-9207. Mail: Homeland Security Advisory Council, Department of Homeland...

  11. Homeland Security and Defense Applications

    SciTech Connect

    2014-11-06

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  12. Homeland Security and Defense Applications

    ScienceCinema

    None

    2016-07-12

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  13. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-02

    ... SECURITY Homeland Security Information Network Advisory Committee AGENCY: Department of Homeland Security... Applicants for Appointment to Homeland Security Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information...

  14. Changing Homeland Security: In 2010, Was Homeland Security Useful?

    DTIC Science & Technology

    2011-02-01

    noteworthy puzzle has given rise to a crisis.”22 September 11, 2001 was the initial crisis that opened the door to homeland security as a potential new...2010 scientists made a reasonable interpretation of the color of a dinosaur , created a synthetic self-replicating form of life, decoded another drug

  15. Homeland Security and Civil Liberties

    DTIC Science & Technology

    2004-06-01

    liberties, immigration policy, privacy issues, first amendment rights, and the balance of executive and judicial power in relation to civil liberties and...homeland security is extraordinarily complex with immigration policy, criminal law, privacy, First Amendment , and separation of powers dimensions

  16. Robotic systems for homeland security

    NASA Astrophysics Data System (ADS)

    Esser, Brian; Miller, Jon; Huston, Dryver R.; Bourn, Phil

    2004-07-01

    This paper will present the concept of utilizing various mobile robotic platforms for homeland security. Highly specialized mobile robots equipped with the proper sensors and data processing capabilities have the ability to provide security and surveillance for a wide variety of applications. Large infrastructure components, such as bridges, pipelines, dams, and electrical power grids pose severe challenges for monitoring, surveillance, and protection against man-made and natural hazards. The structures are enormous, often with awkward and dangerous configurations that make it difficult, if not impossible, for continuous human surveillance. Properly outfitted robots have the potential to provide long-term surveillance without requiring continuous human supervision. Furthermore, these robotic platforms can have disaster mitigation capabilities such as evaluation of infrastructure integrity at the disaster site. The results presented will include proof-of-concept robotic platforms equipped with various sensor arrays, as well as discussion of design criteria for numerous homeland security applications.

  17. 76 FR 55079 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-06

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of Open Teleconference Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will... subject line of the message. Fax: (202) 282-9207. Mail: Homeland Security Advisory Council, Department...

  18. 75 FR 2880 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-19

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Committee management; Notice of partially closed federal advisory committee meeting. SUMMARY: The Homeland Security Advisory.... E-mail: HSAC@dhs.gov . Fax: 202-282-9207. Mail: Homeland Security Advisory Council, 1100...

  19. 77 FR 26774 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of partially closed federal advisory committee meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will... number in the subject line of the message. Fax: (202) 282-9207. Mail: Homeland Security Advisory...

  20. 77 FR 64532 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-22

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of open teleconference Federal advisory committee meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will... in the subject line of the message. Fax: (202) 282-9207 Mail: Homeland Security Advisory...

  1. 77 FR 59627 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-28

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of open teleconference federal advisory committee meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will... line of the message. Fax: (202) 282-9207. Mail: Homeland Security Advisory Council, Department...

  2. 75 FR 53707 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-01

    ...-53708] [FR Doc No: 2010-21787] DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0074] Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of Open Teleconference Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will meet...

  3. 76 FR 4123 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-24

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of partially closed Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will... . Include docket number in the subject line of the message. Fax: (202) 282-9207 Mail: Homeland...

  4. 76 FR 27642 - Department of Homeland Security; Transfer of Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-12

    ... AGENCY Department of Homeland Security; Transfer of Data AGENCY: Environmental Protection Agency (EPA... of Homeland Security. The Department of Homeland Security will work with OPP pursuant to the Homeland Security Presidential Directives and the 2009 National Infrastructure Protection Plan. DATES:...

  5. Homeland Security: What Are the Advantages and Disadvantages of Different Local Homeland Security Organizational Structures?

    DTIC Science & Technology

    2015-06-01

    WHAT ARE THE ADVANTAGES AND DISADVANTAGES OF DIFFERENT LOCAL HOMELAND SECURITY ORGANIZATIONAL STRUCTURES? by William Mark Fitzpatrick...ADVANTAGES AND DISADVANTAGES OF DIFFERENT LOCAL HOMELAND SECURITY ORGANIZATIONAL STRUCTURES? 5. FUNDING NUMBERS 6. AUTHOR(S) William Mark Fitzpatrick 7...analyzed three homeland security organizational structures located within the Metro Atlanta, GA, area to find their advantages and disadvantages

  6. 77 FR 61421 - Committee Name: Homeland Security Academic Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-09

    ... SECURITY Committee Name: Homeland Security Academic Advisory Council AGENCY: Department of Homeland Security. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Academic Advisory Council (HSAAC) will meet on October 24, 2012 in Washington, DC. The...

  7. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-20

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: On April 12, 2010, the Homeland Security Science and Technology Advisory Committee announced in the... supplements that original meeting notice. DATES: The Homeland Security Science and Technology...

  8. Homeland Security. Management Challenges Facing Federal Leadership

    DTIC Science & Technology

    2002-12-01

    Security Management Challenges Facing Federal Leadership 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT... challenged in meeting dual or unrelated missions while maintaining and strengthening homeland security operations. Government organizational changes...including attention to management practices and key success factors. HOMELAND SECURITY Management Challenges Facing Federal Leadership www.gao.gov/cgi

  9. Homeland Security Intelligence: To What End

    DTIC Science & Technology

    2010-09-01

    45 a. Department of Homeland Security Information and Analysis Division...46 b. DHS Threat Analysis and Warning .......................................47 c. DHS Critical Infrastructure...Information and Analysis ITACG Interagency Threat Assessment Coordination Group FEMA Federal Emergency Management Agency NCTC National Counter

  10. Homeland Security: A Selected Bibliography

    DTIC Science & Technology

    2011-04-01

    Managing the U.S.-Mexico Border: Human Security and Technology. Houston: Rice University, James A. Baker III Institute for Public Policy, April 1...2009. 30pp. http://bakerinstitute.org/publications/LAI-pub-BorderSecBronkPayan- 040109.pdf Carafano, James Jay, et al. Thwarting Terrorists while...Mares. Developing the U.S.-Mexico Border Region for a Prosperous and Secure Relationship. Houston: Rice University, James A. Baker III Institute for

  11. Changing Homeland Security: Shape, Patterns, Not Programs

    DTIC Science & Technology

    2006-10-01

    Friedrich Wilhelm Nietzsche , Human, All Too Human (Stanford University Press, 2000). 3 The phrase “homeland security community” and the pronoun “we... Nietzsche wrote about this process: To make plans and project designs brings with it many good sensations; and whoever had the strength to be

  12. Department of Homeland Security Interoperable Communications Act

    THOMAS, 113th Congress

    Rep. Payne, Donald M., Jr. [D-NJ-10

    2014-03-24

    07/09/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  13. 77 FR 37912 - Committee Name: Homeland Security Academic Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-25

    ... SECURITY Committee Name: Homeland Security Academic Advisory Council AGENCY: Department of Homeland Security. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Academic Advisory Council (HSAAC) will meet on July 10, 2012 in Washington, DC. The meeting...

  14. 78 FR 14102 - Committee Name: Homeland Security Academic Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-04

    ... SECURITY Committee Name: Homeland Security Academic Advisory Council AGENCY: Department of Homeland Security. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Academic Advisory Council (HSAAC) will meet on March 20, 2013 in Washington, DC. The meeting...

  15. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Homeland Security Labor Relations Board. 9701.508 Section 9701.508 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security...

  16. 76 FR 56208 - Homeland Security Advisory Council, Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-12

    ... SECURITY Homeland Security Advisory Council, Correction AGENCY: The Office of Policy, DHS. ACTION: Notice... published a notice of meeting for the Homeland Security Advisory Council in the Federal Register on.... Becca Sharp, Executive Director, Homeland Security Advisory Council, DHS. BILLING CODE 9110-9M-P...

  17. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-15

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: The Homeland Security Science and Technology Advisory Committee will meet January 26-28, 2010, at the... public. DATES: The Homeland Security Science and Technology Advisory Committee will meet January 26,...

  18. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Homeland Security Labor Relations Board. 9701.508 Section 9701.508 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security...

  19. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Homeland Security Labor Relations Board. 9701.508 Section 9701.508 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security...

  20. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 3 2012-01-01 2012-01-01 false Homeland Security Labor Relations Board. 9701.508 Section 9701.508 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security...

  1. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 3 2014-01-01 2014-01-01 false Homeland Security Labor Relations Board. 9701.508 Section 9701.508 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security...

  2. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-13

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet July 20-21... will be partially closed to the public. DATES: The Homeland Security Science and Technology...

  3. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-12

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: The Homeland Security Science and Technology Advisory Committee will meet April 20-22, 2010 at the.... This meeting will be closed to the public. DATES: The Homeland Security Science and Technology...

  4. Ethical Decision-Making for Homeland Security

    DTIC Science & Technology

    2013-09-01

    take Palin’s suggestion a bit further, the disciplines in the homeland security enterprise could be considered specialties, much as medicine and law...professional status and best serving the public’s interest. Gaining professional status takes a long time. Medicine and law have been developing for centuries...the effort, such as law enforcement, the fire service, medicine , public health, the military, the private sector, and others, all have their

  5. Measuring the Foundation of Homeland Security

    DTIC Science & Technology

    2007-03-01

    Collaborative Capacity: An Innovative Strategy for Homeland Security Preparedness,” 15. 24 Jon R. Katzenbach and Douglas K. Smith, The Discipline of Teams (New...done.32 27 Katzenbach and Smith, The Discipline of Teams, 181. 28 Hocevar, et al., “Building...Forthcoming 2006. Katzenbach , Jon R., and Douglas K. Smith. The Discipline of Teams. New York: John Wiley & Sons, Inc., 2001. Larson, Carl E., and Frank

  6. A Joint Department of Homeland Security?

    DTIC Science & Technology

    2012-02-15

    Maxims of War, in BG Charles J. Dunlap, Jr., Neo-Strategicon: Modernized Principles of War for the 21st Century, in Air Command and Staff College...standardize equipment purchases or identify common mission requirements among components.” – DHS Inspector General Charles K. Edwards37 17 Examples of...45 Quoted in CDR Michael Day, Lt Col Charles Cody, and John Saxe, Developing Homeland Security

  7. A Homeland Security Net Assessment Needed Now!

    DTIC Science & Technology

    2015-12-01

    has long been considered an important tool for American national security strategists, and the Pentagon’s Office of Net Assessment is widely...focus on civil liberties and disaster preparedness. ✵ ✵ ✵ ✵ ✵ The concept of net assessment has long been considered an important tool for American...seen a few, mostly tentative calls for the use of net assessment tools in determining and weighing the threats to Amer- ica’s homeland security

  8. Exploring the Educational Needs of the Homeland Security Community

    ERIC Educational Resources Information Center

    France, Paul

    2012-01-01

    This study involved an evaluation of the subjective perspectives held by a panel of 16 homeland security subject matter experts to determine what the needs of the homeland security professional community are for educational programs. The researcher examined the knowledge, skills, and abilities deemed important in homeland security to determine…

  9. Radiation Detection for Homeland Security Applications

    NASA Astrophysics Data System (ADS)

    Ely, James

    2008-05-01

    In the past twenty years or so, there have been significant changes in the strategy and applications for homeland security. Recently there have been significant at deterring and interdicting terrorists and associated organizations. This is a shift in the normal paradigm of deterrence and surveillance of a nation and the `conventional' methods of warfare to the `unconventional' means that terrorist organizations resort to. With that shift comes the responsibility to monitor international borders for weapons of mass destruction, including radiological weapons. As a result, countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments at land, rail, air, and sea ports of entry in the US and in European and Asian countries. Radioactive signatures of concern include radiation dispersal devices (RDD), nuclear warheads, and special nuclear material (SNM). Radiation portal monitors (RPMs) are used as the main screening tool for vehicles and cargo at borders, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. This talk will present an overview of radiation detection equipment with emphasis on radiation portal monitors. In the US, the deployment of radiation detection equipment is being coordinated by the Domestic Nuclear Detection Office within the Department of Homeland Security, and a brief summary of the program will be covered. Challenges with current generation systems will be discussed as well as areas of investigation and opportunities for improvements. The next generation of radiation portal monitors is being produced under the Advanced Spectroscopic Portal program and will be available for deployment in the near future. Additional technologies, from commercially available to experimental, that provide additional information for radiation screening, such as density imaging equipment, will

  10. Metro Optical Networks for Homeland Security

    NASA Astrophysics Data System (ADS)

    Bechtel, James H.

    Metro optical networks provide an enticing opportunity for strengthening homeland security. Many existing and emerging fiber-optic networks can be adapted for enhanced security applications. Applications include airports, theme parks, sports venues, and border surveillance systems. Here real-time high-quality video and captured images can be collected, transported, processed, and stored for security applications. Video and data collection are important also at correctional facilities, courts, infrastructure (e.g., dams, bridges, railroads, reservoirs, power stations), and at military and other government locations. The scaling of DWDM-based networks allows vast amounts of data to be collected and transported including biometric features of individuals at security check points. Here applications will be discussed along with potential solutions and challenges. Examples of solutions to these problems are given. This includes a discussion of metropolitan aggregation platforms for voice, video, and data that are SONET compliant for use in SONET networks and the use of DWDM technology for scaling and transporting a variety of protocols. Element management software allows not only network status monitoring, but also provides optimized allocation of network resources through the use of optical switches or electrical cross connects.

  11. Muon Fluence Measurements for Homeland Security Applications

    SciTech Connect

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  12. A value model for evaluating homeland security decisions.

    PubMed

    Keeney, Ralph L; von Winterfeldt, Detlof

    2011-09-01

    One of the most challenging tasks of homeland security policymakers is to allocate their limited resources to reduce terrorism risks cost effectively. To accomplish this task, it is useful to develop a comprehensive set of homeland security objectives, metrics to measure each objective, a utility function, and value tradeoffs relevant for making homeland security investments. Together, these elements form a homeland security value model. This article develops a homeland security value model based on literature reviews, a survey, and experience with building value models. The purposes of the article are to motivate the use of a value model for homeland security decision making and to illustrate its use to assess terrorism risks, assess the benefits of countermeasures, and develop a severity index for terrorism attacks.

  13. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Homeland Security Compensation Committee. 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System §...

  14. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... SECURITY Homeland Security Information Network Advisory Committee (HSINAC) AGENCY: OPS/OCIO, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet on February 27th-28th, 2013 in Washington, DC....

  15. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Homeland Security Compensation Committee. 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System §...

  16. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 3 2012-01-01 2012-01-01 false Homeland Security Compensation Committee. 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System §...

  17. Detecting objects in radiographs for homeland security

    NASA Astrophysics Data System (ADS)

    Prasad, Lakshman; Snyder, Hans

    2005-05-01

    We present a general scheme for segmenting a radiographic image into polygons that correspond to visual features. This decomposition provides a vectorized representation that is a high-level description of the image. The polygons correspond to objects or object parts present in the image. This characterization of radiographs allows the direct application of several shape recognition algorithms to identify objects. In this paper we describe the use of constrained Delaunay triangulations as a uniform foundational tool to achieve multiple visual tasks, namely image segmentation, shape decomposition, and parts-based shape matching. Shape decomposition yields parts that serve as tokens representing local shape characteristics. Parts-based shape matching enables the recognition of objects in the presence of occlusions, which commonly occur in radiographs. The polygonal representation of image features affords the efficient design and application of sophisticated geometric filtering methods to detect large-scale structural properties of objects in images. Finally, the representation of radiographs via polygons results in significant reduction of image file sizes and permits the scalable graphical representation of images, along with annotations of detected objects, in the SVG (scalable vector graphics) format that is proposed by the world wide web consortium (W3C). This is a textual representation that can be compressed and encrypted for efficient and secure transmission of information over wireless channels and on the Internet. In particular, our methods described here provide an algorithmic framework for developing image analysis tools for screening cargo at ports of entry for homeland security.

  18. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... to provide options and/or recommendations for consideration by the Secretary or designee on...

  19. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... to provide options and/or recommendations for consideration by the Secretary or designee on...

  20. 75 FR 44800 - Notice of Meeting of the Homeland Security Information Network Advisory Committee, Tuesday...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-29

    ... SECURITY Notice of Meeting of the Homeland Security Information Network Advisory Committee, Tuesday, August... meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSINAC) will meet from... Homeland Security Information Network Advisory Committee is to identify issues and provide to...

  1. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-29

    ... SECURITY Committee Name: Homeland Security Information Network Advisory Committee (HSINAC) AGENCY... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Information Network... Homeland Security Information Network Advisory Committee (HSINAC) is an advisory body to the...

  2. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security... Security Administration-002 Transportation Security Threat Assessment System System of Records (May 19... Transportation Worker Identification Credentialing and other Transportation Security......

  3. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security Transportation Security Administration--002 Transportation Security Threat Assessment System System of Records AGENCY... accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to update and...

  4. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    ... SECURITY Privacy Act of 1974; Department of Homeland Security Transportation Security Administration--DHS/TSA-001 Transportation Security Enforcement Record System System of Records AGENCY: Privacy Office, Department of Homeland Security. ACTION: Notice of Privacy Act System of Records Update. SUMMARY:...

  5. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security.... The program is no longer in operation within the Transportation Security Administration and associated..., Privacy Policy and Compliance, TSA-36, Transportation Security Administration, 601 South 12th......

  6. Managing Materials and Wastes for Homeland Security Incidents

    EPA Pesticide Factsheets

    To provide information on waste management planning and preparedness before a homeland security incident, including preparing for the large amounts of waste that would need to be managed when an incident occurs, such as a large-scale natural disaster.

  7. Strengthening Homeland Security through Improved Foreign Language Capability

    DTIC Science & Technology

    2011-12-01

    attending the Russian Basic Course. In only a couple of cases did interpreters study non- Romance or Germanic languages prior to joining the...HOMELAND SECURITY THROUGH IMPROVED FOREIGN LANGUAGE CAPABILITY by Sean C. Stevens December 2011 Thesis Advisor: Erik Dahl Second Reader...AND DATES COVERED Master‘s Thesis 4. TITLE AND SUBTITLE Strengthening Homeland Security through Improved Foreign Language Capability 5. FUNDING

  8. 76 FR 34088 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-10

    ... Resilience Task Force. DATES: The HSAC conference call will take place from 1 p.m. to 2 p.m. E.D.T. on Monday... to review and approve the Community Resilience Task Force's report of findings and recommendations... conference call details and the Community Resilience Task Force's report will be provided to...

  9. Control and positioning surveillance sensor technologies for homeland security and homeland defense

    NASA Astrophysics Data System (ADS)

    Lutz, James R.; Cloud, Dan; Lareau, Andre; Bratton, Raymond; Harris, Rodney

    2004-09-01

    The tremendous demand for Homeland Defense and Homeland Security (HD/HS) equipment for all types of commercial, industrial, civic, government and military facilities has resulted in an explosion of new applications for pan and tilt positioners. This paper discusses the technology of high performance positioning equipment in conjunction with various sensor systems now being utilized for HD/HS applications, and how this equipment is becoming more critical to the success of the HD/HS mission.

  10. Department of Homeland Security Semiannual Regulatory Agenda

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-20

    ... Modification of the Aviation Security Infrastructure Fee (ASIF) (Market Share)........ 1652-AA43 Department of... Administration (TSA) 389. MODIFICATION OF THE AVIATION SECURITY INFRASTRUCTURE FEE (ASIF) (MARKET SHARE) Legal... method for apportioning the Aviation Security Infrastructure Fee (ASIF) among air carriers. The ASIF is...

  11. Science and Technology Challenges for Homeland Security

    SciTech Connect

    Murray, C A

    2006-03-24

    Preventing and protecting against catastrophic terrorism is a complex and dynamic challenge. Small groups or individuals can use advanced technology to cause massive destruction, and the rapid pace of technology and ease of information dissemination continually gives terrorists new tools. A 100% defense is not possible. It's a numbers problem--there are simply too many possible targets to protect and too many potential attack scenarios and adversaries to defend against. However, science and technology (S&T) is a powerful force multiplier for defense. We must use S&T to get ahead of the game by making terrorist attacks more difficult to execute, more likely to be interdicted, and less devastating in terms of casualties, economic damage, or lasting disruption. Several S&T areas have potential to significantly enhance homeland security efforts with regard to detecting radiation, pathogens, explosives, and chemical signatures of weapons activities. All of these areas require interdisciplinary research and development (R&D), and many critically depend on advances in materials science. For example, the science of nuclear signatures lies at the core of efforts to develop enhanced radiation detection and nuclear attribution capabilities. Current radiation detectors require cryogenic cooling and are too bulky and expensive. Novel signatures of nuclear decay, new detector materials that provide high resolution at ambient temperatures, and new imaging detectors are needed. Such technologies will improve our ability to detect and locate small, distant, or moving sources and to discriminate threat materials from legitimate sources. A more complete understanding of isotopic ratios via secondary ion mass spectrometry (SIMS), NanoSIMS, or yet-to-be-developed technologies is required to elucidate critical characteristics of nuclear materials (e.g., isotopics, age, reprocessing) in order to identify their source and route history. S&T challenges abound in the biodefense arena as

  12. 75 FR 20371 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-19

    ... Countering Violent Extremism Working Group. DATES: The HSAC conference call will take place from 4 p.m. to 5... publication 15 days prior to a meeting. The HSAC will meet to review the Countering Violent Extremism...

  13. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security... and programs. The Transportation Security Administration will rely upon Department of Homeland.../Transportation Security Administration (TSA)-009 General Legal Records (August 18, 2003, 68 FR 49496), which......

  14. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Security Administration--023 Workplace Violence Prevention Program System of Records AGENCY: Privacy Office..., ``Department of Homeland Security/Transportation Security Administration--023 Workplace Violence Prevention... and maintain records on their Workplace Violence Prevention Program. Additionally, the Department...

  15. A Department of Homeland Security Reserves (DHS-R): Simultaneously Protecting the Homeland While Alleviating the Increased DoD Role in Homeland Defense and Security

    DTIC Science & Technology

    2007-12-01

    tribuneedition.html accessed on May 12, 2007. 21 Personal Interview with Ellis Stanley, General Manager- Emergency Preparedness Department, City ...California Office of Homeland Security, the Los Angeles City and County office of Emergency Preparedness, the FEMA/USNORTHCOM liaison, Citizen Corps...Preparedness for LA City , who guided my research. I also met with Mr. Bill Carwile of FEMA and Mr. Charles Adams of DHS, whose homeland security

  16. 76 FR 81516 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ... Violent Extremism Domestically. Update on Border Security and Evolving Threats. US Coast Guard, Update on... domestic violent extremism. Providing this information to the public would provide terrorists with a...

  17. Homeland Security Department: FY2007 Appropriations

    DTIC Science & Technology

    2006-07-05

    American Energy Independence and Security Act of 2005, would have allowed oil well drilling in Alaska’s National Wildlife Refuge ( ANWR ). Division D...contained provisions that would have distributed the revenues from the ANWR drilling. Among the items that would have been funded with these revenues was...more than $1 billion in additional border security funding for DHS.138 After a contentious floor debate concerning the attachment of the ANWR

  18. 77 FR 12606 - Homeland Security Academic Advisory Council; Establishment and Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-01

    ... SECURITY Homeland Security Academic Advisory Council; Establishment and Meeting AGENCY: Department of Homeland Security. ACTION: Committee Management; Notice of Federal Advisory Committee Establishment and... Security Academic Advisory Council (HSAAC) is necessary and in the public interest in connection with...

  19. Communicating Homeland Security Threats: Government and Public Efforts

    DTIC Science & Technology

    2010-12-01

    further analyze public perception and involvement in homeland security, this research will continue beyond the evolution of the National Exercise Program...information continues to undermine the importance of threats to the homeland. Current research identifies a growing perception disparity relative to...localities, loss to tourism , and the indirect cost on the economy during a period of heightened threat level.”15 Yim also presents a perspective

  20. Does the Army Need a Homeland Security Skill Identifier?

    DTIC Science & Technology

    2011-06-10

    Chemical, Biological, Radiological, Nuclear, & High-Yield Explosive CGSC Command and General Staff College CT Counterterrorism DA Department of the...omitted from most illustrations of the interrelationship of HD and CS as it applies to HS. However, “Domestic CT operations 6 are considered part of...homeland security under the lead of Department of Homeland Security” (Department of Defense 2009a, xx) and “ CT is one of the core tasks of the US

  1. Homeland Security Department: FY2011 Appropriations

    DTIC Science & Technology

    2010-08-27

    administers several programs, including the BioWatch program, the National Biosurveillance Integration System (NBIS), and the department’s...coordination activities are implemented); the National Biosurveillance Integration Center; and the Rapidly Deployable Chemical Detection System.104...Acquisition 20 61 78 Radiation Portal Monitoring Program — 8 20 Securing the Cities 20 — 20 Human Portable Radiation Detection Systems — 53 38

  2. How Homeland Security Affects Spatial Information

    ERIC Educational Resources Information Center

    Zellmer, Linda

    2004-01-01

    A recent article in Security-Focus described the fact that several U.S. government buildings in Washington DC could no longer be clearly seen by people using MapQuest's aerial photo database. In addition, the photos of these buildings were altered at the Web sites wherein they are posted at the request of the U.S. Secret Service. This is an…

  3. Homeland Security Department: FY2009 Appropriations

    DTIC Science & Technology

    2009-03-04

    programs throughout DHS, and administers several of them, including the BioWatch program, the National Biosurveillance Integration System (NBIS...increase of $68 million for procurement of Advanced Spectroscopic Portals (ASPs) was partly offset by a decrease of $10 million for the Securing the...Nuclear Forensics Center, and $15 million for the Radiation Portal Monitoring Program. The House continued the prohibition on full-scale procurement

  4. Complacency: A Threat to Homeland Security

    DTIC Science & Technology

    2014-06-01

    operating procedure UK United Kingdom U.S. United States xi THIS PAGE INTENTIONALLY LEFT BLANK xii EXECUTIVE SUMMARY In the world of...Centre at the Business School of the University of Hertfordshire in the United Kingdom (UK), as he is probably considered the most influential in his...security mission. In an address to the Council on Foreign Relations, Janet Napolitano, Secretary for the United States (U.S.) Department of

  5. Germanium Detectors in Homeland Security at PNNL

    SciTech Connect

    Stave, Sean C.

    2015-05-01

    Neutron and gamma-ray detection is used for non-proliferation and national security applications. While lower energy resolution detectors such as NaI(Tl) have their place, high purity germanium (HPGe) also has a role to play. A detection with HPGe is often a characterization due to the very high energy resolution. However, HPGe crystals remain small and expensive leaving arrays of smaller crystals as an excellent solution. PNNL has developed two similar HPGe arrays for two very different applications. One array, the Multisensor Aerial Radiation Survey (MARS) detector is a fieldable array that has been tested on trucks, boats, and helicopters. The CASCADES HPGe array is an array designed to assay samples in a low background environment. The history of HPGe arrays at PNNL and the development of MARS and CASCADES will be detailed in this paper along with some of the other applications of HPGe at PNNL.

  6. Germanium detectors in homeland security at PNNL

    SciTech Connect

    Stave, S.

    2015-05-01

    Neutron and gamma-ray detection is used for non-proliferation and national security applications. While lower energy resolution detectors such as NaI(Tl) have their place, high purity germanium (HPGe) also has a role to play. A detection with HPGe is often a characterization due to the very high energy resolution. However, HPGe crystals remain small and expensive leaving arrays of smaller crystals as an excellent solution. PNNL has developed two similar HPGe arrays for two very different applications. One array, the Multisensor Aerial Radiation Survey (MARS) detector is a fieldable array that has been tested on trucks, boats, and helicopters. The CASCADES HPGe array is an array designed to assay samples in a low background environment. The history of HPGe arrays at PNNL and the development of MARS and CASCADES will be detailed in this paper along with some of the other applications of HPGe at PNNL.

  7. Germanium detectors in homeland security at PNNL

    DOE PAGES

    Stave, S.

    2015-05-01

    Neutron and gamma-ray detection is used for non-proliferation and national security applications. While lower energy resolution detectors such as NaI(Tl) have their place, high purity germanium (HPGe) also has a role to play. A detection with HPGe is often a characterization due to the very high energy resolution. However, HPGe crystals remain small and expensive leaving arrays of smaller crystals as an excellent solution. PNNL has developed two similar HPGe arrays for two very different applications. One array, the Multisensor Aerial Radiation Survey (MARS) detector is a fieldable array that has been tested on trucks, boats, and helicopters. The CASCADESmore » HPGe array is an array designed to assay samples in a low background environment. The history of HPGe arrays at PNNL and the development of MARS and CASCADES will be detailed in this paper along with some of the other applications of HPGe at PNNL.« less

  8. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security.../Transportation Security Administration- 019, Secure Flight Records (November 9, 2007, 72 FR 63711) to cover the..., Director, Privacy Policy and Compliance, TSA-36, Transportation Security Administration, 601......

  9. The Army National Guard; Operational Reserve or Homeland Security Force?

    DTIC Science & Technology

    2008-12-12

    General Staff College in partial fulfillment of the requirements for the degree MASTER OF MILITARY ART AND SCIENCE Homeland Security......instilling a lifetime of discipline, values and dedication. vi TABLE OF CONTENTS Page MASTER OF MILITARY ART AND SCIENCE THESIS APPROVAL PAGE

  10. Homeland Security and the Coast Guard: Postured for Technology Improvements

    DTIC Science & Technology

    2003-06-01

    14 Table 2. Required satellite imagery resolution to detect various maritime objects...invest in its future through technology. There is fertile ground in exploring satellite surveillance, directed-energy weapons, and a host of other...looking at satellites , primarily due to cost.20 This dismissal of satellites and what they can bring to the role of Maritime Homeland Security

  11. Homeland Security Cybersecurity Boots-on-the-Ground Act

    THOMAS, 113th Congress

    Rep. Clarke, Yvette D. [D-NY-9

    2013-09-17

    07/29/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  12. Public Health Specializations and Education Needs to Support Homeland Security

    DTIC Science & Technology

    2006-03-01

    their prime concern would be a biological event, be it bioterrorism, influenza or a superbug . Additional documentation of interviewee responses...homeland security? No Question 8. What are your greatest fears relating to public health and a terrorist event? Superbug 110

  13. Deciding Who Lives: Considered Risk Casualty Decisions in Homeland Security

    DTIC Science & Technology

    2008-12-01

    philosophy, theology, bioethics , and the military, etc. have examined principles that are involved in the concept of accepting loss of life and have...205 14. SUBJECT TERMS Considered Risk Casualty; Acceptable Losses; Bioethics ; Philosophy; Theology; Military; Homeland Security; Decision-making...under circumstances that bring this condition to the civilian population. Other disciplines such as philosophy, theology, bioethics , and the military

  14. Department of Homeland Security Component Privacy Officer Act of 2009

    THOMAS, 111th Congress

    Rep. Carney, Christopher P. [D-PA-10

    2009-03-19

    03/26/2009 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  15. United States Homeland Security and National Biometric Identification

    DTIC Science & Technology

    2002-04-09

    IMPORTANCE OF AMERICA’S FREEDOMS AND HOMELAND SECURITY: ................... 1 W HAT IS A BIO M ETRIC...2 W AYS/M EANS O F BIO M ETRICS...9 THE DEPARTMENT OF DEFENSE’S ROLE IN NATIONAL IDENTIFICATION AND BIO M ETRICS

  16. Homeland Security: Developing National Doctrine to Guide State Strategy Development

    DTIC Science & Technology

    2012-03-01

    reminders to stop procrastinating and newfound cooking skills, I not only would never have finished, I also may have starved. xvi THIS PAGE INTENTIONALLY...doctrine in developing a homeland security doctrine. There are limitations, however, in that the military model is a narrow view. To overcome this

  17. Emergency management and homeland security: Exploring the relationship.

    PubMed

    Kahan, Jerome H

    2015-01-01

    In the years after the 9/11 tragedy, the United States continues to face risks from all forms of major disasters, from potentially dangerous terrorist attacks to catastrophic acts of nature. Professionals in the fields of emergency management and homeland security have responsibilities for ensuring that all levels of government, urban areas and communities, nongovernmental organizations, businesses, and individual citizens are prepared to deal with such hazards though actions that reduce risks to lives and property. Regrettably, the overall efficiency and effectiveness of the nation's ability to deal with disasters is unnecessarily challenged by the absence of a common understanding on how these fields are related in the workforce and educational arenas. Complicating matters further is the fact that neither of these fields has developed agreed definitions. In many ways, homeland security and emergency management have come to represent two different worlds and cultures. These conditions can have a deleterious effect on preparedness planning for public and private stakeholders across the nation when coordinated responses among federal, state, and local activities are essential for dealing with consequential hazards. This article demonstrates that the fields of emergency management and homeland security share many responsibilities but are not identical in scope or skills. It argues that emergency management should be considered a critical subset of the far broader and more strategic field of homeland security. From analytically based conclusions, it recommends five steps that be taken to bring these fields closer together to benefit more from their synergist relationship as well as from their individual contributions.

  18. Homeland Security Strategic Research Action Plan 2012 - 2016

    EPA Pesticide Factsheets

    EPA’s Homeland Security research plan outline and how it will address science and technological gaps and improve the Agency’s ability to carry out its responsibilities associated with preparing for and responding to, terrorist attacks, and other disasters.

  19. Homeland Security Science and Technology Authorization Act of 2010

    THOMAS, 111th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2010-03-15

    07/21/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  20. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel... to update and reissue Department of Homeland Security/ALL--023 Personnel Security Management System... separate from Department of Homeland Security/ALL 026--Personal Identity Verification Management System...

  1. 77 FR 54835 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative [HSAR Case 2009-002...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-06

    ... SECURITY 48 CFR Part 3052 RIN 1601-AA28 Homeland Security Acquisition Regulation (HSAR); Revision... appropriate date of ``(SEP 2012)''. The final rule amended multiple sections of the Homeland Security... length of certain noncompetitive contracts entered into by the Department of Homeland Security...

  2. 78 FR 10623 - Privacy Act of 1974; Department of Homeland Security Immigration and Customs Enforcement-007...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-14

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security Immigration and... Office, Department of Homeland Security. ACTION: Notice of modification to existing Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security,...

  3. Water System Security and Resilience in Homeland Security Research

    EPA Pesticide Factsheets

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  4. Ergonomics issues in national identity card for homeland security.

    PubMed

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security.

  5. Creation of a Homeland Security Jail Information Model

    DTIC Science & Technology

    2012-03-01

    In contrast, law enforcement officers at a jail have a better gestalt understanding of homeland security threats and trends in the same...and my personal familiarity with each model. In his book Beyond the Two Disciplines of Scientific Psychology , Lee Cronbach claims that...muhajir.background/index.html Cronbach, L. J. (1975). Beyond the two disciplines of scientific psychology . Washington, D.C.: American Psychologist

  6. Federal-Tribal Government Collaboration in Homeland Security

    DTIC Science & Technology

    2007-09-01

    wide variety of national critical infrastructure. Dams, water impoundments and reservoirs, electrical generation plants, drinking water, and...Kalt and Singer point out, “did not and do not absorb the tribes into the United States; rather, the reverse is true. The treaties recognize and...identified as a point of need for effective homeland security actions, Kettl points out that without better collaboration between the state and local

  7. Homeland Security Research Improves the Nation's Ability to ...

    EPA Pesticide Factsheets

    Technical Brief Homeland Security (HS) Research develops data, tools, and technologies to minimize the impact of accidents, natural disasters, terrorist attacks, and other incidents that can result in toxic chemical, biological or radiological (CBR) contamination. HS Research develops ways to detect contamination, sampling strategies, sampling and analytical methods, cleanup methods, waste management approaches, exposure assessment methods, and decision support tools (including water system models). These contributions improve EPA’s response to a broad range of environmental disasters.

  8. Systems Analysis, Centers of Gravity and Homeland Security

    DTIC Science & Technology

    2011-02-25

    Research Project (Carlisle Barracks, PA: U.S. Army War College, January 2009), 1. 8 Warren S. Eller and Brian J. Gerber, "Contemplating the Role of...Research Service, 2010), 10, http://www.fas .org/sgp/crs/homesec/RL30153.pdf (accessed October 17, 2010). 45 Ibid., 27. 46 Eller and Gerber... Eller and Gerber, "Contemplating the Role of Precision," 43. 51 Ibid. 52 Department of Homeland Security, National Infrastructure Protection

  9. Top Ten Challenges Facing the Next Secretary of Homeland Security

    DTIC Science & Technology

    2008-09-11

    Principato President, Airports Council International-North America James A. “Jay” Rasulo Chairman, Walt Disney Parks and Resorts Keith Reinhard...must ensure that a similar effort, taking into account the unique nature of homeland security, provides the Nation with leaders for the future with...mechanisms to enhance “red team” thinking and capabilities among its leadership by incorporating programs that provide alternate world -views and build

  10. Predicting Weapon Effects for Defense and Homeland Security

    DTIC Science & Technology

    2014-06-01

    team is supporting the programs of today and pushing forward the technology development and validation that will make the programs of tomorrow ...survivability for defense and homeland security applications. They provide the United States with a strategic advantage today and, with sustained investment...blast-mitigating seats, IED blasts continue to be a major source of casualties today . Better solutions are needed, and modeling and simulation con

  11. Purdue University graduate certificate program in Veterinary Homeland Security.

    PubMed

    Amass, Sandra F; Blossom, Thaddaeus D; Ash, Marianne; McCay, Don; Mattix, Marc E

    2008-01-01

    Our nation lacks a critical mass of professionals trained to prevent and respond to food- and animal-related emergencies. Training veterinarians provides an immediate means of addressing this shortage of experts. Achievement of critical mass to effectively address animal-related emergencies is expedited by concurrent training of professionals and graduate students in related areas. Purdue University offers a Web-based Graduate Certificate in Veterinary Homeland Security to address this special area of need. The program is a collaborative effort among the Purdue University School of Veterinary Medicine, the Purdue Homeland Security Institute, the Indiana State Board of Animal Health, the Indiana State Police, and others with the overall goal of increasing capacity and preparedness to manage animal-related emergencies. Individuals with expertise in veterinary medicine, public health, animal science, or homeland security are encouraged to participate. The Web-based system allows courses to be delivered efficiently and effectively around the world and allows participants to continue their graduate education while maintaining full-time jobs. Participants enhance their understanding of natural and intentional threats to animal health, strengthen their skills in managing animal-health emergencies, and develop problem-solving expertise to become effective members of animal emergency response teams and of their communities. Students receive graduate credit from Purdue University that can be used toward the certificate and toward an advanced graduate degree. Currently, 70 participants from 28 states; Washington, DC; Singapore; and Bermuda are enrolled.

  12. A bill to amend the Homeland Security Act of 2002 to authorize the Securing the Cities Initiative of the Department of Homeland Security, and for other purposes.

    THOMAS, 111th Congress

    Sen. Gillibrand, Kirsten E. [D-NY

    2010-05-05

    05/05/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security Transportation Security Administration--006 Correspondence and Matters Tracking Records AGENCY: Privacy Office, DHS. ] ACTION: Notice to alter an existing Privacy Act system of records. SUMMARY: In accordance with...

  14. Application of Near-Space Passive Radar for Homeland Security

    NASA Astrophysics Data System (ADS)

    Wang, Wenqin

    2007-03-01

    To protect the homeland from terrorist attacks employing explosive devices, revolutionary advances across a wide range of technologies are required. Inspired by recent advances in near-space (defined as the region between 20 km and 100 km), this paper proposes a new passive radar system using opportunistic transmitter as an illuminator and near-space platform as a receiver. This concept differs substantially from current radars. This system can be operated as a passive bistatic or multistatic radar and hence largely immune to jamming. By placing the receiver in near-space platforms, many functions that are currently performed with satellites or airplanes could be performed much more cheaply and with much greater operational utility. These advantages make near-space passive attractive for a variety of applications, many of which fit well with the needs of homeland security. This paper details the role of near-space passive radar as sensor system that can support homeland security applications. The strengths and weakness of near-space passive radar, compared to current spaceborne and airborne radars, are detailed. The signal models and processing algorithms for near-space passive radar are provided. It is shown that the use of cost effective near-space platforms can provide the solutions that were previously thought to be out of reach to remote sensing and government customers.

  15. 76 FR 9034 - Privacy Act of 1974; Department of Homeland Security United States Citizenship and Immigration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-16

    ... Security (DHS) United States Citizenship and Immigration Services (USCIS) proposes to establish a new DHS... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security United States... Security system of records titled, ``Department of Homeland Security/ United States Citizenship...

  16. Health-based Provisional Advisory Levels (PALs) for Homeland Security

    SciTech Connect

    Adeshina, Femi; Sonich-Mullin, Synthia; Wood, Carol S

    2009-01-01

    In compliance with Homeland Security Presidential Directive No.8, the US EPA National Homeland Security Research Center, in collaboration with the Department of Energy, is developing health-based Provisional Advisory Levels (PALs) for priority toxic industrial chemicals, pesticides, and chemical warfare agents in air and drinking water. The PALs Program will provide exposure levels to assist emergency response decision-making, and to serve as criteria for determining re-use and re-entry into affected areas resulting from transport/storage accidents, natural disasters, and subversive activities. PALs are applicable at federal, state, and local levels, and are intended for use in homeland security efforts, public health, law enforcement, and emergency response, as well as decisions by water utilities, and national and regional EPA offices. PALS have not been promulgated nor have they been formally issued as regulatory guidance. They are intended to be used at the discretion of risk managers in emergency situations when site specific risk assessments are not available. Three levels (PAL 1, PAL 2, and PAL 3), distinguished by severity of toxic effects, are developed for 24-hour, 30-day, 90-day, and 2-year durations of potential drinking water and inhalation exposures for the general public. Draft PALs are evaluated both by an EPA working group, and an external multidisciplinary panel to ensure scientific credibility and wide acceptance. In this issue, we present background information on the PAL program, the methodology used in deriving PALs, and the technical support documents for the derivation of PALs for acrylonitrile, phosgene, hydrogen chloride, and hydrogen sulfide.

  17. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    DTIC Science & Technology

    2006-03-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and...urban homeland security strategies as generally inadequate and indicative of limited strategic planning processes. Comprehensive enterprise-wide homeland...and state and local stakeholders would promote a value innovation in strategic planning that will transform state and urban area homeland security strategies.

  18. Bayesian truthing and experimental validation in homeland security and defense

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Forrester, Thomas; Wang, Wenjian; Kostrzewski, Andrew; Pradhan, Ranjit

    2014-05-01

    In this paper we discuss relations between Bayesian Truthing (experimental validation), Bayesian statistics, and Binary Sensing in the context of selected Homeland Security and Intelligence, Surveillance, Reconnaissance (ISR) optical and nonoptical application scenarios. The basic Figure of Merit (FoM) is Positive Predictive Value (PPV), as well as false positives and false negatives. By using these simple binary statistics, we can analyze, classify, and evaluate a broad variety of events including: ISR; natural disasters; QC; and terrorism-related, GIS-related, law enforcement-related, and other C3I events.

  19. Overview of accelerators with potential use in homeland security

    DOE PAGES

    Garnett, Robert W.

    2015-01-01

    Quite a broad range of accelerators have been applied to solving many of the challenging problems related to homeland security and defense. These accelerator systems range from relatively small, simple, and compact, to large and complex, based on the specific application requirements. They have been used or proposed as sources of primary and secondary probe beams for applications such as radiography and to induce specific reactions that are key signatures for detecting conventional explosives or fissile material. A brief overview and description of these accelerator systems, their specifications, and application will be presented. Some recent technology trends will also bemore » discussed.« less

  20. Forensic and homeland security applications of modern portable Raman spectroscopy.

    PubMed

    Izake, Emad L

    2010-10-10

    Modern detection and identification of chemical and biological hazards within the forensic and homeland security contexts may well require conducting the analysis in field while adapting a non-contact approach to the hazard. Technological achievements on both surface and resonance enhancement Raman scattering re-developed Raman spectroscopy to become the most adaptable spectroscopy technique for stand-off and non-contact analysis of hazards. On the other hand, spatially offset Raman spectroscopy proved to be very valuable for non-invasive chemical analysis of hazards concealed within non-transparent containers and packaging.

  1. 76 FR 26738 - Privacy Act of 1974; Department of Homeland Security/United States Citizenship and Immigration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-09

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/United States... 1974, the Department of Homeland Security proposes to update and reissue a current Department of Homeland Security system of records titled ``Department of Homeland Security/United States Citizenship...

  2. Field-Capable Biodetection Devices for Homeland Security Missions

    SciTech Connect

    Dougherty, G M; Clague, D S; Miles, R R

    2007-04-05

    Biodetection instrumentation that is capable of functioning effectively outside the controlled laboratory environment is critical for the detection of health threats, and is a crucial technology for Health Security. Experience in bringing technologies from the basic research laboratory to integrated fieldable instruments suggests lessons for the engineering of these systems. This overview will cover several classes of such devices, with examples from systems developed for homeland security missions by Lawrence Livermore National Laboratory (LLNL). Recent trends suggest that front-end sample processing is becoming a critical performance-determining factor for many classes of fieldable biodetection devices. This paper introduces some results of a recent study that was undertaken to assess the requirements and potential technologies for next-generation integrated sample processing.

  3. 78 FR 34665 - Homeland Security Information Network Advisory Committee (HSINAC); Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-10

    ... SECURITY Homeland Security Information Network Advisory Committee (HSINAC); Meeting AGENCY: OPS/OCIO, DHS... Security Information Network Advisory Committee (HSINAC) will meet on Tuesday, June 25th, 2013 from 1 p.m...: http://www.dhs.gov/homeland-security-information-network-advisory-committee . There is a meeting...

  4. Wireless sensors and sensor networks for homeland security applications.

    PubMed

    Potyrailo, Radislav A; Nagraj, Nandini; Surman, Cheryl; Boudries, Hacene; Lai, Hanh; Slocik, Joseph M; Kelley-Loughnane, Nancy; Naik, Rajesh R

    2012-11-01

    New sensor technologies for homeland security applications must meet the key requirements of sensitivity to detect agents below risk levels, selectivity to provide minimal false-alarm rates, and response speed to operate in high throughput environments, such as airports, sea ports, and other public places. Chemical detection using existing sensor systems is facing a major challenge of selectivity. In this review, we provide a brief summary of chemical threats of homeland security importance; focus in detail on modern concepts in chemical sensing; examine the origins of the most significant unmet needs in existing chemical sensors; and, analyze opportunities, specific requirements, and challenges for wireless chemical sensors and wireless sensor networks (WSNs). We further review a new approach for selective chemical sensing that involves the combination of a sensing material that has different response mechanisms to different species of interest, with a transducer that has a multi-variable signal-transduction ability. This new selective chemical-sensing approach was realized using an attractive ubiquitous platform of battery-free passive radio-frequency identification (RFID) tags adapted for chemical sensing. We illustrate the performance of RFID sensors developed in measurements of toxic industrial materials, humidity-independent detection of toxic vapors, and detection of chemical-agent simulants, explosives, and strong oxidizers.

  5. Wireless sensors and sensor networks for homeland security applications

    PubMed Central

    Potyrailo, Radislav A.; Nagraj, Nandini; Surman, Cheryl; Boudries, Hacene; Lai, Hanh; Slocik, Joseph M.; Kelley-Loughnane, Nancy; Naik, Rajesh R.

    2012-01-01

    New sensor technologies for homeland security applications must meet the key requirements of sensitivity to detect agents below risk levels, selectivity to provide minimal false-alarm rates, and response speed to operate in high throughput environments, such as airports, sea ports, and other public places. Chemical detection using existing sensor systems is facing a major challenge of selectivity. In this review, we provide a brief summary of chemical threats of homeland security importance; focus in detail on modern concepts in chemical sensing; examine the origins of the most significant unmet needs in existing chemical sensors; and, analyze opportunities, specific requirements, and challenges for wireless chemical sensors and wireless sensor networks (WSNs). We further review a new approach for selective chemical sensing that involves the combination of a sensing material that has different response mechanisms to different species of interest, with a transducer that has a multi-variable signal-transduction ability. This new selective chemical-sensing approach was realized using an attractive ubiquitous platform of battery-free passive radio-frequency identification (RFID) tags adapted for chemical sensing. We illustrate the performance of RFID sensors developed in measurements of toxic industrial materials, humidity-independent detection of toxic vapors, and detection of chemical-agent simulants, explosives, and strong oxidizers. PMID:23175590

  6. 76 FR 42003 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-18

    ... of Homeland Security Transportation Security Administration--023 Workplace Violence Prevention...--023 Workplace Violence Prevention Program System of Records'' from certain provisions of the Privacy.../Transportation Security Administration--023 Workplace Violence Prevention Program System of Records'' from one...

  7. Chemical supply chain modeling for analysis of homeland security events

    SciTech Connect

    Ehlen, Mark A.; Sun, Amy C.; Pepple, Mark A.; Eidson, Eric D.; Jones, Brian S.

    2013-09-06

    The potential impacts of man-made and natural disasters on chemical plants, complexes, and supply chains are of great importance to homeland security. To be able to estimate these impacts, we developed an agent-based chemical supply chain model that includes: chemical plants with enterprise operations such as purchasing, production scheduling, and inventories; merchant chemical markets, and multi-modal chemical shipments. Large-scale simulations of chemical-plant activities and supply chain interactions, running on desktop computers, are used to estimate the scope and duration of disruptive-event impacts, and overall system resilience, based on the extent to which individual chemical plants can adjust their internal operations (e.g., production mixes and levels) versus their external interactions (market sales and purchases, and transportation routes and modes). As a result, to illustrate how the model estimates the impacts of a hurricane disruption, a simple example model centered on 1,4-butanediol is presented.

  8. Pulse-shape discrimination scintillators for homeland security applications

    NASA Astrophysics Data System (ADS)

    Ellis, Mark E.; Duroe, Kirk; Kendall, Paul A.

    2016-09-01

    An extensive programme of research has been conducted for scintillation liquids and plastics capable of neutron-gamma discrimination for deployment in future passive and active Homeland Security systems to provide protection against radiological and nuclear threats. The more established detection materials such as EJ-301 and EJ-309 are compared with novel materials such as EJ-299-33 and p-terphenyl. This research also explores the benefits that can be gained from improvements in the analogue-to-digital sampling rate and sample bit resolution. Results are presented on the Pulse Shape Discrimination performance of various detector and data acquisition combinations and how optimum configurations from these studies have been developed into field-ready detector arrays. Early results from application-specific experimental configurations of multi-element detector arrays are presented.

  9. Application of telecom planar lightwave circuits for homeland security sensing

    NASA Astrophysics Data System (ADS)

    Veldhuis, Gert J.; Elders, Job; van Weerden, Harm; Amersfoort, Martin

    2004-03-01

    Over the past decade, a massive effort has been made in the development of planar lightwave circuits (PLCs) for application in optical telecommunications. Major advances have been made, on both the technological and functional performance front. Highly sophisticated software tools that are used to tailor designs to required functional performance support these developments. In addition extensive know-how in the field of packaging, testing, and failure mode and effects analysis (FMEA) has been built up in the struggle for meeting the stringent Telcordia requirements that apply to telecom products. As an example, silica-on-silicon is now a mature technology available at several industrial foundries around the world, where, on the performance front, the arrayed-waveguide grating (AWG) has evolved into an off-the-shelf product. The field of optical chemical-biological (CB) sensors for homeland security application can greatly benefit from the advances as described above. In this paper we discuss the currently available technologies, device concepts, and modeling tools that have emerged from the telecommunications arena and that can effectively be applied to the field of homeland security. Using this profound telecom knowledge base, standard telecom components can readily be tailored for detecting CB agents. Designs for telecom components aim at complete isolation from the environment to exclude impact of environmental parameters on optical performance. For sensing applications, the optical path must be exposed to the measurand, in this area additional development is required beyond what has already been achieved in telecom development. We have tackled this problem, and are now in a position to apply standard telecom components for CB sensing. As an example, the application of an AWG as a refractometer is demonstrated, and its performance evaluated.

  10. Health-based Provisional Advisory Levels (PALs) for homeland security.

    PubMed

    Adeshina, Femi; Sonich-Mullin, Cynthia; Ross, Robert H; Wood, Carol S

    2009-12-01

    The Homeland Security Presidential Directive #8 (HSPD-8) for National Emergency Preparedness was issued to " establish policies to strengthen the preparedness of the United States to prevent and respond to threatened or actual domestic terrorist attacks, major disasters, and other emergencies by requiring a national domestic all- hazards preparedness goal. "In response to HSPD-8 and HSPD-22 (classified) on Domestic Chemical Defense, the US Environmental Protection Agency (US EPA) National Homeland Security Research Center (NHSRC) is developing health-based Provisional Advisory Levels (PALs) for priority chemicals (including chemical warfare agents, pesticides, and toxic industrial chemicals) in air and drinking water. PALs are temporary values that will neither be promulgated, nor be formally issued as regulatory guidance. They are intended to be used at the discretion of risk managers in emergency situations. The PAL Program provides advisory exposure levels for chemical agents to assist in emergency planning and response decision-making, and to aid in making informed risk management decisions for evacuation, temporary re-entry into affected areas, and resumed-use of infrastructure, such as water resources. These risk management decisions may be made at the federal, state, and local levels. Three exposure levels (PAL 1, PAL 2, and PAL 3), distinguished by severity of toxic effects, are developed for 24-hour, 30-day, 90-day, and 2-year durations for potential exposure to drinking water and ambient air by the general public. Developed PALs are evaluated both by a US EPA working group, and an external multidisciplinary panel to ensure scientific credibility and wide acceptance. In this Special Issue publication, we present background information on the PAL program, the methodology used in deriving PALs, and the technical support documents for the derivation of PALs for acrylonitrile, hydrogen sulfide, and phosgene.

  11. 76 FR 5603 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-01

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security Office of Operations... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security is giving notice...

  12. Remodeling: A Way to Strengthen the Department of Homeland Security Internal Management and Partnering Capability

    DTIC Science & Technology

    2013-05-24

    Future of Homeland Security,” FDCH Congressional Testimony (July 12, 2012): Military & Government Collection, EBSCOhost , 2, (accessed July 31, 2012...Government Collection, EBSCOhost , 1, (accessed July 31, 2012). 12 U.S. Department of Homeland Security, Department of Homeland Security Strategic Plan...Department’s Roles/Missions,” FDCH Political Transcripts (n.d.): Military & Government Collection, EBSCOhost , 8, (accessed July 31, 2012). 14 Don Harvey and

  13. Wearable high-tech gear for homeland security personnel

    NASA Astrophysics Data System (ADS)

    Venkateswarlu, Ronda; Hui Wei, Choo; Li Lian, Ngiam; Lim, E. T.; Zhu, Zijian; Yang, Mingjiang

    2006-05-01

    Recent homeland security problems in various countries indicate that fixed surveillance systems at important places are not adequate enough. As the security threats take new dimensions in future, mobile smart security personnel wearing high-tech gear will form the basic infrastructure. See first, listen first, detect first, track first, communicate first with peers, assess the threat and coordinate with security head-quarters are the functions of high-tech gear. This paper proposes a high-tech gear involving (i) hands-free and obtrusion-free textile-based wearable microphone array to capture users voice and interface with body-worn computer, (ii) microphone arrays embedded in textiles to listen and record others voices from a distance, (iii) miniature cameras embedded in the shirt to provide the user with omni vision (iv) wireless personal display as GUI hidden in textile or natural glasses, (v) GPS and body area network for positional awareness for information in the form of text or textile integrated, (vi) reconfigurable HW/SW for all the above functions configured in the form of a usual belt. The main focus of this paper is how to configure the high-tech gear with all these sophisticated functions to disappear into the natural wearables of the user giving him normal look in the public. This project is sponsored by Defence Science & Technology Agency, Ministry of Defence, Singapore. This paper covers multi-discipline technologies at system level, hence not possible to go into details of any subsystem. The main objective of this paper is to share our thoughts and get feedback. Progress and some critical design issues are discussed in this paper.

  14. Beyond Measure: New Approaches to Analyzing Congressional Oversight of Homeland Security

    DTIC Science & Technology

    2015-03-01

    15 B . SECONDARY SOURCES ............................................................................18 III. HOMELAND SECURITY OVERSIGHT...BACKGROUND ................................21 A. CONCEPT OF OVERSIGHT ......................................................................21 B ...36 B . HURRICANE KATRINA OVERSIGHT ....................................................40 1. Agency Interaction

  15. 75 FR 74050 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-30

    ... include: Cybersecurity best practices, ISP network protection practices, transition to NG9-1-1, technical..., Associate Chief for Cybersecurity and Communications Reliability Public Safety and Homeland Security...

  16. To amend the Homeland Security Act of 2002 to authorize the Securing the Cities Initiative of the Department of Homeland Security, and for other purposes.

    THOMAS, 111th Congress

    Rep. King, Peter T. [R-NY-3

    2009-05-21

    01/21/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  17. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    DTIC Science & Technology

    2015-09-01

    seem too complex to understand so policy makers do not make any decisions to change for fear of adverse impacts. Current policies often lean towards ...ES, HS, and NS because I want to understand how they affect one another in order to improve homeland security policy development and decision making ...happens when countries are not able to make political decisions because of economic encumbrances? In “Genuine National Security: A People’s

  18. 78 FR 35295 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-12

    ... SECURITY Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity Education Office (CEO) National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog (Training Catalog) Collection AGENCY: Cybersecurity Education Office,...

  19. 78 FR 57643 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-19

    ... SECURITY Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity Education Office (CEO) National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog (Training Catalog) Collection AGENCY: Cybersecurity Education Office,...

  20. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-13

    ... also advises the Under Secretary on policies, management processes, and organizational constructs as... SECURITY Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC) ACTION: Committee Management; Notice of Federal advisory committee charter renewal. SUMMARY: The Secretary...

  1. Community-Oriented Counterterrorism: Incorporating National Homeland Security Mandates into the Local Community Policing Philosophy

    DTIC Science & Technology

    2014-12-01

    policing programs in order to meet new homeland secmity responsibilities. With this in mind , the cw1·ent study set out to answer the question: Do newly...With this in mind , the current study set out to answer the question: Do newly acquired homeland security responsibilities require police agencies to...the larger scheme. With this in mind , the current study set out to answer the question: Do newly acquired homeland security responsibilities require

  2. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    ERIC Educational Resources Information Center

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  3. Communicating Health Risks under Pressure: Homeland Security Applications

    SciTech Connect

    Garrahan, K.G.; Collie, S.L.

    2006-07-01

    The U.S. Environmental Protection Agency's (EPA) Office of Research and Development (ORD) Threat and Consequence Assessment Division (TCAD) within the National Homeland Security Research Center (NHSRC) has developed a tool for rapid communication of health risks and likelihood of exposure in preparation for terrorist incidents. The Emergency Consequence Assessment Tool (ECAT) is a secure web-based tool designed to make risk assessment and consequence management faster and easier for high priority terrorist threat scenarios. ECAT has been designed to function as 'defensive play-book' for health advisors, first responders, and decision-makers by presenting a series of evaluation templates for priority scenarios that can be modified for site-specific applications. Perhaps most importantly, the risk communication aspect is considered prior to an actual release event, so that management or legal advisors can concur on general risk communication content in preparation for press releases that can be anticipated in case of an actual emergency. ECAT serves as a one-stop source of information for retrieving toxicological properties for agents of concern, estimating exposure to these agents, characterizing health risks, and determining what actions need to be undertaken to mitigate the risks. ECAT has the capability to be used at a command post where inputs can be checked and communicated while the response continues in real time. This front-end planning is intended to fill the gap most commonly identified during tabletop exercises: a need for concise, timely, and informative risk communication to all parties. Training and customization of existing chemical and biological release scenarios with modeling of exposure to air and water, along with custom risk communication 'messages' intended for public, press, shareholders, and other partners enable more effective communication during times of crisis. For DOE, the ECAT could serve as a prototype that would be amenable to

  4. Chemical supply chain modeling for analysis of homeland security events

    DOE PAGES

    Ehlen, Mark A.; Sun, Amy C.; Pepple, Mark A.; ...

    2013-09-06

    The potential impacts of man-made and natural disasters on chemical plants, complexes, and supply chains are of great importance to homeland security. To be able to estimate these impacts, we developed an agent-based chemical supply chain model that includes: chemical plants with enterprise operations such as purchasing, production scheduling, and inventories; merchant chemical markets, and multi-modal chemical shipments. Large-scale simulations of chemical-plant activities and supply chain interactions, running on desktop computers, are used to estimate the scope and duration of disruptive-event impacts, and overall system resilience, based on the extent to which individual chemical plants can adjust their internal operationsmore » (e.g., production mixes and levels) versus their external interactions (market sales and purchases, and transportation routes and modes). As a result, to illustrate how the model estimates the impacts of a hurricane disruption, a simple example model centered on 1,4-butanediol is presented.« less

  5. COAMPS Application to Global and Homeland Security Threat Problems

    SciTech Connect

    Chin, H S; Glascoe, L G

    2004-09-14

    Atmospheric dispersion problems have received more attention with regard to global and homeland security than their conventional roles in air pollution and local hazard assessment in the post 9/11 era. Consequently, there is growing interest to characterize meteorology uncertainty at both low and high altitudes (below and above 30 km, respectively). A 3-D Coupled Ocean Atmosphere Prediction System (COAMPS, developed by Naval Research Laboratory; Hodur, 1997) is used to address LLNL's task. The objective of this report is focused on the effort at the improvement of COAMPS forecast to address the uncertainty issue, and to provide new capability for high-altitude forecast. To assess the atmospheric dispersion behavior in a wider range of meteorological conditions and to expand its vertical scope for the potential threat at high altitudes, several modifications of COAMPS are needed to meet the project goal. These improvements include (1) the long-range forecast capability to show the variability of meteorological conditions at a much larger time scale (say, a year), and (2) the model physics enhancement to provide new capability for high-altitude forecast.

  6. 76 FR 8755 - Privacy Act of 1974; Department of Homeland Security/ALL-032 Official Passport Application and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-15

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--032 Official... titled, ``Department of Homeland Security/ ALL--032 Official Passport Application and Maintenance Records..., Privacy Office, Department of Homeland Security, Washington, DC 20528. Instructions: All...

  7. 76 FR 53921 - Privacy Act of 1974; Department of Homeland Security ALL-034 Emergency Care Medical Records...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-30

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security ALL--034 Emergency... of Homeland Security/ ALL--034 Emergency Care Medical Records System of Records Notice.'' This system... of Homeland Security, Washington, DC 20528. Instructions: All submissions received must include...

  8. 76 FR 39408 - Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the Terrorist Screening...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the... Homeland Security/ALL-030 Use of the Terrorist Screening Database System of Records.'' The Department of... of Homeland Security, Washington, DC 20528. Instructions: All submissions received must include...

  9. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-004 General... Homeland Security system of records notice titled, Department of Homeland Security/ALL-004 General..., Washington, DC 20528. Instructions: All submissions received must include the agency name and docket...

  10. 78 FR 69858 - Privacy Act of 1974; Department of Homeland Security/Federal Emergency Management Agency-001...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-21

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/Federal Emergency... AGENCY: Department of Homeland Security, Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes...

  11. A Social Infrastructure for Hometown Security: Advancing the Homeland Security Paradigm

    DTIC Science & Technology

    2009-05-01

    private and non- profit sectors; and regions, communities, and individual citizens – along with our partners in the international community – will...chastised previous efforts that failed to mobilize communities across the land . Referring to Americans’ readiness to serve after the 9/11 attacks, he...impressive efforts to stand-up a new federal bureaucracy, however, have created a vast divide between a homeland security enterprise, with all the

  12. 75 FR 9085 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Immigration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-01

    ... Federal Regulations, which is published #0;under 50 titles pursuant to 44 U.S.C. 1510. #0; #0;The Code of... Visa Security Program Tracking System (VSPTS-Net) in support of Section 428 of the Homeland Security Act of 2002. Under the Visa Security Program, ICE conducts security reviews of visa applicants....

  13. Nuclear and Solar Energy: Implications for Homeland Security

    DTIC Science & Technology

    2008-12-01

    FUTURE ....................................................................................34 1. Nuclear Plant Requirement...76 2. Plant Security .....................................................................................77 3... Plant Security .....................................................................................82 3. Resilience

  14. The National Guard and its Role in Homeland Security

    DTIC Science & Technology

    2007-11-02

    Mobilizing Against Terrorism," CQ Weekly 57, no. 10 (6 March 99) 522 [ database on-line]; available from EBSCOhost ; accessed 8 September 2001. 34 Alan Ferber...November 2001. 6 Ibid. ś Kevin Stringer, "A Homeland Defense Mission," Military Review 80 (May/June 2000) 98 [ database on-line]; available from UMI...Implications for Homeland Defense," Abstract from Air University Research Database ; available from http://au.af.mil/au/ database /research/ay2001/affp

  15. 41 CFR 102-73.196 - What types of special purpose space may the Department of Homeland Security lease?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... purpose space may the Department of Homeland Security lease? 102-73.196 Section 102-73.196 Public... Delegations § 102-73.196 What types of special purpose space may the Department of Homeland Security lease? The Department of Homeland Security is delegated authority to lease whatever space its...

  16. 76 FR 10205 - Department of Homeland Security Implementation of OMB Guidance on Drug-Free Workplace Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-24

    ... Implementation of OMB Guidance on Drug-Free Workplace Requirements AGENCY: Department of Homeland Security (DHS... individual violated the requirements of this part? The Secretary of Homeland Security, or his or her official... requirements of this part? The Secretary of Homeland Security, or his or her official designee, will make...

  17. 75 FR 50845 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-18

    .../ALL--027 The History of the Department of Homeland Security System of Records AGENCY: Privacy Office... Act of 1974 for the ``Department of Homeland Security/ALL--027 The History of the Department of... Department exempts portions of the ``Department of Homeland Security/ALL--027 The History of the...

  18. 78 FR 43893 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Immigration Services--011 E-Verify Program System of Records AGENCY: Privacy Office, Department of Homeland Security. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of... Homeland Security system of records titled ``Department of Homeland Security/United States Citizenship...

  19. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Exemptions; Department of Homeland Security Transportation Security Administration-023 Workplace Violence... Security Administration-023 Workplace Violence Prevention Program System of Records and this proposed... a new system of records under the Privacy Act (5 U.S.C. 552a) titled, DHS/TSA-023 Workplace...

  20. 77 FR 66351 - Establishing the White House Homeland Security Partnership Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-02

    ... security challenges, it is hereby ordered as follows: Section 1. Policy. The purpose of this order is to... partnership best practices that can support homeland security priorities; ] (v) as appropriate, conduct... Security Partnership Council #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal Register / Vol....

  1. 77 FR 2011 - Reorganization of Regulations on the Adjudication of Department of Homeland Security Practitioner...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-13

    ... / Friday, January 13, 2012 / Rules and Regulations#0;#0; ] DEPARTMENT OF JUSTICE Executive Office for... of Department of Homeland Security Practitioner Disciplinary Cases AGENCY: Executive Office for... technical amendments to the Executive Office for Immigration Review's (EOIR) practitioner...

  2. State and Local Homeland Security Officials: Who Are They and What Do They Do?

    DTIC Science & Technology

    2011-09-01

    Homeland Security Strategy of 2002. The definition does, however, make the point that ―homeland security is evolving‖ ( Hutton , 2003). The Barron‘s guide...at best and are housed with the state‘s SEMO or governor‘s offices. ( Hutton , 2003, p. 99) It also includes a statement explains that: Like police...SEMO‘s utilize existing state employees in various agencies for staffing. ( Hutton , 2003, p. 99) 12 These passages seem to indicate that, from the

  3. Utilizing K-12 school and higher education programs to incorporate homeland security topics for public education.

    PubMed

    McCarthy, Margaret E

    2003-08-01

    The broad based mission statements of public institutions whose charters are to educate the public is analyzed so that common threads pertinent to homeland security action items can be correlated with the public education scope. The intent of the coordination is to ensure that the prevention component in addition to the preparedness issues of homeland security is incorporated into the educational system with short and long term goals.

  4. Integrating statewide research and education resources for homeland security: the State University System of Florida Consortium on Homeland Security (Invited Paper)

    NASA Astrophysics Data System (ADS)

    Pearson, James E.; Olson, Peter J.

    2005-05-01

    The eleven universities of the State University System of Florida (SUS-FL) have established a consortium to address the full range of homeland security and domestic preparedness requirements for both Florida and the U.S. The Consortium has established the Florida Homeland Security Institute to provide an effective and efficient mechanism to coordinate, mobilize, combine, and form into teams the diverse, cross-disciplinary expertise, facilities, and established large base of technology development activities within the SUS-FL institutions and their established associates at industrial companies, governmental labs, and other universities. The Florida Consortium and Institute may provide a model for other state university systems for how to combine established resources effectively to address specific homeland security and domestic preparedness needs. This paper describes the Consortium and Institute goals, structure, and operations, with examples of how it has functioned in its brief existence as an effective mechanism for integrating the wide range of university, industry, and government capabilities within the state for addressing homeland security requirements.

  5. E PLURIBUS UNUM Homeland Security versus Homeland Defense Who Does What and to Whom

    DTIC Science & Technology

    2010-04-01

    112 APPENDIX IV: SWOT ANALYSIS ............................................................................. 113 APPENDIX V...thesis is a prima facie, Strength, Weakness, Opportunity and Threat ( SWOT ) analysis of both the NSC/DoD and the HSC/DHS security/defense...Defense University Press, 2002. Buchanan, Jeffrey, Maxie Davis, and Lee Wight. ―Death of the Combatant Command? Toward a Joint Interagency

  6. Future Role of Fire Service in Homeland Security

    DTIC Science & Technology

    2008-09-01

    responding to emergencies in progress to protect the lives, and property of their citizens. The problem is that the world has changed . Increasing...tradition, collaboration, firefighters as collectors, strategic change in fire service, adaptive changes , first responders, future role in homeland...emergencies in progress to protect the lives, and property of their citizens. The problem is that the world has changed . Increasing terrorist

  7. Modeling Homeland Security: A Value Focused Thinking Approach

    DTIC Science & Technology

    2013-02-21

    Enemy Aliens and American Freedoms.” Nation. 23 September 2002. http://www.globalpolicy.org/ wtc /liberties/2002/0923nation.htm 17. Cole, David...33. Kalyani. “Privacy under Greater Threat after 9/11: Report.” One World South Asia. 5 December 2002. http://www.globalpolicy.org/ wtc /liberties...www.globalpolicy.org/ wtc /liberties/2002/0903debate.htm 42. Larsen, Col. Randall J. (Ret.) and David, Ruth A. Homeland Defense: Assumptions First

  8. Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support Through Interdisciplinary Education

    DTIC Science & Technology

    2010-03-01

    Parameters, Winter 1998, 39–50. Walt Disney Pictures. (2004) Miracle. Burbank, CA. Wormuth, C. E., & Witkowsky, A. (2008). Managing the Next...prevention of or response to a natural disaster or act of terrorism, overseas or on American soil, unity of effort among multi-disciplinary and multi...Department of National Security Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT Whether in prevention of or response to a natural disaster or

  9. 75 FR 7979 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... of Homeland Security/ALL-027 The History of the Department of Homeland Security System of Records... Security is giving concurrent notice of an updated and reissued system of records pursuant to the Privacy... Security System of Records and this proposed rulemaking. In this proposed rulemaking, the...

  10. A Strategic View of Homeland Security: Relooking the Posse Comitatus Act and DOD’s Role in Homeland Security

    DTIC Science & Technology

    2007-11-02

    defeating the Indians to conquer the North American landmass, quelling the Whiskey Rebellion of 1794 , or defeating British attacks on coastal cities during... Whiskey Rebellion erupted in Pittsburgh, PA in July 1794 as a protest against an excise tax on whiskey . Though citizens in other states, such as Maryland...mobilized 15,000 militiamen to crush the Whiskey Rebellion in Western Pennsylvania.27 In the years to follow, defense of the homeland took on definite

  11. 75 FR 10633 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security United States...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-09

    ... United States Immigration and Customs Enforcement-- 011 Immigration and Enforcement Operational Records... Security/U.S. Immigration and Customs Enforcement system of records titled, ``Department of Homeland Security/U.S. Immigration and Customs Enforcement--011 Removable Alien Records System of Records''...

  12. 76 FR 60387 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-29

    ..., manages this process. To reduce any risk of unauthorized access, FEMA SARs are secured in a room monitored by FEMA OCSO special agents and analysts. FEMA SARs may shared with federal, state, local, and tribal.... FEMA SARs that do not have a nexus to terrorism or hazards to homeland security, as determined by...

  13. Gamma-Ray Detectors: From Homeland Security to the Cosmos (443rd Brookhaven Lecture)

    SciTech Connect

    Bolotnikov, Aleksey

    2008-12-03

    Many radiation detectors are first developed for homeland security or industrial applications. Scientists, however, are continuously realizing new roles that these detectors can play in high-energy physics and astrophysics experiments. On Wednesday, December 3, join presenter Aleksey Bolotnikov, a physicist in the Nonproliferation and National Security Department (NNSD) and a co-inventor of the cadmium-zinc-telluride Frisch-ring (CdZnTe) detector, for the 443rd Brookhaven Lecture, entitled Gamma-Ray Detectors: From Homeland Security to the Cosmos. In his lecture, Bolotnikov will highlight two primary radiation-detector technologies: CdZnTe detectors and fluid-Xeon (Xe) detectors.

  14. The President Has No Clothes: The Case for Broader Application of Red Teaming within Homeland Security

    DTIC Science & Technology

    2010-06-01

    November 9, 2006). 130 Ibid. 131 Homeland Security News Wire, “Billions spent on airport security , but major security gaps remain.” 132 Arvind Gupta...security initiatives to improve airport security since 9/11.173 It also faces the challenge of managing almost 60,000 employees, 80 percent of whom work...perimeter at the airport security checkpoint.180 A Red Team might ask if we are building the equivalent of a modern-day Maginot line. What are the implied

  15. Analytical Chemistry for Homeland Defense and National Security

    SciTech Connect

    S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  16. Exploring the Lack of Interoperability of Databases within Department of Homeland Security Interagency Environment Concerning Maritime Port Security

    DTIC Science & Technology

    2009-03-01

    41 V. DATA SHARING ENVIROMENT EXPERIMENT IN MIO 08-4 .........45 VI. CONCLUSION .............................................57...agencies across the United States. An example of this is the establishment of Data Fusion Centers in major urban areas. The Fusion Centers...connecting all fifty states, five territories, Washington, D.C and fifty major urban areas. HSIN is Department of Homeland Security secure, Sensitive

  17. Expanding the Role of Emergency Medical Services in Homeland Security

    DTIC Science & Technology

    2013-03-01

    Conference, Aug 30–Sept 3, 2006. 15 issued the National Strategy for Biosurveillance .49 This report defines biosurveillance as “the process of...Strategy for Biosurveillance (Washington, D.C.: The White House, 2012). 50 Alex Garza G., “Real Time EMS Events as Surrogate Events in Syndromic...Statistical Challenges Facing Early Outbreak Detection in Biosurveillance ,” Technometrics 52, no. 1 (February, 2010), 39–51. 58 In addition

  18. Defense and Homeland Security Applications of Multi-Agent Simulations

    DTIC Science & Technology

    2007-12-01

    Monterey, CA 93943-5219, U.S.A. Felix Martinez Wargaming Department Centro de Estudios Superiores Navales Mexico, D.F. 04840, MEXICO Lisa R...critical asset, Petroleos Mexicano (PE- MEX) and the Mexican Navy maintain mutually supportive security strategies in the Campeche Sound. During a state of

  19. Interagency Collaboration Challenges Among Homeland Security Disciplines in Urban Areas

    DTIC Science & Technology

    2006-03-01

    Strategic National Stockpile SPD Seattle Police Department SPOC Seattle Police Operations Center SWAT Special Weapons and Tactics xix TCL Target...established a command post at their Seattle Police Operations Center ( SPOC ) and not at the incident site. The SPOC is a secure police facility and its choice

  20. Homeland security R&D roadmapping : risk-based methodological options.

    SciTech Connect

    Brandt, Larry D.

    2008-12-01

    The Department of Energy (DOE) National Laboratories support the Department of Homeland Security (DHS) in the development and execution of a research and development (R&D) strategy to improve the nation's preparedness against terrorist threats. Current approaches to planning and prioritization of DHS research decisions are informed by risk assessment tools and processes intended to allocate resources to programs that are likely to have the highest payoff. Early applications of such processes have faced challenges in several areas, including characterization of the intelligent adversary and linkage to strategic risk management decisions. The risk-based analysis initiatives at Sandia Laboratories could augment the methodologies currently being applied by the DHS and could support more credible R&D roadmapping for national homeland security programs. Implementation and execution issues facing homeland security R&D initiatives within the national laboratories emerged as a particular concern in this research.

  1. 76 FR 41274 - Privacy Act of 1974; Department of Homeland Security/ALL-033 Reasonable Accommodations Records...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-13

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-033 Reasonable... to ] establish a new system of records titled, ``Department of Homeland Security/ALL-033 Reasonable..., Washington, DC 20528. Instructions: All submissions received must include the agency name and docket...

  2. 75 FR 39266 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights...,'' January 6, 2004. The system name is being changed to, ``Department of Homeland Security/ALL-029 Civil... Department Office for Civil Rights and Civil Liberties, as well as all component offices that perform...

  3. 78 FR 52553 - Privacy Act of 1974; Department of Homeland Security/ALL-035 Common Entity Index Prototype System...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-23

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-035 Common Entity... titled, ``Department of Homeland Security/ ALL--035 Common Entity Index Prototype System of Records.... Instructions: All submissions received must include the agency name and docket number for this rulemaking....

  4. 78 FR 31958 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection-007...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-28

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection-007-Border Crossing Information System of Records AGENCY: Privacy Office, Department of Homeland Security. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the...

  5. Does Homeland Security Constitute an Emerging Academic Discipline?

    DTIC Science & Technology

    2013-03-01

    Postgraduate School NSA National Security Agency OED Oxford English Dictionary U.S. United States xiv THIS PAGE INTENTIONALLY LEFT BLANK xv...Curriculum Design: A Case Study in Neuroscience ,” The Journal of Undergraduate Neuroscience Education 10, no. 1 (2011): A71–A79. 37 physical reaction...article entitled, “A Conceptual Framework for Interdisciplinary Curriculum Design: A Case Study in Neuroscience :”140 Table 2. An Overview of

  6. The Role of the Corps of Engineers in Homeland Security

    DTIC Science & Technology

    2007-11-02

    meet the requirements of a war or 22other national emergency involving an external threat to the national security. Reserve units called up in the...stationed in the US to provide the necessary response to the various types of national emergencies. All three components of the Corps (Active, Reserve and...Guard) will be examined to determine the optimum configuration and stationing to meet state and federal missions. iii iv TABLE OF CONTENTS ABSTRACT

  7. State Defense Force Monograph Series. Winter 2005, Homeland Security

    DTIC Science & Technology

    2005-01-01

    Fish and Game Commission by flying reconnaissance missions over the Shenandoah Valley searching for poachers as bear poaching is on the rise in the...terror on a daily basis. Every day we see terrorist groups killing and destroying to demonstrate that what we believe, what we stand for, is of no value...in New York City with ferry services across the Hudson River ; provided the waterborne security that allowed for the opening of the George Washington

  8. Has the Department of Homeland Security (DHS) Outlived Its Usefulness?

    DTIC Science & Technology

    2012-12-01

    ODNI OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE NAPA NATIONAL ACADEMY OF PUBLIC ADMINISTRATION NSA NATIONAL SECURITY AGENCY NSC NATIONAL...National Academy of Public Administration ( NAPA ) in 1993. Both reports put the agency under a very critical light, asking whether FEMA should be...of FEMA because NAPA determined a need existed for a federal entity to manage recovery and response operations during periods of national crisis

  9. Securing Nuclear and Radiological Material in the Homeland

    DTIC Science & Technology

    2007-03-01

    measures at the facility, a ballistic vest, night vision goggles, a gas mask, handcuffs, and a pepper spray canister. Further investigation revealed...25 C. D. Ferguson , T. Kazi and J. Perera, Commercial Radioactive Sources: Surveying the Security Risks (Monterey Institute of...http://www.ewg.org/reports/nuclearwaste/faq/faq_terroristthreat_more.php (accessed 10 February 2006). Ferguson , C. D., T. Kazi, and J. Perera

  10. Are We Prepared to Use Armed Forces for Homeland Security?

    DTIC Science & Technology

    2007-11-02

    security operations - civil services, chem./ bio response, military police, intelligence - are also capabilities required to perform many overseas...the law should be changed....”49 Civil libertarians are opposed to review of the posse comitatus act for fear that changes will diminish protection...military. However, historical precedents support the president’s authority to do so. The civil libertarians fear that the review will lead to the

  11. Homeland security and public health: role of the Department of Veterans Affairs, the US Department of Homeland Security, and implications for the public health community.

    PubMed

    Koenig, Kristi L

    2003-01-01

    The terrorist attacks of 11 September 2001 led to the largest US Government transformation since the formation of the Department of Defense following World War II. More than 22 different agencies, in whole or in part, and >170,000 employees were reorganized to form a new Cabinet-level Department of Homeland Security (DHS), with the primary mission to protect the American homeland. Legislation enacted in November 2002 transferred the entire Federal Emergency Management Agency and several Department of Health and Human Services (HHS) assets to DHS, including the Office of Emergency Response, and oversight for the National Disaster Medical System, Strategic National Stockpile, and Metropolitan Medical Response System. This created a potential separation of "health" and "medical" assets between the DHS and HHS. A subsequent presidential directive mandated the development of a National Incident Management System and an all-hazard National Response Plan. While no Department of Veterans Affairs (VA) assets were targeted for transfer, the VA remains the largest integrated healthcare system in the nation with important support roles in homeland security that complement its primary mission to provide care to veterans. The Emergency Management Strategic Healthcare Group (EMSHG) within the VA's medical component, the Veteran Health Administration (VHA), is the executive agent for the VA's Fourth Mission, emergency management. In addition to providing comprehensive emergency management services to the VA, the EMSHG coordinates medical back-up to the Department of Defense, and assists the public via the National Disaster Medical System and the National Response Plan. This article describes the VA's role in homeland security and disasters, and provides an overview of the ongoing organizational and operational changes introduced by the formation of the new DHS. Challenges and opportunities for public health are highlighted.

  12. Mapping the Risks. Assessing the Homeland Security Implications of Publicly Available Geospatial Information

    DTIC Science & Technology

    2004-01-01

    beneficial purposes , the risk also exists that some types of geospatial information could be exploited by terrorists. Federal agencies thus face a...as it becomes available. Study Purpose and Approach This study frames the analytical issues associated with assessing whether and how geospatial data...Information Act for homeland security or national security purposes • new and potentially sensitive information that might be created via the

  13. 3 CFR 13629 - Executive Order 13629 of October 26, 2012. Establishing the White House Homeland Security...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... United States to support homeland security priorities. Partnerships are collaborative working... Committee, determine their agendas, and coordinate their work. The Council may establish subgroups... work of the Council to the President through the Chair. Sec. 4. General Provisions. (a) The heads...

  14. SEVIS: The Impact of Homeland Security on American Colleges and Universities

    ERIC Educational Resources Information Center

    Danley, Janet V.

    2010-01-01

    This chapter covers the impact of homeland security mandates on institutions and international students and scholars. The author traces the history of interest by the Immigration and Naturalization Service (INS) in developing a management system for international students and scholars that eventually resulted in the birth of Student and Exchange…

  15. 6 CFR 25.9 - Procedures for certification of approved products for Homeland Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.9... applicant seeking a Certification of anti-terrorism Technology as an Approved Product for Homeland Security...) A Certification shall: (i) Describe the Qualified Anti-Terrorism Technology (in such detail as...

  16. Homeland Security Science and Technology Authorization Act of 2010

    THOMAS, 111th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    07/21/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  17. 6 CFR 25.9 - Procedures for certification of approved products for Homeland Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.9... applicant seeking a Certification of anti-terrorism Technology as an Approved Product for Homeland Security... obtained by mail by sending a request to: Directorate of Science and Technology, SAFETY Act/room...

  18. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-28

    ..., immigration, intelligence, or other homeland security functions. In addition, information may be shared with... commentary from immigration enforcement officers, which includes references to active criminal and other..., intelligence, and other DHS mission-related functions. Data is also used to provide associated...

  19. 77 FR 12054 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-28

    ... p.m. in the Commission Meeting Room of the Federal Communications Commission, Room TW-C305, 445 12th..., Room TW-C305 (Commission Meeting Room), 445 12th Street SW., Washington, DC 20554. FOR FURTHER... Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street SW., Room 7-...

  20. 77 FR 33605 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-07

    ... data is not used against an individual. System users are trained to verify information obtained from... rule is effective June 7, 2012. FOR FURTHER INFORMATION CONTACT: For general questions please contact... 20528. SUPPLEMENTARY INFORMATION: Background The Department of Homeland Security (DHS) Office...

  1. PRESERVING DRINKING WATER INTEGRITY IN OUR COMMUNITIES: HOMELAND SECURITY PRIORITIES OF THE ENVIRONMENTAL PROTECTION AGENCY

    EPA Science Inventory

    A book chapter published in a 3-volume textbook series by the U. S. Military Academy at West Point, Combating Terrorism Center. Book title: Homeland Security: Protecting America's Targets. The chapter is a review of background of water systems, impact of September 11, 2001, a...

  2. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    .... ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland... Science and Technology, such as new developments in systems engineering, cyber-security, knowledge management and how best to leverage related technologies funded by other federal agencies and by the...

  3. 76 FR 42004 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-18

    ... of Homeland Security Federal Emergency Management Agency--011 Training and Exercise Program Records... Training and Exercise Program Records System of Records'' from certain provisions of the Privacy Act... Management Agency--011 Training and Exercise Program Records System of Records'' from one or more...

  4. 76 FR 18954 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-06

    ... of Homeland Security Federal Emergency Management Agency DHS/FEMA-011 Training and Exercise Program... Agency--011 Training and Exercise Program Records System of Records'' and this proposed rulemaking. In... DHS system of records titled, ``DHS/FEMA--011 Training and Exercise Program Records System of...

  5. 76 FR 19107 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-06

    ... Management Agency--011 Training and Exercise Program Records System of Records AGENCY: Privacy Office, DHS... titled, ``Department of Homeland Security Federal Emergency Management Agency--011 Training and Exercise.../Federal Emergency Management Agency to collect and maintain records on its training and exercise...

  6. Photonics engineering: snapshot applications in healthcare, homeland security, agriculture, and industry

    NASA Astrophysics Data System (ADS)

    Sumriddetchkajorn, Sarun

    2015-01-01

    Throughout my experience in photonics engineering, this article shows that photonics is indeed a key technology enabler for enhancing our competitiveness. In particular, I snapshot the achievements of NECTEC research teams in implementing devices and systems suitable for healthcare, homeland security, agriculture, and industry.

  7. 77 FR 50631 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative [HSAR Case 2009-002

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-22

    ... United States Office of Government Ethics has promulgated regulations applicable to the entire Executive..., subch. B. The Department of Homeland Security has also issued Management Directive 0480.1, Ethics... Code of Business Ethics and Conduct Sec. 3003.1003 Requirements. 3003.1004 Contract clauses....

  8. 77 FR 50449 - Revision of Department of Homeland Security Acquisition Regulation; Contractor Billing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-21

    ... proposed rule augments two existing Federal Acquisition Regulation (FAR) policies to create a consistent approach within DHS for awarding Time and Materials/Labor Hours (T&M/LH) contracts. Those two augmenting... prime contractor and all subcontractors. The second of the two augmenting Homeland Security...

  9. Homeland Security: Implications for Information Policy and Practice--First Appraisal.

    ERIC Educational Resources Information Center

    Feinberg, Lotte E.

    2002-01-01

    Discusses information policy in the wake of the September 11 terrorist attacks. Topics include access to government records, including Freedom of Information Act issues; removing or expanding information on government Web sites; state actions; coordination versus secrecy in homeland security; and patterns and trends in federal and state…

  10. Texas Should Require Homeland Security Standards for High-Speed Rail

    DTIC Science & Technology

    2015-12-01

    psychological and mental health effects, and community involvement. 14. SUBJECT TERMS homeland security, high-speed rail, passenger trains, transit...privacy, screening, psychological and mental health effects, and community involvement. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF...environment, offer the opportunity for specific populations to be targeted at particular destinations, and often have iconic structures .2 Regarding the

  11. Preliminary Benchmarking Efforts and MCNP Simulation Results for Homeland Security

    SciTech Connect

    Robert Hayes

    2008-04-18

    It is shown in this work that basic measurements made from well defined source detector configurations can be readily converted in to benchmark quality results by which Monte Carlo N-Particle (MCNP) input stacks can be validated. Specifically, a recent measurement made in support of national security at the Nevada Test Site (NTS) is described with sufficient detail to be submitted to the American Nuclear Society’s (ANS) Joint Benchmark Committee (JBC) for consideration as a radiation measurement benchmark. From this very basic measurement, MCNP input stacks are generated and validated both in predicted signal amplitude and spectral shape. Not modeled at this time are those perturbations from the more recent pulse height light (PHL) tally feature, although what spectral deviations are seen can be largely attributed to not including this small correction. The value of this work is as a proof-of-concept demonstration that with well documented historical testing can be converted into formal radiation measurement benchmarks. This effort would support virtual testing of algorithms and new detector configurations.

  12. 75 FR 38824 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-06

    ...] Privacy Act of 1974; Department of Homeland Security/ALL--029 Civil Rights and Civil Liberties Records... system name is being changed to, ``Department of Homeland Security/ALL--029 Civil Rights and Civil... Rights and Civil Liberties, as well as all component offices that perform civil rights and...

  13. 76 FR 72428 - Privacy Act of 1974; Department of Homeland Security/ALL-017 General Legal Records System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... [Docket No. DHS-2011-0094] Privacy Act of 1974; Department of Homeland Security/ALL--017 General Legal.../ ALL--017 General Legal Records System of Records.'' This system will assist attorneys in providing..., Department of Homeland Security, Washington, DC 20528. Instructions: All submissions received must...

  14. 78 FR 19442 - Public Safety and Homeland Security Bureau Seeks To Refresh the Record Regarding Options for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-01

    ... COMMISSION 47 CFR Part 20 Public Safety and Homeland Security Bureau Seeks To Refresh the Record Regarding... Commission's (Commission) Public Safety and Homeland Security Bureau (PSHSB) seeks to refresh the record...-seeks-refresh-non-emergency-911-calls-nsi-handset-record . Synopsis of the Public Notice 1....

  15. 75 FR 14335 - Revisions to the Export Administration Regulations To Enhance U.S. Homeland Security: Addition of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-25

    ... issues identified by an interagency working group that is reviewing export control issues related to homeland security. The interagency working group is made up of representatives from the Departments of Commerce, Defense, Homeland Security and State. The purpose of the interagency working group is to...

  16. 76 FR 60385 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-29

    .... This system will improve customer service; increase efficiency for processing benefits; better identify... Exemptions; Department of Homeland Security U.S. Citizenship and Immigration Services-016 Electronic... Homeland Security U.S. Citizenship and Immigration Services-016 Electronic Immigration System-3...

  17. 76 FR 49494 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard DHS/USCG-027...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-10

    ... records titled, ``Department of Homeland Security/United States Coast Guard-027 Recruiting Files System of Records.'' This system of records allows the Department of Homeland Security/United States Coast Guard to...: Marilyn Scott-Perez (202-475-3515), Privacy Officer, United States Coast Guard, 2100 2nd Street, SW.,...

  18. 76 FR 27847 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Coast...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ....S. Coast Guard--008 Courts Martial Case Files System of Records AGENCY: Privacy Office, DHS. ACTION..., ``Department of Homeland Security/U.S. Coast Guard--008 Courts Martial Case Files System of Records'' from... Homeland Security/U.S. Coast Guard--008 Courts Martial Case Files System of Records from one or...

  19. 19 CFR 0.2 - All other CBP regulations issued under the authority of the Department of Homeland Security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false All other CBP regulations issued under the authority of the Department of Homeland Security. 0.2 Section 0.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY TRANSFERRED OR DELEGATED AUTHORITY § 0.2 All other CBP regulations issued...

  20. 78 FR 4347 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security; U.S. Customs...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-22

    ..., Acting Chief Privacy Officer, Privacy Office, Department of Homeland Security, Washington, DC 20528... Rulings, U.S. Customs and Border Protection, Mint Annex, 799 9th Street NW., Washington, DC 20229-1177..., Privacy Office, Department of Homeland Security, Washington, DC 20528. SUPPLEMENTARY INFORMATION:...

  1. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... Security Administration--011, Transportation Security Intelligence Service Operations Files Systems of... Administration--011 Transportation Security Intelligence Service Operations Files previously published on... Transportation Security Intelligence Service Operations Filing System contains records on individuals...

  2. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    SciTech Connect

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  3. Status Summary of 3He and Neutron Detection Alternatives for Homeland Security

    SciTech Connect

    Kouzes, Richard T.; Ely, James H.

    2010-04-28

    This is a short summary whitepaper on results of our alternatives work: Neutron detection is an important aspect of interdiction of radiological threats for homeland security purposes since plutonium, a material used for nuclear weapons, is a significant source of fission neutrons [Kouzes 2005]. Because of the imminent shortage of 3He, which is used in the most commonly deployed neutron detectors, a replacement technology for neutron detection is required for most detection systems in the very near future [Kouzes 2009a]. For homeland security applications, neutron false alarms from a detector can result in significant impact. This puts a strong requirement on any neutron detection technology not to generate false neutron counts in the presence of a large gamma ray-only source [Kouzes et al. 2008].

  4. Unity of Command: An Answer to the Maritime Homeland Security Interagency Quagmire

    DTIC Science & Technology

    2008-10-31

    and a high-yield explosive in New London, Connecticut.37 The DHS Inspector General (IG) reported that although “exercise objectives were generally ...2. 2 Per 18 U.S. Code, Weapons of Mass Destruction generally include chemical, biological, radiological, nuclear and enhanced high explosives ...views and are not necessarily endorsed by the NWC or the Department of the Navy. 14. ABSTRACT Maritime Homeland Security (MHS) and Defense ( MHD ) of

  5. How Should Municipal Police Agencies Participate in America’s Homeland Security Strategy?

    DTIC Science & Technology

    2008-12-01

    child abuse, juvenile delinquency , domestic violence, and drugs in schools. A search of the website for the U.S. Department of Justice, Office of...Forum (PERF). It is intended to be applicable to a broad spectrum of governmental, community, and homeland security entities, such as fire and health ...protection from light rain, but it won’t protect you from a storm. The light rain mentality creates an environment where the continued absence of specific

  6. Hilbertian sine as an absolute measure of Bayesian inference in ISR, homeland security, medicine, and defense

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Wang, Wenjian; Hodelin, Juan; Forrester, Thomas; Romanov, Volodymyr; Kostrzewski, Andrew

    2016-05-01

    In this paper, Bayesian Binary Sensing (BBS) is discussed as an effective tool for Bayesian Inference (BI) evaluation in interdisciplinary areas such as ISR (and, C3I), Homeland Security, QC, medicine, defense, and many others. In particular, Hilbertian Sine (HS) as an absolute measure of BI, is introduced, while avoiding relativity of decision threshold identification, as in the case of traditional measures of BI, related to false positives and false negatives.

  7. Maritime Homeland Security and Defense: Who’s in Charge? A Current C2 Perspective

    DTIC Science & Technology

    2006-05-31

    and NATO allies * Data taken from the following two sources: Patrick Stillman and Gregory Giddens ...Control.” Newport Papers, no. 22. Newport, RI: Naval War College Press, 23 October 2001. Bertrup, John, Anthony Freedman, Timothy Roberts, and Gregory...Deepwater.” National Defense 86, no. 580 (2002): 16-17. Stillman, Patrick M. and Gregory Giddens . “Deepwater Will Provide Homeland Security.” U.S. Naval

  8. Employing the Intelligence Cycle Process Model Within the Homeland Security Enterprise

    DTIC Science & Technology

    2013-12-01

    The purpose of this thesis was to examine the employment and adherence of the intelligence cycle process model within the National Network of Fusion...Centers and the greater Homeland Security Enterprise by exploring the customary intelligence cycle process model established by the United States...training program that ensures consistent and clear intelligence cycle process model employment. Finally, this thesis offers an overview pertinent to

  9. The Significance of Consequence Assessment Applied to the Risk-Based Approach of Homeland Security

    DTIC Science & Technology

    2008-03-01

    PAGE INTENTIONALLY LEFT BLANK xi LIST OF ABBREVIATIONS/ACRONYMS CDC Centers for Disease Control CHDS Center of Homeland Security and Defense CI/KR...Office of Comparative Studies in DHS’ Science and Technology Directorate argues that risk, no matter how well founded, is in reality a mental and... cinema complexes, office buildings, airport arrival halls, and train stations. There are a plethora of these venues across the country, which, given

  10. Going Beyond the Water’s Edge: Improving Congressional Oversight for the Department of Homeland Security

    DTIC Science & Technology

    2013-03-01

    Investigations can also be a conducted for no other purpose than to inform the government and the public on the efficiency and effectiveness of executive...Katrina, the act turned FEMA back into a semi-autonomous agency, which prevented DHS from diverting resources and personnel to other agencies or positions...Sapotichne. “Constructing Homeland Security: An Anemic Policy Regime.” The Policy Studies Journal 39, no . 2 (2011): 301. Mayer, Matt A ., James Jay Carafano

  11. The DoD Role in Homeland Security: Past, Present, and Future

    DTIC Science & Technology

    2013-03-01

    specifically chartered to address homeland security was the Council of National Defense ( CND ). The CND was established as an emergency agency by...responsibilities to state governments. On April 9, 1917, the CND chairman requested all Governors establish councils of defense.9 The armistice of 1918 prompted...councils to disband and CND operations were suspended on June 30, 1921.10 A parallel pattern emerged during World War II. Most wartime

  12. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-12-01

    TSGP eligibility.22 Port Security Grant Program The Port Security Grant Program ( PSGP ) provides funding for the protection of ports and port... psgp /index.shtm. 24 U.S. Department of Homeland Security, Grant Programs Directorate, FY2009 Overview Grant Application Guidance, Washington, DC

  13. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-04-21

    Research Service 6 Port Security Grant Program The Port Security Grant Program ( PSGP ) provides funding for the protection of ports and port...Grant Program: Overview, Washington, DC, 2008, http://www.fema.gov/government/grant/ psgp /index.shtm. 23 U.S. Department of Homeland Security, Grant

  14. Integrated homeland security system with passive thermal imaging and advanced video analytics

    NASA Astrophysics Data System (ADS)

    Francisco, Glen; Tillman, Jennifer; Hanna, Keith; Heubusch, Jeff; Ayers, Robert

    2007-04-01

    A complete detection, management, and control security system is absolutely essential to preempting criminal and terrorist assaults on key assets and critical infrastructure. According to Tom Ridge, former Secretary of the US Department of Homeland Security, "Voluntary efforts alone are not sufficient to provide the level of assurance Americans deserve and they must take steps to improve security." Further, it is expected that Congress will mandate private sector investment of over $20 billion in infrastructure protection between 2007 and 2015, which is incremental to funds currently being allocated to key sites by the department of Homeland Security. Nearly 500,000 individual sites have been identified by the US Department of Homeland Security as critical infrastructure sites that would suffer severe and extensive damage if a security breach should occur. In fact, one major breach in any of 7,000 critical infrastructure facilities threatens more than 10,000 people. And one major breach in any of 123 facilities-identified as "most critical" among the 500,000-threatens more than 1,000,000 people. Current visible, nightvision or near infrared imaging technology alone has limited foul-weather viewing capability, poor nighttime performance, and limited nighttime range. And many systems today yield excessive false alarms, are managed by fatigued operators, are unable to manage the voluminous data captured, or lack the ability to pinpoint where an intrusion occurred. In our 2006 paper, "Critical Infrastructure Security Confidence Through Automated Thermal Imaging", we showed how a highly effective security solution can be developed by integrating what are now available "next-generation technologies" which include: Thermal imaging for the highly effective detection of intruders in the dark of night and in challenging weather conditions at the sensor imaging level - we refer to this as the passive thermal sensor level detection building block Automated software detection

  15. 75 FR 81371 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-28

    .../United States Citizenship and Immigration Services- 012 Citizenship and Immigration Data Repository... of records titled ``Department of Homeland Security/United States Citizenship and Immigration Services-012 Citizenship and Immigration Data Repository System of Records'' from certain provisions of...

  16. 75 FR 51619 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    .../United States Citizenship and Immigration Services-- 009 Compliance Tracking and Management System of.../United States Citizenship and Immigration system of records entitled the ``United States Citizenship and... Homeland Security/United States Citizenship and Immigration Services--009 Compliance Tracking...

  17. Transition of advanced technology to military, homeland security, and law enforcement users

    NASA Astrophysics Data System (ADS)

    Jarrett, Stephen M.

    2004-09-01

    With the attack on the United States and the subsequent war on terror and the wars in Afghanistan and Iraq a need has been exposed for the transition of technology to all of our defenders both combat forces on the foreign battlefield and domestic forces here at home. The establishment of the Department of Homeland Security has also provided a focus on inserting technology to dramatically improve the capability of airport security forces, law enforcement, and all first responder networks. The drastic increase in the use of Special Forces in combat has also required new advanced technology capabilities at a much faster rate of development than the standard military procurement system. Technology developers must address the questions of interoperability, cost, commercialization, of how these groups will use the technology delivered and the adoption criteria of users in the deployment environment. The successful transition to the field must address the formation of complex concepts of operations in the user's adoption criteria. Prototype transition for two systems, a pocket infrared camera and an acoustic/seismic detector, will be highlighted in their effect on the wars in Iraq and Afghanistan and in the heightening of homeland security.

  18. The Department of Defense and Homeland Security relationship: Hurricane Katrina through Hurricane Irene.

    PubMed

    Weaver, John Michael

    2015-01-01

    This research explored federal intervention with the particular emphasis on examining how a collaborative relationship between Department of Defense (DOD) and Homeland Security (DHS) led to greater effectiveness between these two federal departments and their subordinates (United States Northern Command and Federal Emergency Management Agency, respectively) during the preparation and response phases of the disaster cycle regarding US continental-based hurricanes. Through the application of a two-phased, sequential mixed methods approach, this study determined how their relationship has led to longitudinal improvements in the years following Hurricane Katrina, focusing on hurricanes as the primary unit of analysis.

  19. The Role, Status and Command and Control of the National Guard in Homeland Security

    DTIC Science & Technology

    2003-04-07

    March 2003, 10. 47 Jeremy Feiler , “Senators Want National Guard Role in Homeland Security Defined,” Inside the Pentagon, 30 January 2003, 1. 48...2002). 60 Feiler , 1. 61 Tilton. 62 National Guard Association of the United States ngaus@ngaus.org, “NGAUS Weekly Update”, electronic mail message to...January 2003, 9. 71 MG (ret) Bruce Jacobs, “Lessons Lost?”, National Guard, March 2003, 31. 72 Ibid. 73 MG Gus Hargett, Chairman of the Board, NGAUS and

  20. Mobile, portable lightweight wireless video recording solutions for homeland security, defense, and law enforcement applications

    NASA Astrophysics Data System (ADS)

    Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.

    2015-05-01

    It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.

  1. Impact of Homeland Security Alert level on calls to a law enforcement peer support hotline.

    PubMed

    Omer, Saad B; Barnett, Daniel J; Castellano, Cherie; Wierzba, Rachel K; Hiremath, Girish S; Balicer, Ran D; Everly, George S

    2007-01-01

    The Homeland Security Advisory System (HSAS) was established by the Department of Homeland Security to communicate the risk of a terrorist event. In order to explore the potential psychological impacts of HSAS we analyzed the effects of terror alerts on the law enforcement community. We used data from the New Jersey Cop 2 Cop crisis intervention hotline. Incidence Rate Ratios--interpreted as average relative increases in the daily number of calls to the Cop 2 Cop hotline during an increased alert period--were computed from Poisson models. The hotline received a total of 4,145 initial calls during the study period. The mean daily number of calls was higher during alert level elevation compared to prior 7 days (7.68 vs. 8.00). In the Poisson regression analysis, the Incidence Rate Ratios of number of calls received during elevated alert levels compared to the reference period of seven days preceding each change in alert were close to 1, with confidence intervals crossing 1 (i.e. not statistically significant) for all lag periods evaluated. This investigation, in the context of New Jersey law enforcement personnel, does not support the concern that elevating the alert status places undue stress upon alert recipients.

  2. High-Resolution Laser-Induced Breakdown Spectroscopy used in Homeland Security and Forensic Applications

    SciTech Connect

    Martin, Madhavi Z; Wullschleger, Stan D; Vass, Arpad Alexander; Martin, Rodger Carl; Grissino-Mayer, Henri

    2006-01-01

    The technique of laser-induced breakdown spectroscopy (LIBS) to detect elements for a variety of homeland security applications such as nuclear materials identification and inventory,and forensic applications has been demonstrated. For nuclear materials applications, we detected and profiled metals in coatings that were used to encapsulate nuclear fuel. Multivariate analysis has been successfully employed in the quantification of elements present in treated wood and engineered wood composites. These examples demonstrate that LIBS-based techniques are inherently well suited for diverse environmental applications related to homeland security. Three key advantages are evident: (1) small samples (mg) are sufficient; (2) samples can be analyzed by LIBS very rapidly, and (3) biological materials such as human and animal bones and wood can be analyzed with minimal sample preparation. For forensic applications they have used LIBS to determine differences in animal and human bones. They have also applied this technique in the determination of counterfeit and non-counterfeit currency. They recently applied LIBS in helping to solve a murder case.

  3. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false FOIA/Privacy Act Offices of the Department of... SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Pt. 5, App. A Appendix A to Part 5—FOIA/Privacy Act Offices... of Homeland Security, FOIA and Privacy Act requests should be sent to the Departmental...

  4. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-02-26

    The Port Security Grant Program ( PSGP ) provides funding for the protection of ports and port infrastructure from terrorism...Overview, Washington, DC, 2008, http://www.fema.gov/government/grant/ psgp /index.shtm. 23 U.S. Department of Homeland Security, Grant Programs Directorate

  5. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-08-05

    Security Grant Program ( PSGP ) provides funding for the protection of ports and port infrastructure from terrorism. It is intended to enhance risk...www.fema.gov/government/grant/ psgp /index.shtm. 23 U.S. Department of Homeland Security, Grant Programs Directorate, FY2009 Overview Grant Application

  6. 76 FR 59926 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    .... This system will improve customer service; increase efficiency for processing benefits; better identify... Exemptions; Department of Homeland Security/U.S. Citizenship and Immigration Services-015 Electronic... Security/U.S. Citizenship and Immigration Services-015 Electronic Immigration System-2 Account and...

  7. 76 FR 53918 - Privacy Act of 1974; Department of Homeland Security/Federal Emergency Management Agency-001...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-30

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/Federal Emergency Management Agency--001 National Emergency Family Registry and Locator System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy...

  8. 76 FR 24905 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-DHS/USCG-007...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security United States Coast Guard--DHS/USCG-007 Special Needs Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974, the...

  9. Identifying changing aviation threat environments within an adaptive Homeland Security Advisory System.

    PubMed

    Lee, Adrian J; Jacobson, Sheldon H

    2012-02-01

    A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information-based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions.

  10. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... or prosecutions of violations of criminal law are exempt under 5 U.S.C. 552a(j)(2). These exemptions..., and persons when DHS/TSA suspects or has confirmed that the security or confidentiality of an... entities where it would assist in the enforcement of civil or criminal laws. Additionally, DHS/TSA...

  11. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... records containing the results from TSA's intelligence-driven risk- based analysis of Secure Flight... CFR Sec. 1560. \\1\\ 77 FR 69491 (Nov. 19, 2012). Under sec. 4012(a)(1)-(2) of the Intelligence Reform... Intelligence Agency, the Secretary of the Treasury, and the Secretary of Defense. The Attorney General,...

  12. Improving the nuclear data base for non-proliferation and homeland security

    SciTech Connect

    Haight, Robert C; Bitteker, Leo J; Couture, Aaron J; Devlin, Matthew J; Fotiadis, Nikolaos; Gavron, Avigdor; Hill, Tony S; Laptev, Alexander B; Nelson, Ronald O; O'donnell, John M; Taddeucci, Terry N; Tovesson, Fredrik K; Ulmann, John L; Wender, Stephen A

    2009-01-01

    Many of the technical advances in non-proliferation and homeland security require calculations of transport of neutrons and gamma-rays through materials. The nuclear data base on which these calculations are made must be of high quality in order for the calculated responses to be credible. At the Los Alamos Neutron Science Center, three spallation neutron sources are being used to provide high-quality cross section and structure data with reactions induced by neutrons. Neutron transmission, neutron-induced fission and capture cross sections, neutron emission in fission, and gamma-ray production by neutrons are principal areas of research. Furthermore, these sources are also being used to validate calculations of the characterization and response of new detectors and detection techniques. Current research activities are summarized here.

  13. DHS Workshop -- Homeland Security: New Challenges for Decision Making Under Uncertainty

    SciTech Connect

    Wheeler, R; Edmunds, T; Howarth, S

    2004-02-20

    A workshop addressing the decision-making challenges confronted by the United States Department of Homeland Security (DHS) in the face of large uncertainties, complex value systems, and multiple stakeholders was held November 13-14, 2003, in Washington, D.C. Forty-six participants drawn from the DHS, other government agencies, universities, national laboratories, and the private sector attended the workshop. The goals were: (1) to develop a common understanding of the range of decisions DHS program elements must make; (2) to review selected examples of decision processes and approaches used by other organizations for similarly complex problems; and (3) to recommend steps DHS can take to ensure high quality decision making. The workshop brought together diverse perspectives on decision making in the context of complex risks. Participants included those who must make decisions affecting homeland security, those who have faced risky decisions in other domains, and those who have developed theoretical and practical approaches to high quality decision-making. The workshop was sponsored by the Science & Technology (S&T) Directorate, but was intended to address issues of concern to the three DHS operating directorates as well as S&T. The purpose of this breadth was to identify areas in which S&T capabilities and resources could be valuable to DHS as a whole. The workshop consisted of three main segments: (1) Presentations by managers from DHS Directorates, reflecting the diverse nature of decision making across DHS; (2) Presentations on four alternative approaches used to address problems in both government (counter-terrorism R&D investment; identification of critical capabilities in bioterrorism) and the private sector (corporate strategy development; terrorism insurance); and (3) Breakout groups chartered to identify barriers and propose actions to address them, in each of five decision classes: (1) Portfolio management; (2) Grant allocation; (3) Critical one

  14. Impact of Establishing the Department of Homeland Security: Mission and Budget Analysis of the Department of Defense and Other Government Agencies

    DTIC Science & Technology

    2004-12-01

    1 A. PURPOSE .........................................................................................................1 B...INTRODUCTION A. PURPOSE The purpose of this thesis is to assess the effects the Department of Homeland Security (DHS) has had on the mission and...security and to develop a comprehensive plan that would provide for the most beneficial organization structures for supporting U.S. homeland security

  15. 77 FR 33753 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection, DHS/CBP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-07

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security, U.S. Customs and...: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to establish a new Department...

  16. Neutron Generators Developed at LBNL for Homeland Security andImaging Applications

    SciTech Connect

    Reijonen, Jani

    2006-08-13

    The Plasma and Ion Source Technology Group at Lawrence Berkeley National Laboratory has developed various types of advanced D-D (neutron energy 2.5 MeV), D-T (14 MeV) and T-T (0-9 MeV) neutron generators for wide range of applications. These applications include medical (Boron Neutron Capture Therapy), homeland security (Prompt Gamma Activation Analysis, Fast Neutron Activation Analysis and Pulsed Fast Neutron Transmission Spectroscopy) and planetary exploration with a sub-surface material characterization on Mars. These neutron generators utilize RF induction discharge to ionize the deuterium/tritium gas. This discharge method provides high plasma density for high output current, high atomic species from molecular gases, long life operation and versatility for various discharge chamber geometries. Four main neutron generator developments are discussed here: high neutron output co-axial neutron generator for BNCT applications, point neutron generator for security applications, compact and sub-compact axial neutron generator for elemental analysis applications. Current status of the neutron generator development with experimental data will be presented.

  17. APPLICATIONS OF CFD SIMULATIONS OF POLLUTANT TRANSPORT AND DISPERSION WITHIN AMBIENT URBAN BUILDING ENVIRONMENTS: INCLUDING HOMELAND SECURITY

    EPA Science Inventory

    There is presently much focus on Homeland Security and the need to understand how potential sources of toxic material are transported and dispersed in the urban environment. Material transport and dispersion within these urban centers is highly influenced by the buildings. Compu...

  18. Suicide Terrorism in America?: The Complex Social Conditions of This Phenomenon and the Implications for Homeland Security

    DTIC Science & Technology

    2014-11-05

    release; distribution is unlimited SUICIDE TERRORISM IN AMERICA?: THE COMPLEX SOCIAL CONDITIONS OF THIS PHENOMENON AND THE IMPLICATIONS FOR...SUBTITLE SUICIDE TERRORISM IN AMERICA?: THE COMPLEX SOCIAL CONDITIONS OF THIS PHENOMENON AND THE IMPLICATIONS FOR HOMELAND SECURITY 5. FUNDING...relations theory to the phenomenon of suicide terrorism and develops a framework that can be used to better understand the threat of suicide

  19. REPORT ON THE HOMELAND SECURITY WORKSHOP ON TRANSPORT AND DISPOSAL OF WASTES FROM FACILITIES CONTAMINATED WITH CHEMICAL AND BIOLOGICAL AGENTS

    EPA Science Inventory

    This report summarizes discussions from the "Homeland Security Workshop on Transport and Disposal of Wastes From Facilities Contaminated With Chemical or Biological Agents." The workshop was held on May 28-30, 2003, in Cincinnati, Ohio, and its objectives were to:

    .Documen...

  20. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-01

    ... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security... the provisions of the Privacy Act, as amended, this notice announces a renewal of an existing computer.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law...

  1. 75 FR 55290 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-031...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ... Exemptions; Department of Homeland Security/ALL-031 Information Sharing Environment Suspicious Activity... Sharing Environment Suspicious Activity Reporting Initiative System of Records'' and this proposed... establish a new DHS system of records titled, ``DHS/ALL-031 Information Sharing Environment (ISE)...

  2. A bill to establish a Chief Veterinary Officer in the Department of Homeland Security, and for other purposes.

    THOMAS, 111th Congress

    Sen. Akaka, Daniel K. [D-HI

    2010-04-27

    04/27/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (text of measure as introduced: CR S2709-2710) (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. Thinking Interestingly: The Use of Game Play to Enhance Learning and Facilitate Critical Thinking within a Homeland Security Curriculum

    ERIC Educational Resources Information Center

    Cozine, Keith

    2015-01-01

    Students of homeland security need to grasp a diverse body of knowledge and have a keen understanding of the variety of events and issues that impact how they can apply that knowledge. The goal of higher education should not just be about imparting knowledge but also about giving students tools and skill sets to "think interestingly" to…

  4. 75 FR 79947 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-031...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-21

    ....ncirc.gov . BITS Comment: BITS values the Department's commitment and efforts to improve information... of the accounting would therefore present a serious impediment to law enforcement efforts and/or...-sensitive information that could be detrimental to homeland security. (c) From subsection (e)(1)...

  5. The Homeland Security Ecosystem: An Analysis of Hierarchical and Ecosystem Models and Their Influence on Decision Makers

    DTIC Science & Technology

    2012-12-01

    Leave blank) 2 . REPORT DATE December 2012 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE THE HOMELAND SECURITY...20. LIMITATION OF ABSTRACT UU NSN 7540–01–280–5500 Standard Form 298 (Rev. 2 –89) Prescribed by ANSI Std. 239–18 ii THIS PAGE INTENTIONALLY... 2 II. LITERATURE REVIEW ...........................................................................................5 A. INTRODUCTION

  6. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-06-08

    Program ( PSGP ) provides funding for the protection of ports and port infrastructure from terrorism. It is intended to enhance risk management...government/grant/ psgp /index.shtm. 23 U.S. Department of Homeland Security, Grant Programs Directorate, FY2009 Overview Grant Application Guidance

  7. 75 FR 39184 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-029 Civil...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... provisions of Title VI of the Civil Rights Act of 1964. The Department's civil rights and civil liberties... Privacy Act of 1974 for the Department of Homeland Security/ALL--029 Civil Rights and Civil Liberties... Privacy Act for DHS/ALL--029 Civil Rights and Civil Liberties Records System......

  8. 76 FR 28795 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-18

    ... titled, ``Department of Homeland Security/United States Coast Guard-024 Auxiliary Database (AUXDATA... Coast Guard to track and report contact, activity, performance, and achievement information about the members of its volunteer workforce element, the United States Coast Guard Auxiliary. As a result of...

  9. 20 CFR 655.665 - Notice to the Department of Homeland Security and the Employment and Training Administration.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... this part. (2) ETA, upon receipt of the Administrator's notice shall, in the case of an attesting... Activities in U.S. Ports § 655.665 Notice to the Department of Homeland Security and the Employment and Training Administration. (a) The Administrator shall promptly notify the DHS and ETA of the entry of...

  10. 76 FR 39245 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Coast...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ....S. Coast Guard--008 Courts Martial Case Files System of Records; Correction AGENCY: Privacy Office.../U.S. Coast Guard--008 Courts Martial Case Files System of Records'' from certain provisions of the... system of records titled, ``Department of Homeland Security/U.S. Coast Guard -008 Courts Martial...

  11. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Office, Department of Homeland Security, Washington, DC 20528. The Headquarters components are: A Office..., Room 6883, U.S. Department of Commerce, Washington, DC 20230 2. FIRESTAT (formerly the Integrated.... Department of Energy, 1000 Independence Avenue, SW., Washington, DC 20585 1. Energy Assurance Office...

  12. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... Service--004 Protection Information System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of..., ``Department of Homeland Security/United States Secret Service--004 Protection Information System of Records.'' As a result of biennial review of this system, information has been updated within the categories...

  13. Integration of sensing and computing in an intelligent decision support system for homeland security defense

    SciTech Connect

    Wu, Qishi; Zhu, Mengxia; Rao, Nageswara S

    2009-04-01

    We propose an intelligent decision support system based on sensor and computer networks that incorporates various component techniques for sensor deployment, data routing, distributed computing, and information fusion. The integrated system is deployed in a distributed environment composed of both wireless sensor networks for data collection and wired computer networks for data processing in support of homeland security defense. We present the system framework and formulate the analytical problems and develop approximate or exact solutions for the subtasks: (i) sensor deployment strategy based on a two-dimensional genetic algorithm to achieve maximum coverage with cost constraints; (ii) data routing scheme to achieve maximum signal strength with minimum path loss, high energy efficiency, and effective fault tolerance; (iii) network mapping method to assign computing modules to network nodes for high-performance distributed data processing; and (iv) binary decision fusion rule that derive threshold bounds to improve system hit rate and false alarm rate. These component solutions are implemented and evaluated through either experiments or simulations in various application scenarios. The extensive results demonstrate that these component solutions imbue the integrated system with the desirable and useful quality of intelligence in decision making.

  14. System-on-chip-centric unattended embedded sensors in homeland security and defense applications

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Forrester, Thomas; Degrood, Kevin; Shih, Min-Yi; Walter, Kevin; Lee, Kang; Gans, Eric; Esterkin, Vladimir

    2009-05-01

    System-on-chip (SoC) single-die electronic integrated circuit (IC) integration has recently been attracting a great deal of attention, due to its high modularity, universality, and relatively low fabrication cost. The SoC also has low power consumption and it is naturally suited to being a base for integration of embedded sensors. Such sensors can run unattended, and can be either commercial off-the-shelf (COTS) electronic, COTS microelectromechanical systems (MEMS), or optical-COTS or produced in house (i.e., at Physical Optics Corporation, POC). In the version with the simplest electronic packaging, they can be integrated with low-power wireless RF that can communicate with a central processing unit (CPU) integrated in-house and installed on the specific platform of interest. Such a platform can be a human body (for e-clothing), unmanned aerial vehicle (UAV), unmanned ground vehicle (UGV), or many others. In this paper we discuss SoC-centric embedded unattended sensors in Homeland Security and military applications, including specific application scenarios (or CONOPS). In one specific example, we analyze an embedded polarization optical sensor produced in house, including generalized Lambertian light-emitting diode (LED) sources and secondary nonimaging optics (NIO).

  15. Sensing arrays based on integrated optics microresonators for homeland security applications

    NASA Astrophysics Data System (ADS)

    Klunder, Dion; Elders, Job; Burger, Gert-Jan; Amersfoort, Martin; Krioukov, Evgueni; Otto, Cees; Hoekstra, Hugo; Driessen, Alfred

    2004-03-01

    Integrated optics micoresonators (μ-resonators) are microstructures with dimensions typically in the order of tens of microns down to a few microns, whose response depends critically on optical wavelength and material properties. Recent experimental studies have shown that they are suitable as refractive index sensors, absorption sensors, and microresonator-assisted single and two-photon fluorescence. The absorption and fluorescence spectra are material-specific properties, that the devices can readily detect by using different excitation wavelengths. Therefore, the devices are suitable for non-specific agent detection. Due to their inherent small size and the ease of cascading several microresonators, they are suitable building blocks for a sensing array allowing sensing/detection of multiple quantities/agents on a single chip, by e.g., using different chemo-optical transduction layers on top of the microresonators. Such devices have a chip-area of only a few 100 μm2, making them suitable for sensing ultra-small analyte volumes (which is advantageous for bio-chemical sensing). In this contribution, sensing arrays based on integrated optics microresonators and their prospects for Homeland Security applications are discussed. Several device-concepts based on integrated optics microresonators will be treated. Their performance is analyzed using realistic parameters and experimental results of microresonator devices realized in silicon oxynitride (SiON) technology. The potential integration of theses devices with microelectronics, micro-mechanics and micro total analysis systems is discussed.

  16. Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery

    SciTech Connect

    Kolda, T; Brown, D; Corones, J; Critchlow, T; Eliassi-Rad, T; Getoor, L; Hendrickson, B; Kumar, V; Lambert, D; Matarazzo, C; McCurley, K; Merrill, M; Samatova, N; Speck, D; Srikant, R; Thomas, J; Wertheimer, M; Wong, P C

    2005-01-06

    The Department of Homeland Security (DHS) has vast amounts of data available, but its ultimate value cannot be realized without powerful technologies for knowledge discovery to enable better decision making by analysts. Past evidence has shown that terrorist activities leave detectable footprints, but these footprints generally have not been discovered until the opportunity for maximum benefit has passed. The challenge faced by the DHS is to discover the money transfers, border crossings, and other activities in advance of an attack and use that information to identify potential threats and vulnerabilities. The data to be analyzed by DHS comes from many sources ranging from news feeds, to raw sensors, to intelligence reports, and more. The amount of data is staggering; some estimates place the number of entities to be processed at 1015. The uses for the data are varied as well, including entity tracking over space and time, identifying complex and evolving relationships between entities, and identifying organization structure, to name a few. Because they are ideal for representing relationship and linkage information, semantic graphs have emerged as a key technology for fusing and organizing DHS data. A semantic graph organizes relational data by using nodes to represent entities and edges to connect related entities. Hidden relationships in the data are then uncovered by examining the structure and properties of the semantic graph.

  17. The use of stimulated electron emission (SEE) in homeland security applications

    NASA Astrophysics Data System (ADS)

    Ing, H.; Andrews, H. R.; Facina, M.; Lee, W. T.; Niu, H. W.

    2012-06-01

    Certain insulating solids can store a fraction of the absorbed energy when irradiated by ionizing radiation. The stored energy can be released subsequently by heating or optical stimulation. As a result, light may be emitted through Thermoluminescence (TL) or Optically-Stimulated Luminescence (OSL) and electrons may be emitted through Thermally-Stimulated Electron Emission (TSEE) or Optically-Stimulated Electron Emission (OSEE). TL and OSL are widely used in current radiation dosimetry systems. However, despite considerable research effort during the early 1970s, SEE was not commonly adopted for dosimetry applications. One of the main reasons is that SEE is a surface phenomenon, while luminescence is a bulk phenomenon, making SEE more susceptible to humidity, absorption of gases, minor physical defects and handling, both before and after irradiation. Nevertheless, it has been recognized that SEE may be useful for homeland security applications in nuclear forensics, where dose accuracy is not the primary performance metric. In this research, we are investigating the use of SEE for nuclear forensic applications. Many common materials, both natural and man-made, exhibit the phenomenon, providing an opportunity to use the environment itself as an in-situ radiation detector. We have designed and constructed a unique prototype reader for conducting SEE measurements. We have demonstrated that the SEE measurements from a variety of materials are quantitatively reproducible and correlated to radiation exposure. Due to the broad applicability of SEE, significant additional studies are warranted to optimize this novel technique for nuclear forensic and other applications.

  18. Accelerator mass spectrometry of Strontium-90 for homeland security, environmental monitoring, and human health

    SciTech Connect

    Tumey, S J; Brown, T A; Hamilton, T F; Hillegonds, D J

    2008-03-03

    Strontium-90 is one of the most hazardous materials managed by agencies charged with protecting the public from radiation. Traditional radiometric methods have been limited by low sample throughput and slow turnaround times. Mass spectrometry offers the advantage of shorter analysis times and the ability to measure samples immediately after processing, however conventional mass spectrometric techniques are susceptible to molecular isobaric interferences that limit their overall sensitivity. In contrast, accelerator mass spectrometry is insensitive to molecular interferences and we have therefore begun developing a method for determination of {sup 90}Sr by accelerator mass spectrometry. Despite a pervasive interference from {sup 90}Zr, our initial development has yielded an instrumental background of {approx} 10{sup 8} atoms (75 mBq) per sample. Further refinement of our system (e.g., redesign of our detector, use of alternative target materials) is expected to push the background below 10{sup 6} atoms, close to the theoretical limit for AMS. Once we have refined our system and developed suitable sample preparation protocols, we will utilize our capability in applications to homeland security, environmental monitoring, and human health.

  19. Compact Dielectric Wall Accelerator Development For Intensity Modulated Proton Therapy And Homeland Security Applications

    SciTech Connect

    Chen, Y -; Caporaso, G J; Guethlein, G; Sampayan, S; Akana, G; Anaya, R; Blackfield, D; Cook, E; Falabella, S; Gower, E; Harris, J; Hawkins, S; Hickman, B; Holmes, C; Horner, A; Nelson, S; Paul, A; Pearson, D; Poole, B; Richardson, R; Sanders, D; Stanley, J; Sullivan, J; Wang, L; Watson, J; Weir, J

    2009-06-17

    Compact dielectric wall (DWA) accelerator technology is being developed at the Lawrence Livermore National Laboratory. The DWA accelerator uses fast switched high voltage transmission lines to generate pulsed electric fields on the inside of a high gradient insulating (HGI) acceleration tube. Its high electric field gradients are achieved by the use of alternating insulators and conductors and short pulse times. The DWA concept can be applied to accelerate charge particle beams with any charge to mass ratio and energy. Based on the DWA system, a novel compact proton therapy accelerator is being developed. This proton therapy system will produce individual pulses that can be varied in intensity, energy and spot width. The system will be capable of being sited in a conventional linac vault and provide intensity modulated rotational therapy. The status of the developmental new technologies that make the compact system possible will be reviewed. These include, high gradient vacuum insulators, solid dielectric materials, SiC photoconductive switches and compact proton sources. Applications of the DWA accelerator to problems in homeland security will also be discussed.

  20. A Radiation Homeland Security Workshop Presented to the City of Berkeley Fire Department

    NASA Astrophysics Data System (ADS)

    Matis, Howard

    2005-04-01

    A radiation incident in a community, ranging from a transportation accident to a dirty bomb, is expected to be rare, but still can occur. First responders to such an incident must be prepared. City of Berkeley officials met with members of the Lawrence Berkeley National Laboratory staff and agreed that the laboratory participants would create material and teach it to all of their fire fighting staff. To design such a course, nuclear physicists, biologists and health physicists merged some of their existing teaching material together with previous homeland security efforts to produce a course that lasted one full day. The material was designed to help alleviate the myths and fear of radiation experienced by many first responders. It included basic nuclear physics information, biological effects, and methods that health physicists use to detect and handle radiation. The curriculum included several hands on activities which involved working directly with the meters the Berkeley Fire Department possessed. In addition, I will discuss some observations from teaching this course material plus some unusual problems that we encountered, such as suddenly the whole class responding to a fire.

  1. Homeland security application of the Army Soft Target Exploitation and Fusion (STEF) system

    NASA Astrophysics Data System (ADS)

    Antony, Richard T.; Karakowski, Joseph A.

    2010-04-01

    A fusion system that accommodates both text-based extracted information along with more conventional sensor-derived input has been developed and demonstrated in a terrorist attack scenario as part of the Empire Challenge (EC) 09 Exercise. Although the fusion system was developed to support Army military analysts, the system, based on a set of foundational fusion principles, has direct applicability to department of homeland security (DHS) & defense, law enforcement, and other applications. Several novel fusion technologies and applications were demonstrated in EC09. One such technology is location normalization that accommodates both fuzzy semantic expressions such as behind Library A, across the street from the market place, as well as traditional spatial representations. Additionally, the fusion system provides a range of fusion products not supported by traditional fusion algorithms. Many of these additional capabilities have direct applicability to DHS. A formal test of the fusion system was performed during the EC09 exercise. The system demonstrated that it was able to (1) automatically form tracks, (2) help analysts visualize behavior of individuals over time, (3) link key individuals based on both explicit message-based information as well as discovered (fusion-derived) implicit relationships, and (4) suggest possible individuals of interest based on their association with High Value Individuals (HVI) and user-defined key locations.

  2. Advanced shortwave infrared and Raman hyperspectral sensors for homeland security and law enforcement operations

    NASA Astrophysics Data System (ADS)

    Klueva, Oksana; Nelson, Matthew P.; Gardner, Charles W.; Gomer, Nathaniel R.

    2015-05-01

    Proliferation of chemical and explosive threats as well as illicit drugs continues to be an escalating danger to civilian and military personnel. Conventional means of detecting and identifying hazardous materials often require the use of reagents and/or physical sampling, which is a time-consuming, costly and often dangerous process. Stand-off detection allows the operator to detect threat residues from a safer distance minimizing danger to people and equipment. Current fielded technologies for standoff detection of chemical and explosive threats are challenged by low area search rates, poor targeting efficiency, lack of sensitivity and specificity or use of costly and potentially unsafe equipment such as lasers. A demand exists for stand-off systems that are fast, safe, reliable and user-friendly. To address this need, ChemImage Sensor Systems™ (CISS) has developed reagent-less, non-contact, non-destructive sensors for the real-time detection of hazardous materials based on widefield shortwave infrared (SWIR) and Raman hyperspectral imaging (HSI). Hyperspectral imaging enables automated target detection displayed in the form of image making result analysis intuitive and user-friendly. Application of the CISS' SWIR-HSI and Raman sensing technologies to Homeland Security and Law Enforcement for standoff detection of homemade explosives and illicit drugs and their precursors in vehicle and personnel checkpoints is discussed. Sensing technologies include a portable, robot-mounted and standalone variants of the technology. Test data is shown that supports the use of SWIR and Raman HSI for explosive and drug screening at checkpoints as well as screening for explosives and drugs at suspected clandestine manufacturing facilities.

  3. Creating a health care agenda for the Department of Homeland Security.

    PubMed

    Noji, Eric K

    2003-11-01

    The challenge before us at DHS--to optimize use of our resources to create an effective health response to terrorist incidents--is formidable. After spending several weeks in Baghdad and seeing all the problems that arise in establishing a new government, I found myself thinking, "This is going to take years." Then, when I returned to the United States, Surgeon General Vice Adam. Richard Carmona, MD, MPH, almost immediately assigned me to the new Department of Homeland Security, adding that the problems it faced were probably worse than those in Baghdad. "That is impossible," I thought. "There's no way this could present a greater logistical, organizational, cultural, and administrative challenge than establishing a new government in a country with no democratic tradition in its 5,000-year history!" Within two days of my appointment to the new department, however, I recognized the accuracy of the surgeon general's statement. We will, however, work diligently toward our goals. During the next couple of years, a major DHS priority will be state and local preparedness, which includes rapid identification of epidemics, improved training, the establishment of liaisons with other first responders such as fire, rescue, law enforcement, and emergency medical services teams, and implementing state-of-the-art communication, disease alert, and reporting systems. Table 2 constitutes a checklist for bioterrorism preparedness, from a public health perspective. Local response and coordination with federal authorities and the issues inherent in these efforts are discussed in depth in the presentations that begin on the following page of this publication.

  4. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    NASA Astrophysics Data System (ADS)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  5. An Examination of Four Successes in the Coast Guard’s Innovation Program and Implications for Innovation within Homeland Security

    DTIC Science & Technology

    2008-03-01

    Successes in the Coast Guard’s Innovation Program and Implications for Innovation within Homeland Security 6. AUTHOR( S ) Christopher Kluckhuhn 5...FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) Naval Postgraduate School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT...NUMBER 9. SPONSORING /MONITORING AGENCY NAME( S ) AND ADDRESS(ES) N/A 10. SPONSORING/MONITORING AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES

  6. The Significance of Fire Service Culture as an Impediment to Effective Leadership in the Homeland Security Environment

    DTIC Science & Technology

    2012-03-01

    Congress vested the Department of Homeland Security with responsibilities such as leading and managing change, planning change, initiating change, and...the collective’s responsibility for leading . This perspective is more consistent with current notions of society and the recognition of a global...there is no single right way to lead . A leadership style that is effective in one situation may not be as effective in another situation. Leadership

  7. A bill to authorize the Secretary of Homeland Security to waive certain provisions of the pre-September 11, 2001, fire grant program, and for other purposes.

    THOMAS, 111th Congress

    Sen. Dodd, Christopher J. [D-CT

    2009-05-14

    05/14/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. How Should Public Administration Education Curriculum Within Indiana Higher Education Institutions Evolve to Reflect the Complex Homeland Security Issues Faced by Future Public Sector Employees?

    DTIC Science & Technology

    2012-03-01

    1 A. PROBLEM STATEMENT .............................................................................1 B. RESEARCH ...5 B. SIGNIFICANCE OF RESEARCH ................................................................7 C. METHOD...designed to provide cutting-edge and innovative research and publications on homeland security issues and subjects, and in offering courses on

  9. 78 FR 25282 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-008...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-30

    ... private sector in disaster management pursuant to 6 U.S.C. 313(b)(2); added (H)(6) to facilitate the... uses; incorporate congressionally mandated routine uses per 42 U.S.C. 5714(f)(2) as to sharing.... Background In accordance with the Privacy Act of 1974, 5 U.S.C. 552a, the Department of Homeland...

  10. The Road Less Traveled: Exploring the Experiences and Successes of Women Leaders in Homeland Security

    DTIC Science & Technology

    2013-03-01

    from unconscious stereotypes , inadequate access to support networks, inflexible workplace structures, and sexual harassment.26 Minority women cited...Leaders, Leadership, Workforce, Women, Gender , Grounded Theory, Diversity, Mentoring, Role Models 15. NUMBER OF PAGES 117 16. PRICE CODE 17...93 ix LIST OF FIGURES Figure 1. Participants, by Gender , in the Center for Homeland Defense

  11. Measuring Preparedness: Assessing the Impact of the Homeland Security Grant Program

    DTIC Science & Technology

    2009-03-01

    collaborative effort between the federal, state 121 Mark Gerencser, Reginald Van Lee, Fernando Napolitano, and...preparedness system. Mark Gerencser, Reginald Van Lee, Fernando Napolitano and Christopher Kelly recently released a book that could assist homeland...Gerencser, Mark, Reginald Van Lee, Fernando Napolitano, and Christopher Kelly. Megacommunities: How Leaders of Government, Business, and Non-profits

  12. 7 CFR 2.95 - Director, Office of Homeland Security and Emergency Coordination.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information systems technology and National Security Systems to support USDA executive crisis management... matters of a national security, natural disaster, other emergencies, and agriculture/food-related... planning and response for food science professionals and veterinarians; administer a funded...

  13. HOMELAND SECURITY: Challenges and Strategies in Addressing Short- and Long-Term National Needs

    DTIC Science & Technology

    2007-11-02

    air travel has already prompted attention to chronic problems with airport security that we and others have been pointing to for years. Moreover, the...capital for certain areas such as intelligence, public health and airport security will also be necessary as well to foster and maintain the skill...Weaknesses in Airport Security and Options for Assigning Screening Responsibilities, (GAO-01-1165T, Sept. 21, 2001). Aviation Security: Terrorist Acts

  14. Combating Terrorism in the Philippines to Improve U.S. Homeland Security

    DTIC Science & Technology

    2010-12-01

    the twentieth century when colonial rule transferred from Spain to the United States at the conclusion of the Spanish American War. The Spanish ...Major High-Tech Systems,” 2. Moro is a multiethnic identity comprised of members of 13 distinct language groups whose homeland is in the Southern...centuries. For centuries, the Spanish failed to spread their colonial roots into Mindanao and farther south, despite repeated attempts to do so. The

  15. Role of DoD Unmanned Aerial Vehicles for Homeland Security

    DTIC Science & Technology

    2010-02-16

    22 illegal aliens, 3 vehicles, and 2300 pounds of marijuana . The DHS gained its initial experience with medium altitude UAVs and found them to be...3,000 hours, directly contributing to nearly 4,800 arrests and the seizure of over 22,000 pounds of marijuana in support of the Department of Homeland...technology for UAVs to locate and identify toxic substances while the Department of Energy announced that it will test UAVs to detect potential

  16. 78 FR 17219 - Homeland Security Science and Technology Advisory Committee Meeting Cancellation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-20

    ..., such as new developments in systems engineering, cyber-security, ] knowledge management and how best to... the Under Secretary on policies, management processes, and organizational constructs as needed....

  17. 76 FR 10362 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-24

    ... Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION..., Reliability, and Interoperability Council (CSRIC) will hold its final meeting on March 14, 2011, at 9 a.m. in... and actions the FCC can take to ensure optimal security, reliability, and interoperability...

  18. Leveraging Successful Collaborative Processes to Improve Performance Outcomes in Large-Scale Event Planning: Super Bowl, A Planned Homeland Security Event

    DTIC Science & Technology

    2010-03-01

    Advisor Nola Joyce Second Reader Harold A. Trinkunas, PhD Chairman, Department of National Security Affairs iv THIS PAGE INTENTIONALLY...of Homeland Security DIA Defense Intelligence Agency DNI Director of National Intelligence DoD Department of Defense DOE Department of...Force MOU Memorandum of Understanding NPG National Preparedness Guidelines NCTC National Counterterrorism Center NFL National Football League

  19. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ... engineering, cyber-security, knowledge management and how best to leverage related technologies funded by... Committee Management Secretariat, General Services Administration. ADDRESSES: If you desire to submit... policies, management processes, and organizational constructs as needed. Upon request, the...

  20. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-04

    ... systems engineering, cyber-security, knowledge management and how best to leverage related technologies... Technology Directorate, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting... policies, management processes, and organizational constructs as needed. Agenda: Members will meet with...

  1. Counterterrorism Enhancement and Department of Homeland Security Authorization Act of 2010

    THOMAS, 111th Congress

    Rep. King, Peter T. [R-NY-3

    2010-06-24

    07/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Denationalized Citizenship Theory: What Is the Role of Citizenship Theory in Homeland Security?

    DTIC Science & Technology

    2011-12-01

    2011). Barney, Darin. "’Excuse Us if We don’t Give a Fuck ’: The (Anti-) Political Career of Participation.” Jeunesse: Young People, Texts, Cultures...Security Administration (TSA) officer at the airport in Lincoln, Nebraska watches as a middle age couple of apparent Asian descent and a young man...approach the security line. The young man stops short of entering the line but appears to explain the procedure for jacket and shoe removal, placing

  3. Immigrant Integration: A Missing Component of Homeland Security Strategy and Policy

    DTIC Science & Technology

    2010-03-01

    annual meeting of the MPSA Annual National Conference, Palmer House Hotel , Hilton , Chicago, IL. Retrieved on March 5, 2010, from http...radicalization, and resulting terrorist activity and highlights the current gap and pressing need to address this issue on a national level. Immigrant...which the process of radicalization may be halted prior to violent activity . Chapter III provides and analysis of the first case 17 study, the

  4. 76 FR 55693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-08

    ... magnetic disc, tape, digital media, and CD-ROM. Retrievability: Much of the data within this system does... media in the interest of the public. A review of this system is being conducted to determine if the... security analysis and reporting; Public source data including commercial databases, media, newspapers,...

  5. 77 FR 1942 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-12

    ... as new developments in systems engineering, cyber- security, knowledge management and how best to... chemical, biological, and cybersecurity threats, the human factors embedded in those threats and response... engineering), and their depth of experience in applying these areas of science and technology to real-...

  6. Homeland Security Department: FY2011 President’s Request for Appropriations

    DTIC Science & Technology

    2010-04-15

    program, the National Biosurveillance Integration System (NBIS), and the department’s occupational health and safety programs.87 Dr. Alexander G. Garza... Biosurveillance Integration Center; and the Rapidly Deployable Chemical Detection System.88 Issues for Congress BioWatch: Effectiveness and Deployment...20 23 Systems Acquisition 20 61 Radiation Portal Monitoring Program - 8 Securing the Cities 20 - Human Portable Radiation Detection

  7. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-07

    ... public comment period may end before the time indicated, following the last call for comments. To... Science and Technology, such as new developments in systems engineering, cyber-security, knowledge.... The agenda on December 5 focuses solely on the interaction between DHS S&T and Customs and...

  8. Compliance Issues and Homeland Security with New Federal Regulations for Higher Education Institutions

    ERIC Educational Resources Information Center

    Valcik, Nicolas A.

    2010-01-01

    Research advancements into different fields of study have increased the risks for accidents, criminal acts, or a potential breach of national security, and the types of hazardous materials (HAZMAT) stored and used at universities and colleges are under new scrutiny. Before, a chemistry laboratory might only have basic substances such as sulfur,…

  9. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-27

    ...-security, knowledge management and how best to leverage related technologies funded by other Federal agencies and by the private sector. It also advises the Under Secretary on policies, management processes.... ACTION: Committee management; notice of Federal Advisory Committee meeting. SUMMARY: On September...

  10. National Summit on Campus Public Safety. Strategies for Colleges and Universities in a Homeland Security Environment

    ERIC Educational Resources Information Center

    US Department of Justice, 2005

    2005-01-01

    The aftermath of September 11, 2001 prompted the reexamination of the nation's defenses and vulnerabilities in light of new realities. Every sector of society, particularly those who protect the well being of communities, required change. Safety and security operations on the nation's college and university campuses are no exception. The nation's…

  11. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    NASA Astrophysics Data System (ADS)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.

  12. Applying a Space-Based Security Recovery Scheme for Critical Homeland Security Cyberinfrastructure Utilizing the NASA Tracking and Data Relay (TDRS) Based Space Network

    NASA Technical Reports Server (NTRS)

    Shaw, Harry C.; McLaughlin, Brian; Stocklin, Frank; Fortin, Andre; Israel, David; Dissanayake, Asoka; Gilliand, Denise; LaFontaine, Richard; Broomandan, Richard; Hyunh, Nancy

    2015-01-01

    Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels that have not been compromised would be an important countermeasure to compromise of our critical network infrastructure. This paper describes a concept of operations by which the NASA Tracking and Data Relay (TDRS) constellation of spacecraft in conjunction with the White Sands Complex (WSC) Ground Station host a security recovery system for re-establishing secure network communications in the event of a national or regional cyberattack. Users would perform security and network restoral functions via a Broadcast Satellite Service (BSS) from the TDRS constellation. The BSS enrollment only requires that each network location have a receive antenna and satellite receiver. This would be no more complex than setting up a DIRECTTV-like receiver at each network location with separate network connectivity. A GEO BSS would allow a mass re-enrollment of network nodes (up to nationwide) simultaneously depending upon downlink characteristics. This paper details the spectrum requirements, link budget, notional assets and communications requirements for the scheme. It describes the architecture of such a system and the manner in which it leverages off of the existing secure infrastructure which is already in place and managed by the NASAGSFC Space Network Project.

  13. Defining the Role and Responsibility of the Fire Service Within Homeland Security

    DTIC Science & Technology

    2010-03-01

    also be made to improve our resilience to a wide range of emergencies, including the possibility of terrorist attack and the results of climate change ...and civil society institutions. Some of these issues have high global public profiles, such as climate change , cyber security, preparing for pandemics...This affords the manager the capacity to plan for alternative operating environments and to react to change is enhanced (Fahey & Randall, 1998

  14. Entropy and Self-Organization - An Open System Approach to the Origins of Homeland Security Threats

    DTIC Science & Technology

    2015-06-01

    theoretical approaches and facts, it will put together a picture of what that animal might look like—in other words, suggest a pattern in the gestalt ...222 Catarina Kinnvall, “Globalization and Religious Nationalism: Self, Identity, and the Search for Ontological Security. Political Psychology 25...Management Policy,” Culture & Psychology 12, no. 4 (2006): 421. 255 Moghaddam, How Globalization Spurs Terrorism, 97–98. 256 Moghaddam

  15. Assessing Grant Allocation Methods for Federal Homeland Security Urban Area Assistance Funding

    DTIC Science & Technology

    2015-12-01

    model, such as directly funding public safety and assessing relative need, could be applied in the United States as a pilot study. Similar to the...security grant program, HSGP, grant allocation factors, risk-based grants, relative risk rankings 15. NUMBER OF PAGES 87 16. PRICE CODE 17...funding public safety and assessing relative need, could be applied in the United States as a pilot study. Similar to the Department of Justice’s direct

  16. 1918 Flu Pandemic: Implications for Homeland Security in the New Millennium

    DTIC Science & Technology

    2007-05-09

    of the early findings revealed that essentially all flu viruses in circulation today represent genetic offspring of the1918 virus , but it seems clear...each year and that allows it to cross species is called reassortment.49 Reassortment occurs when two different viruses , say a human virus and a bird...the nation’s health and security. This paper reviews the 1918 pandemic, explores concerns about the avian influenza virus H5N1, and considers

  17. Mission Command: Retooling the Leadership Paradigm for Homeland Security Crisis Response?

    DTIC Science & Technology

    2015-03-01

    123 In addition, factors typical of the high-risk work environment may heighten the stress level of a leader, including sleep deprivation , long...SECURITY CRISIS RESPONSE? 6. AUTHOR(S) Philip A. Cocker 7. PERFORMING ORGANIZATION NA:i\\IIE(S) AND ADDRESS(ES) 8. PERFORiVIING Naval Postgraduate...historian Martin van Creveld and his identification of requirements for an organization to improve performance in a nonlinear or complex

  18. Domestic Aerial Surveillance and Homeland Security: Should Americans Fear the Eye in the Sky?

    DTIC Science & Technology

    2014-03-01

    2012), 185. 19 targeting ; rather, they can be utilized to illuminate location information to ground units equipped with IR goggles. Also...hindered.42 Predators are also equipped with surface search radars and ground moving target indicators, which allow operators to view terrain features...rather than from ground personnel. These systems are capable of autonomous anomaly detection , which greatly empowers security or law enforcement

  19. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... security threat assessment of law enforcement, immigration, and intelligence databases, including a fingerprint-based criminal history records check conducted through the Federal Bureau of Investigation (FBI... misidentification or inaccurate criminal or immigration records. Consistent with 28 CFR 50.12 in cases...

  20. Extra-light gamma-ray imager for safeguards and homeland security

    SciTech Connect

    Ivanov, Oleg P.; Semin, Ilya A.; Potapov, Victor N.; Stepanov, Vyacheslav E.

    2015-07-01

    Gamma-ray imaging is the most important way to identify unknown gamma-ray emitting objects in decommissioning, security, overcoming accidents. Over the past two decades a system for producing of gamma images in these conditions became more or less portable devices. But in recent years these systems have become the hand-held devices. This is very important, especially in emergency situations, and measurements for safety reasons. We describe the first integrated hand-held instrument for emergency and security applications. The device is based on the coded aperture image formation, position sensitive gamma-ray (X-ray) detector Medipix2 (detectors produces by X-ray Imaging Europe) and tablet computer. The development was aimed at creating a very low weight system with high angular resolution. We present some sample gamma-ray images by camera. Main estimated parameters of the system are the following. The field of view video channel ∼ 490 deg. The field of view gamma channel ∼ 300 deg. The sensitivity of the system with a hexagonal mask for the source of Cs-137 (Eg = 662 keV), is in units of dose D ∼ 100 mR. This option is less then order of magnitude worse than for the heavy, non-hand-held systems (e.g., gamma-camera Cartogam, by Canberra.) The angular resolution of the gamma channel for the sources of Cs-137 (Eg = 662 keV) is about 1.20 deg. (authors)

  1. Proposed New Accelerator Design for Homeland Security X-Ray Applications

    SciTech Connect

    Clayton, James; Shedlock, Daniel; Langeveld, Willem G.J.; Bharadwaj, Vinod; Nosochkov, Yuri

    2015-08-07

    In the security and inspection market, there is a push towards highly mobile, reduced-dose active interrogation scanning and imaging systems to allow operation in urban environments. To achieve these goals, the accelerator system design needs to be smaller than existing systems. A smaller radiation exclusion zone may be accomplished through better beam collimation and an integrated, x-ray-source/detector-array assembly to allow feedback and control of an intensity-modulated x-ray source. A shaped low-Z target in the x-ray source can be used to generate a more forward peaked x-ray beam. Electron-beam steering can then be applied to direct the forward-peaked x rays toward areas in the cargo with high attenuation. This paper presents an exploratory study to identify components and upgrades that would be required to meet the desired specifications, as well as the best technical approach to design and build a prototype.

  2. Proposed new accelerator design for homeland security x-ray applications

    SciTech Connect

    Clayton, James; Shedlock, Daniel; Langeveld, Willem G.J.; Bharadwaj, Vinod; Nosochkov, Yuri

    2015-01-01

    Two goals for security scanning of cargo and freight are the ability to determine the type of material that is being imaged, and to do so at low radiation dose. One commonly used technique to determine the effective Z of the cargo is dual-energy imaging, i.e. imaging with different x-ray energy spectra. Another technique uses the fact that the transmitted x-ray spectrum itself also depends on the effective Z. Spectroscopy is difficult because the energy of individual x rays needs to be measured in a very high count-rate environment. Typical accelerators for security applications offer large but short bursts of x-rays, suitable for current-mode integrated imaging. In order to perform x-ray spectroscopy, a new accelerator design is desired that has the following features: 1) increased duty factor in order to spread out the arrival of x-rays at the detector array over time; 2) x-ray intensity modulation from one delivered pulse to the next by adjusting the accelerator electron beam instantaneous current so as to deliver adequate signal without saturating the spectroscopic detector; and 3) the capability to direct the (forward peaked) x-ray intensity towards high-attenuation areas in the cargo (“fan-beam-steering”). Current sources are capable of 0.1% duty factor, although usually they are operated at significantly lower duty factors (~0.04%), but duty factors in the range 0.4-1.0% are desired. The higher duty factor can be accomplished, e.g., by moving from 300 pulses per second (pps) to 1000 pps and/or increasing the pulse duration from a typical 4 μs to 10 μs. This paper describes initial R&D to examine cost effective modifications that could be performed on a typical accelerator for these purposes, as well as R&D for fan-beam steering.

  3. Proposed new accelerator design for homeland security x-ray applications

    DOE PAGES

    Clayton, James; Shedlock, Daniel; Langeveld, Willem G.J.; ...

    2015-01-01

    Two goals for security scanning of cargo and freight are the ability to determine the type of material that is being imaged, and to do so at low radiation dose. One commonly used technique to determine the effective Z of the cargo is dual-energy imaging, i.e. imaging with different x-ray energy spectra. Another technique uses the fact that the transmitted x-ray spectrum itself also depends on the effective Z. Spectroscopy is difficult because the energy of individual x rays needs to be measured in a very high count-rate environment. Typical accelerators for security applications offer large but short bursts ofmore » x-rays, suitable for current-mode integrated imaging. In order to perform x-ray spectroscopy, a new accelerator design is desired that has the following features: 1) increased duty factor in order to spread out the arrival of x-rays at the detector array over time; 2) x-ray intensity modulation from one delivered pulse to the next by adjusting the accelerator electron beam instantaneous current so as to deliver adequate signal without saturating the spectroscopic detector; and 3) the capability to direct the (forward peaked) x-ray intensity towards high-attenuation areas in the cargo (“fan-beam-steering”). Current sources are capable of 0.1% duty factor, although usually they are operated at significantly lower duty factors (~0.04%), but duty factors in the range 0.4-1.0% are desired. The higher duty factor can be accomplished, e.g., by moving from 300 pulses per second (pps) to 1000 pps and/or increasing the pulse duration from a typical 4 μs to 10 μs. This paper describes initial R&D to examine cost effective modifications that could be performed on a typical accelerator for these purposes, as well as R&D for fan-beam steering.« less

  4. I-WASTE: EPA’s Suite of Homeland Security Decision Support Tools for the Waste and Disaster Debris Management and Disposal

    EPA Science Inventory

    In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major di...

  5. To amend the Homeland Security Act of 2002 to permit use of certain grant funds for training conducted in conjunction with a national laboratory or research facility.

    THOMAS, 112th Congress

    Rep. Lungren, Daniel E. [R-CA-3

    2012-05-18

    06/29/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  6. Transforming the U.S. Immigration System After 9/11: The Impact of Organizational Change and Collaboration in the Context of Homeland Security

    DTIC Science & Technology

    2008-12-01

    FUNCTIONAL LINES..........23 C. APPLYING ORGANIZATIONAL CHANGE THEORY TO MORE EFFECTIVELY ORGANIZE HOMELAND SECURITY STRUCTURES...USCIS Personnel Who were Hired Pre-2003 and Post- 2003: Comparing Their Perceptions on the Role of Leadership in Making Adjudicative Decisions...plays an important role in formulating how I make decisions and use my discretion in making adjudicative decisions on immigration petitions and

  7. Emergency Management: Status of School Districts' Planning and Preparedness. Testimony before the Committee on Homeland Security, House of Representatives. GAO-07-821T

    ERIC Educational Resources Information Center

    Ashby, Cornelia M.

    2007-01-01

    In this testimony before the House Committee on Homeland Security, the Director of the U.S. Government Accountability Office (GAO) discusses the status of school districts' planning and preparedness for emergencies. According to the testimony, federal and state governments support emergency management in school districts with a range of resources…

  8. Compact, rugged, and intuitive thermal imaging cameras for homeland security and law enforcement applications

    NASA Astrophysics Data System (ADS)

    Hanson, Charles M.

    2005-05-01

    Low cost, small size, low power uncooled thermal imaging sensors have completely changed the way the world views commercial law enforcement and military applications. Key applications include security, medical, automotive, power generation monitoring, manufacturing and process control, aerospace application, defense, environmental and resource monitoring, maintenance monitoring and night vision. Commercial applications also include law enforcement and military special operations. Each application drives a unique set of requirements that include similar fundamental infrared technologies. Recently, in the uncooled infrared camera and microbolometer detector areas, major strides have been made in the design and manufacture of personal military and law enforcement sensors. L-3 Communications Infrared Products (L-3 IP) is producing a family of new products based on the amorphous silicon microbolometer with low cost, low power, high volume, wafer-level vacuum packaged silicon focal plane array technologies. These bolometer systems contain no choppers or thermoelectric coolers, require no manual calibration, and use readily available commercial off-the-shelf components. One such successful product is the Thermal-Eye X100xp. Extensive market needs analysis for these small hand held sensors has been validated by the quick acceptability into the Law Enforcement and Military Segments. As well as this product has already been received, L-3 IP has developed a strategic roadmap to improve and enhance the features and function of this product to include upgrades such as the new 30-Hz, 30-μm pitch detector. This paper describes advances in bolometric focal plane arrays, optical and circuit card technologies while providing a glimpse into the future of micro hand held sensor growth. Also, technical barriers are addressed in light of constraints, lessons learned and boundary conditions. One conclusion is that the Thermal Eye Silicon Bolometer technology simultaneously drives weight

  9. The impact of geographic information systems on emergency management decision making at the U.S. Department of Homeland Security

    NASA Astrophysics Data System (ADS)

    King, Steven Gray

    Geographic information systems (GIS) reveal relationships and patterns from large quantities of diverse data in the form of maps and reports. The United States spends billions of dollars to use GIS to improve decisions made during responses to natural disasters and terrorist attacks, but precisely how GIS improves or impairs decision making is not known. This research examined how GIS affect decision making during natural disasters, and how GIS can be more effectively used to improve decision making for emergency management. Using a qualitative case study methodology, this research examined decision making at the U.S. Department of Homeland Security (DHS) during a large full-scale disaster exercise. This study indicates that GIS provided decision makers at DHS with an outstanding context for information that would otherwise be challenging to understand, especially through the integration of multiple data sources and dynamic three-dimensional interactive maps. Decision making was hampered by outdated information, a reliance on predictive models based on hypothetical data rather than actual event data, and a lack of understanding of the capabilities of GIS beyond cartography. Geospatial analysts, emergency managers, and other decision makers who use GIS should take specific steps to improve decision making based on GIS for disaster response and emergency management.

  10. Department of Homeland Security

    MedlinePlus

    ... Secretary Kelly’s Meeting With Salvadoran Foreign Minister Hugo Martinez And President Of The Legislative Assembly Guillermo Galleos ... F. Kelly met with Salvadoran Foreign Minister Hugo Martinez and President of the Legislative Assembly Guillermo Gallegos ...

  11. Homeland Security Presidential Directives

    EPA Pesticide Factsheets

    Three of these directives directly affect EPA's role in the national emergency response system: HSPD-5 Management of Domestic Incidents; HSPD-7 Critical Infrastructure Identification, Prioritization, and Protection; and HSPD-8 National Preparedness.

  12. Sampling and mass spectrometry approaches for the detection of drugs and foreign contaminants in breath for homeland security applications

    SciTech Connect

    Martin, Audrey Noreen

    2009-01-01

    Homeland security relies heavily on analytical chemistry to identify suspicious materials and persons. Traditionally this role has focused on attribution, determining the type and origin of an explosive, for example. But as technology advances, analytical chemistry can and will play an important role in the prevention and preemption of terrorist attacks. More sensitive and selective detection techniques can allow suspicious materials and persons to be identified even before a final destructive product is made. The work presented herein focuses on the use of commercial and novel detection techniques for application to the prevention of terrorist activities. Although drugs are not commonly thought of when discussing terrorism, narcoterrorism has become a significant threat in the 21st century. The role of the drug trade in the funding of terrorist groups is prevalent; thus, reducing the trafficking of illegal drugs can play a role in the prevention of terrorism by cutting off much needed funding. To do so, sensitive, specific, and robust analytical equipment is needed to quickly identify a suspected drug sample no matter what matrix it is in. Single Particle Aerosol Mass Spectrometry (SPAMS) is a novel technique that has previously been applied to biological and chemical detection. The current work applies SPAMS to drug analysis, identifying the active ingredients in single component, multi-component, and multi-tablet drug samples in a relatively non-destructive manner. In order to do so, a sampling apparatus was created to allow particle generation from drug tablets with on-line introduction to the SPAMS instrument. Rules trees were developed to automate the identification of drug samples on a single particle basis. A novel analytical scheme was also developed to identify suspect individuals based on chemical signatures in human breath. Human breath was sampled using an RTube{trademark} and the trace volatile organic compounds (VOCs) were preconcentrated using solid

  13. Development of an Autonomous Lidar Instrument for Use on a UAV Platform in Support of Homeland Security

    NASA Technical Reports Server (NTRS)

    McGill, Matthew; Famiglietti, Joe

    2005-01-01

    Researchers at NASA's Goddard Space Flight Center have developed an autonomous aerosol backscatter lidar instrument for use on the high-altitude ER-2 aircraft (for more information please visit http://cpl.gsfc.nasa.gov). Work is currently underway to transfer this instrument to a UAV platform such as Global Hawk. While the NASA applications are Earth science and satellite validation, there is clearly a Homeland Security application for such an instrument. One novel concept is to have a fleet of UAVs stationed around the country, each UAV having a payload including a lidar instrument. In the event of attack, the appropriate UAV(s) could be launched for purposes of, e.g., plume detection and tracking that are critical for decision support. While the existing lidar instrument is not directly capable of biological species discrimination, it is capable of plume tracking and thus can demonstrate to DHS the capabilities and utility of such instruments. Using NASA funding we will have an instrument ready to fly on Global Hawk by end of 2005. We would like to find partners, either within private industry or within DHS who would be willing to contribute aircraft access and flight hours for a demonstration flight. Longer-term partnerships to develop more advanced and more capable types of lidar instruments are also desirable. In this presentation we will detail the existing ER-2 lidar instrument and show measurement results, show the progress made on adapting to the Global Hawk platform, present concepts for DHS uses of such instruments, and openly pursue partnership opportunities.

  14. Theory to Practice: How Developing a K-12 Curriculum in Emergency Preparedness, Life Safety, or Homeland Security Can Lead to Resiliency

    DTIC Science & Technology

    2012-09-01

    230 million people affected by floods, winds, ice storms, earthquakes, drought, tsunami, and volcanic eruptions every year. (CRED, 2008) These are...Wave • Hurricane • Landslides • Mud Flows • Tornado • Tsunami • Volcanic Eruption Additionally, those areas involving human hazards would include...preparedness, homeland security, or disaster risk reduction could be a potential solution to develop a resilient America by starting with our young school aged

  15. Using DOD ISR Capabilities in Support of Homeland Security and Defense; Policy Challenges and Considerations for Effective Incident Awareness and Assessment

    DTIC Science & Technology

    2011-03-01

    CONOPS) that gives a brief overview of active duty and National Guard capabilities and processes for responding to homeland security contingencies...fire and the worst oil pollution disaster in history (James, 2010). More than 205 million gallons of raw crude oil are estimated to have gushed into...pertain to the employment of DoD airborne assets for DSCA missions. The DSCA Air Support Handbook provides an overview of the full spectrum of DoD

  16. Defense Science Board 2003 Summer Study on DoD Roles and Missions in Homeland Security. Volume 1

    DTIC Science & Technology

    2003-11-01

    complement to the capability of strategic reach against these asymmetric threats. However, the challenges of homeland protection are complex. There are...presence and influence, will drive the nation’s enemies to asymmetric attacks, including attacks on the homeland. "* Evidence suggests that weapons of mass...Deterrence is increasingly difficult to ensure. "* Asymmetric enemies have the capability to conduct a campaign against the United States that might include

  17. Wireless digital-ultrasonic sensors for proximity ID, access control, firearm control, and C3I in homeland security and law enforcement applications

    NASA Astrophysics Data System (ADS)

    Forcier, Bob

    2003-09-01

    This paper describes a new patent-pending digital-ultrasonic sensor network technology, which provides a "security protection sphere" around the authorized user(s) and the infrastructure system or system(s) to achieve C3I in Homeland Security and Law Enforcement Applications. If the system device, such as a firearm, a secure computer, PDA, or vehicle is misplaced, stolen or removed from the security protective sphere, an alarm is activated. A digital-ultrasonic sensor/tag utilizes the system"s physical structure to form a 2 to 20 Meter programmable protection sphere around the device and the authorized user. In addition, the system allows only authorized users to utilize the system, thereby creating personalized weapons, secure vehicle access or secure computer hardware. If an unauthorized individual accesses the system device, the system becomes inoperative and an alarm is activated. As the command and control, the authorized individual is provided a secure wristwatch/PDA. Access control is provided by "touch" and is controlled through the wristwatch/PDA/smartcard with a unique digital-ultrasonic coding and matching protocol that provides a very high level of security for each wireless sensor.

  18. A bill to direct the Comptroller General of the United States to conduct a study on the use of Civil Air Patrol personnel and resources to support homeland security missions, and for other purposes.

    THOMAS, 111th Congress

    Sen. Harkin, Tom [D-IA

    2009-03-25

    03/25/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. 76 FR 24901 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-DHS/USCG-002...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND... active duty suicidal behavior, work place violence incidents, critical incidents, and sexual assault... maintained by USCG Work-Life personnel on USCG Active Duty members who have demonstrated suicidal...

  20. Homeland Security Interagency Support. (Joint Center for Lessons Learned Quarterly Bulletin. Volume 4, Issue 2, March 2002)

    DTIC Science & Technology

    2002-03-01

    U.S. Capitol, the White House, and nuclear power facilities. In the United States and Europe, Disney amusement parks are likely targets. In Britain, the...appropriate when such attacks will involve small bands of individuals engaged in criminal acts within our homeland instead of stereotyped conventional

  1. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2010-04-30

    Port Security Grant Program The Port Security Grant Program ( PSGP ) provides funding for the protection of ports and port infrastructure from...Federal Emergency Management Agency, Port Security Grant Program: Overview, Washington, DC, 2008, http://www.fema.gov/government/grant/ psgp /index.shtm

  2. The role of the Department of Homeland Security, Science and Technology Directorate in the development of vaccines and diagnostics for Transboundary Animal Diseases.

    PubMed

    Colby, M; Coats, M; Brake, D; Fine, J

    2013-01-01

    The development of countermeasures to support an effective response to Transboundary Animal Diseases (TAD) poses a challenge on a global scale and necessitates the coordinated involvement of scientists from government, industry and academia, as well as regulatory entities. The Agricultural Defense Branch under the Chemical and Biological Defense Division (CBD) of the Department of Homeland Security (DHS), Science and Technology Directorate (S&T) supports this important mission within the United States. This article provides an overview of the Agricultural Defense Branch's vaccine and diagnostic TAD project.

  3. Directing the Secretary of Homeland Security to transmit to the House of Representatives all information in the possession of the Department of Homeland Security relating to the immigration status of any detainees and foreign persons suspected of terrorism.

    THOMAS, 111th Congress

    Rep. Rogers, Mike J. [R-MI-8

    2009-06-19

    07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. 75 FR 5614 - Privacy Act of 1974; Department of Homeland Security/ALL-025 Law Enforcement Authority in Support...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-03

    ... secured by DHS. The results are also used to pursue criminal prosecutions or civil penalty actions against... carry out national security, law enforcement, immigration, intelligence, or other functions consistent... person or entity involved in, or suspected of being involved in, criminal acts against the...

  5. U.S. national security through global technical engagement presentation to composite group A : homeland and international operations.

    SciTech Connect

    Abeyta, Henry J.

    2010-05-01

    This talk will discuss Sandia's Global Security Program focused on reducing proliferation and terrorism threats to U.S. national security through global technical engagement. Elements include nuclear and radiological risks, biological and chemical risks, and multi-threat risk reduction. Also, recent work addressing the need to better integrate nonproliferation, arms control, counterterrorism, and nuclear deterrent objectives will be discussed.

  6. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... the Privacy Act because of criminal, civil, and administrative enforcement requirements. This newly... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses... criminal, civil, and administrative enforcement requirements. This newly established system of records...

  7. 76 FR 70735 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-15

    ... customer service; increase efficiency for processing benefits; better identify potential national security... Immigration Services--016 Electronic Immigration System-3 Automated Background Functions System of Records... and Immigration Services--016 Electronic Immigration System-3 Automated Background Functions System...

  8. The Journal of the Naval Postgraduate School Center for Homeland Defense and Security. Volume 6. Issue 3

    DTIC Science & Technology

    2010-09-01

    security. Dr. Steiner has more than forty years of experience conducting, leading, managing , teaching, and evaluating intelligence. After retiring in 2005...perspective on the overriding question of “how do we manage the security mission in the face of perceived threats?” In “Organizational Innovations in...detected and responded to peripherally, by managing uncertainty and turning it to their advantage. This adaptive capacity is illustrated in how U.S

  9. Development of a Decision Support Tool to Inform Resource Allocation for Critical Infrastructure Protection in Homeland Security

    DTIC Science & Technology

    2008-06-01

    would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.” – The... health , emergency services, defense industrial base, banking and finance, chemicals and hazardous materials, and postal and shipping. A network is...links might represent water pipes or aqueducts . Figure 1 An example network 4 Threat, t, is the probability that an attack will be attempted

  10. Introducing the Future Now: Using Memetics and Popular Culture to Identify the Post-9/11 Homeland Security Zeitgeist

    DTIC Science & Technology

    2008-03-01

    the case within NCIS. Law and Order: Criminal Intent Episode 30 February 27, 2007 A reporter is poisoned with Polonium - 210 and the FBI joins the...of elected officials on the steps of the Capitol on September 12, 2001 after a news conference. 210 Other songs...and Rob Sheffield, Rolling Stone, June 24, 2004, http://www.rollingstone.com/news/story/6085455/the_moments (accessed November 29, 2007). 210 “In

  11. 77 FR 53893 - Privacy Act of 1974; Department of Homeland Security U.S. Immigration and Customs Enforcement-005...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-04

    ...'' system is maintained in a secure, web-based environment hosted by ICE. Foreign DARTTS permits authorized..., this information may also be disclosed externally to federal, state, local, tribal, territorial... consultation assistance from them regarding a matter within that person's former area of...

  12. 77 FR 47419 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-08

    ... ``Category of Individuals'' to remove USCIS employees and contractors, which are covered under the DHS/ALL... Compliance Tracking and Management System (CTMS) SORN (74 FR 24022); (5) updating the system location... Security, Washington, DC 20528. Instructions: All submissions received must include the agency name...

  13. Proceedings of the international conference on security documents for the 21st century

    SciTech Connect

    Burnett, M.N.; Sexton, N.A.; Goodman, C.A.; Johnson, C.K.; McNaull, R.M.; Graminski, E.L.; Seidel, M.J.

    1987-01-01

    The papers in this volume give conservative projections on future requirements from the users of security documents. Printers of security documents give requirements for advanced technologies. Design requirements for ink technology, counterfeit detection, and optical features in security documents are given. Costs of the new technologies are discussed. One thing that can be seen from this volume, according to the moderator of the conference, is the widespread desire to use some sort of optical device in future security documents. Thirty analytics were prepared for the sections of this report. (JDH)

  14. STIDP: A US Department of Homeland Security program for countering explosives attacks at large public events and mass transit facilities

    SciTech Connect

    Knudson, Christa K.; Kemp, Michael C.; Lombardo, Nicholas J.

    2009-03-07

    The Department of Homeland Security’s Standoff Technology Integration and Demonstration Program is designed to accelerate the development and integration of technologies, concepts of operations, and training to prevent explosives attacks at large public events and mass transit facilities. The program will address threats posed by suicide bombers, vehicle-borne improvised explosive devices, and leave-behind bombs. The program is focused on developing and testing explosives countermeasure architectures using commercial off-the-shelf and near-commercial standoff and remotely operated detection technologies in prototypic operational environments. An important part of the program is the integration of multiple technologies and systems to protect against a wider range of threats, improve countermeasure performance, increase the distance from the venue at which screening is conducted, and reduce staffing requirements. The program will routinely conduct tests in public venues involving successively more advanced technology, higher levels of system integration, and more complex scenarios. This paper describes the initial field test of an integrated countermeasure system that included infrared, millimeter-wave, and video analytics technologies for detecting person-borne improvised explosive devices at a public arena. The test results are being used to develop a concept for the next generation of integrated countermeasures, to refine technical and operational requirements for architectures and technologies, and engage industry and academia in solution development.

  15. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    DTIC Science & Technology

    2011-12-01

    December 2011 Thesis Advisor: Sam Clovis , Jr. Second Reader: Lauren Fernandez THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form...Approved by: Sam Clovis , Jr. Thesis Advisor Lauren Fernandez Second Reader Daniel Moran Chair, Department of National Security Affairs...continued education, and former Fire Commissioner Horace “Bud” Felton; a Navy man who encouraged me to apply to the program. Sam Clovis and Lauren

  16. Selected Papers Presented at MODSIM World 2011 Conference and Expo

    NASA Technical Reports Server (NTRS)

    Pinelli, Thomas E. (Compiler); Bullock, Leanna S. (Compiler)

    2012-01-01

    Selected papers from MODSIM World 2011 Conference & Expo are contained in this NASA Conference Publication (CP). MODSIM World 2011 was held in Virginia Beach, Virginia, October 11-14, 2011. The theme of the 2011 conference & expo was "Overcoming Critical Global Challenges with Modeling & Simulation". The conference program consisted of five technical tracks - Defense, Homeland Security & First Responders; Education; Health & Medicine; The Human Dimension; and Serious Games & Virtual Worlds.

  17. Human health risk assessment database, 'the NHSRC toxicity value database': Supporting the risk assessment process at US EPA's National Homeland Security Research Center

    SciTech Connect

    Moudgal, Chandrika J.

    2008-11-15

    The toxicity value database of the United States Environmental Protection Agency's (EPA) National Homeland Security Research Center has been in development since 2004. The toxicity value database includes a compilation of agent property, toxicity, dose-response, and health effects data for 96 agents: 84 chemical and radiological agents and 12 biotoxins. The database is populated with multiple toxicity benchmark values and agent property information from secondary sources, with web links to the secondary sources, where available. A selected set of primary literature citations and associated dose-response data are also included. The toxicity value database offers a powerful means to quickly and efficiently gather pertinent toxicity and dose-response data for a number of agents that are of concern to the nation's security. This database, in conjunction with other tools, will play an important role in understanding human health risks, and will provide a means for risk assessors and managers to make quick and informed decisions on the potential health risks and determine appropriate responses (e.g., cleanup) to agent release. A final, stand alone MS ACESSS working version of the toxicity value database was completed in November, 2007.

  18. The Level of Europium-154 Contaminating Samarium-153-EDTMP Activates the Radiation Alarm System at the US Homeland Security Checkpoints.

    PubMed

    Najeeb Al Hallak, Mohammed; McCurdy, Matt; Zouain, Nicolas; Hayes, Justin

    2009-08-28

    (153)Sm-EDTMP is a radiopharmaceutical composed of EDTMP (ethylenediamine-tetramethylenephosphonate) and Samarium-153 [1]. (153)Sm-EDTMP has an affinity for skeletal tissue and concentrates in areas with increased bone turnover; thus, it is successfully used in relieving pain related to diffuse bone metastases [1]. The manufacturing process of (153)Sm-EDTMP leads to contamination with (154)Eu (Europium-154) [2]. A previous study only alluded to the retention of (154)Eu in the bones after receiving treatment with (153)Sm-EDTMP [2]. Activation of the alarm at security checkpoints after (153)Sm-EDTMP therapy has not been previously reported. Two out of 15 patients who received (153)Sm-EDTMP at Roger Maris Cancer Center (Fargo, N. Dak., USA) activated the radiation activity sensors while passing through checkpoints; one at a US airport and the other while crossing the American-Canadian border. We assume that the (154)Eu which remained in the patients' bones activated the sensors. METHODS: In order to investigate this hypothesis, we obtained the consent from 3 of our 15 patients who received (153)Sm-EDTMP within the previous 4 months to 2 years, including the patient who had activated the radiation alarm at the airport. The patients were scanned with a handheld detector and a gamma camera for energies from 511 keV to 1.3 MeV. RESULTS: All three patients exhibited identical spectral images, and further analysis showed that the observed spectra are the result of (154)Eu emissions. CONCLUSION: Depending on the detection thresholds and windows used by local and federal authorities, the remaining activity of (154)Eu retained in patients who received (153)Sm-EDTMP could be sufficient enough to increase the count rates above background levels and activate the sensors. At Roger Maris Cancer Center, patients are now informed of the potential consequences of (153)Sm-EDTMP therapy prior to initiating treatment. In addition, patients treated with (153)Sm-EDTMP at Roger Maris Cancer

  19. To direct the Comptroller General of the United States to conduct a study on the use of Civil Air Patrol personnel and resources to support homeland security missions, and for other purposes.

    THOMAS, 111th Congress

    Rep. Dent, Charles W. [R-PA-15

    2009-02-25

    05/13/2009 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  20. Secure quantum signatures: a practical quantum technology (Conference Presentation)

    NASA Astrophysics Data System (ADS)

    Andersson, Erika

    2016-10-01

    Modern cryptography encompasses much more than encryption of secret messages. Signature schemes are widely used to guarantee that messages cannot be forged or tampered with, for example in e-mail, software updates and electronic commerce. Messages are also transferrable, which distinguishes digital signatures from message authentication. Transferability means that messages can be forwarded; in other words, that a sender is unlikely to be able to make one recipient accept a message which is subsequently rejected by another recipient if the message is forwarded. Similar to public-key encryption, the security of commonly used signature schemes relies on the assumed computational difficulty of problems such as finding discrete logarithms or factoring large primes. With quantum computers, such assumptions would no longer be valid. Partly for this reason, it is desirable to develop signature schemes with unconditional or information-theoretic security. Quantum signature schemes are one possible solution. Similar to quantum key distribution (QKD), their unconditional security relies only on the laws of quantum mechanics. Quantum signatures can be realized with the same system components as QKD, but are so far less investigated. This talk aims to provide an introduction to quantum signatures and to review theoretical and experimental progress so far.

  1. STIDP: A U.S. Department of Homeland Security program for countering explosives attacks at large public events and mass transit facilities

    NASA Astrophysics Data System (ADS)

    Knudson, Christa K.; Kemp, Michael C.; Lombardo, Nicholas J.

    2009-05-01

    The U.S. Department of Homeland Security's Standoff Technology Integration and Demonstration Program is designed to accelerate the development and integration of technologies, concepts of operations, and training to defeat explosives attacks at large public events and mass transit facilities. The program will address threats posed by suicide bombers, vehicle-borne improvised explosive devices, and leave-behind bombs. The program is focused on developing and testing explosives countermeasure architectures using commercial off-the-shelf and near-commercial standoff and remotely operated detection technologies in prototypic operational environments. An important part of the program is the integration of multiple technologies and systems to protect against a wider range of threats, improve countermeasure performance, increase the distance from the venue at which screening is conducted, and reduce staffing requirements. The program will routinely conduct tests in public venues involving successively more advanced technology, higher levels of system integration, and more complex scenarios. This paper describes the initial field test of an integrated countermeasure system that included infrared, millimeter-wave, and video analytics technologies for detecting person-borne improvised explosive devices at a public arena. The test results are being used to develop a concept for the next generation of integrated countermeasures, to refine technical and operational requirements for architectures and technologies, and engage industry and academia in solution development.

  2. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  3. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Astrophysics Data System (ADS)

    1985-07-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  4. National Strategy for Homeland Security

    DTIC Science & Technology

    2007-10-01

    United States through the Student and Exchange Visitor Information System ( SEVIS ) and have appropriate follow-up where there may be violations...Visitor Information System ( SEVIS ) is an internet-based system that is improving America’s ability to track and monitor foreign students and

  5. Environmental Issues in Homeland Security

    DTIC Science & Technology

    2007-11-02

    nation’s forests could be severe. “Water erosion is the main culprit...whole hillsides virtually turning to liquid and gushing down slope, wiping out...HSPD-5 Management of Domestic Incidents, February 28, 2003, Washington, D.C.: The White House, February 2003. 90 Ibid. 91 “ Overview , The National Oil...26 January 2003. 92 Ibid. 93 Elizabeth H. Howze, ”Agency for Toxic Substances and Disease Registry Overview ,” handout “About ATSDR,” Atlanta, Center

  6. Biosensor Systems for Homeland Security

    SciTech Connect

    Bruckner-Lea, Cindy J.

    2004-05-30

    The detection of biological agents is important to minimize the effects of pathogens that can harm people, livestock, or plants. In addition to pathogens distributed by man, there is a need to detect natural outbreaks. Recent outbreaks of SARS, mad cow disease, pathogenic E. coli and Salmonella, as well as the discovery of letters filled with anthrax spores have highlighted the need for biosensor systems to aid in prevention, early warning, response, and recovery. Rapid detection can be used to prevent exposure; and detection on a longer timescale can be used to minimize exposure, define treatment, and determine whether contaminated areas are clean enough for reuse. The common types of biological agents of concern include bacteria, spores, and viruses (Figure 1). From a chemist’s point of view, pathogens are essentially complex packages of chemicals that are assembled into organized packages with somewhat predictable physical characteristics such as size and shape. Pathogen detection methods can be divided into three general approaches: selective detection methods for specific identification such as nucleic acid analysis and structural recognition, semi-selective methods for broad-spectrum detection (e.g. physical properties, metabolites, lipids), and function-based methods (e.g. effect of the pathogen on organisms, tissues, or cells). The requirements for biodetection systems depend upon the application. While detect to warn sensors may require rapid detection on the order one minute, detection times of many minutes or hours may be suitable for determining appropriate treatments or for forensic analysis. Of course ideal sensor systems will meet the needs of many applications, and will be sensitive, selective, rapid, and simultaneously detect all agents of concern. They will also be reliable with essentially no false negatives or false positives, small, easy to use, and low cost with minimal consumables.

  7. Homeland Security Grant Review Act

    THOMAS, 111th Congress

    Rep. Carney, Christopher P. [D-PA-10

    2010-06-22

    06/28/2010 Referred to the Subcommittee on Emergency Communications, Preparedness, and Response. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Army Forces for Homeland Security

    DTIC Science & Technology

    2004-01-01

    Overview,” slide presentation at the RAND Corporation, Arlington, Va., June 19, 2002. Feiler , Jeremy, “National Guard Association: Governors Should...Challenge,” Carlisle, Pa.: Strategic Studies Institute, U.S. Army War College, 2001. Pirnie, Bruce R., and Corazon M. Francisco, Assessing Requirements for

  9. An input-output procedure for calculating economy-wide economic impacts in supply chains using homeland security consequence analysis tools.

    SciTech Connect

    Smith, Braeton J.; Vugrin, Eric D.; Loose, Verne W.; Warren, Drake E.; Vargas, Vanessa N.

    2010-10-01

    Sandia National Laboratories has developed several models to analyze potential consequences of homeland security incidents. Two of these models (the National Infrastructure Simulation and Analysis Center Agent-Based Laboratory for Economics, N-ABLE{trademark}, and Loki) simulate detailed facility- and product-level consequences of simulated disruptions to supply chains. Disruptions in supply chains are likely to reduce production of some commodities, which may reduce economic activity across many other types of supply chains throughout the national economy. The detailed nature of Sandia's models means that simulations are limited to specific supply chains in which detailed facility-level data has been collected, but policymakers are often concerned with the national-level economic impacts of supply-chain disruptions. A preliminary input-output methodology has been developed to estimate national-level economic impacts based upon the results of supply-chain-level simulations. This methodology overcomes two primary challenges. First, the methodology must be relatively simple to integrate successfully with existing models; it must be easily understood, easily applied to the supply-chain models without user intervention, and run quickly. The second challenge is more fundamental: the methodology must account for both upstream and downstream impacts that result from supply-chain disruptions. Input-output modeling typically estimates only upstream impacts, but shortages resulting from disruptions in many supply chains (for example, energy, communications, and chemicals) are likely to have large downstream impacts. In overcoming these challenges, the input-output methodology makes strong assumptions about technology and substitution. This paper concludes by applying the methodology to chemical supply chains.

  10. Improved Meteorological Input for Atmospheric Release Decision support Systems and an Integrated LES Modeling System for Atmospheric Dispersion of Toxic Agents: Homeland Security Applications

    SciTech Connect

    Arnold, E; Simpson, M; Larsen, S; Gash, J; Aluzzi, F; Lundquist, J; Sugiyama, G

    2010-04-26

    When hazardous material is accidently or intentionally released into the atmosphere, emergency response organizations look to decision support systems (DSSs) to translate contaminant information provided by atmospheric models into effective decisions to protect the public and emergency responders and to mitigate subsequent consequences. The Department of Homeland Security (DHS)-led Interagency Modeling and Atmospheric Assessment Center (IMAAC) is one of the primary DSSs utilized by emergency management organizations. IMAAC is responsible for providing 'a single piont for the coordination and dissemination of Federal dispersion modeling and hazard prediction products that represent the Federal position' during actual or potential incidents under the National Response Plan. The Department of Energy's (DOE) National Atmospheric Release Advisory Center (NARAC), locatec at the Lawrence Livermore National Laboratory (LLNL), serves as the primary operations center of the IMAAC. A key component of atmospheric release decision support systems is meteorological information - models and data of winds, turbulence, and other atmospheric boundary-layer parameters. The accuracy of contaminant predictions is strongly dependent on the quality of this information. Therefore, the effectiveness of DSSs can be enhanced by improving the meteorological options available to drive atmospheric transport and fate models. The overall goal of this project was to develop and evaluate new meteorological modeling capabilities for DSSs based on the use of NASA Earth-science data sets in order to enhance the atmospheric-hazard information provided to emergency managers and responders. The final report describes the LLNL contributions to this multi-institutional effort. LLNL developed an approach to utilize NCAR meteorological predictions using NASA MODIS data for the New York City (NYC) region and demonstrated the potential impact of the use of different data sources and data parameterizations on

  11. Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.

    SciTech Connect

    Koker, Denise; Micheau, Jill M.

    2006-07-01

    This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

  12. Kingston Conference on International Security (KCIS-2011): The Changing Arctic: Sovereignty, Resources, and Security

    DTIC Science & Technology

    2011-08-26

    peoples, such as the Inuit , have been accorded greater control of their own lives, while multilateral organizations have been crafted to provide a forum...stakeholders in the Inuit community, and not all of the agreements made between aboriginal groups and national governments have been honored. As a...North America and the Arctic Council”; and, (3) Udloriak Hanson from the Inuit Tapiriit Kanatami, “Sovereignty, Resource Development and Security

  13. 5 CFR 9701.518 - Duty to bargain, confer, and consult.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Duty to bargain, confer, and consult. 9701.518 Section 9701.518 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.518 Duty to bargain,...

  14. 5 CFR 9701.518 - Duty to bargain, confer, and consult.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Duty to bargain, confer, and consult. 9701.518 Section 9701.518 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.518 Duty to bargain,...

  15. 5 CFR 9701.518 - Duty to bargain, confer, and consult.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 3 2012-01-01 2012-01-01 false Duty to bargain, confer, and consult. 9701.518 Section 9701.518 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.518 Duty to bargain,...

  16. 5 CFR 9701.518 - Duty to bargain, confer, and consult.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 3 2014-01-01 2014-01-01 false Duty to bargain, confer, and consult. 9701.518 Section 9701.518 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.518 Duty to bargain,...

  17. How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains

    NASA Astrophysics Data System (ADS)

    Perry, William G.

    2006-04-01

    One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.

  18. Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event

    SciTech Connect

    A., B

    2008-07-31

    Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected

  19. To amend title 49, United States Code, to direct the Assistant Secretary of Homeland Security (Transportation Security Administration) to transfer unclaimed money recovered at airport security checkpoints to United Service Organizations, Incorporated, and for other purposes.

    THOMAS, 111th Congress

    Rep. Miller, Jeff [R-FL-1

    2009-04-30

    05/26/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Teleradiology network system using the web medical image conference system with a new information security solution

    NASA Astrophysics Data System (ADS)

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kusumoto, Masahiro; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki

    2012-02-01

    We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme and the tokenization as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of automatic backup. With automatic backup technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged due to the large area disaster like the great earthquake of Japan, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. Moreover, by using tokenization, the history information of dividing the confidential medical information into two or more tallies is prevented from lying scattered by replacing the history information with another character string (Make it to powerlessness). As a result, information is available only to those who have rightful access it and the sender of a message and the message itself are verified at the receiving point. We propose a new information transmission method and a new information storage method with a new information security solution.

  1. 5 CFR 9701.512 - Conferring on procedures for the exercise of management rights.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations §...

  2. 5 CFR 9701.512 - Conferring on procedures for the exercise of management rights.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations §...

  3. To require the Secretary of Homeland Security to establish a United States Citizenship and Immigration Services field office in Kodiak, Alaska.

    THOMAS, 111th Congress

    Rep. Young, Don [R-AK-At Large

    2010-03-19

    04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. 76 FR 66933 - Privacy Act of 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG-014 Military Pay...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ...; achievement and aptitude test results; academic performance records; correspondence course rate advancement records; military performance records; admissions processing records; grade reporting records; academic... Military Justice infractions; Performance evaluations; Background investigation, and security...

  5. How Data Mining Threatens Student Privacy. Joint Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives Serial No. 113-76 and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce, House of Representatives Serial No. 113-61, House of Representatives, One Hundred Thirteenth Congress, Second Session (June 25, 2014)

    ERIC Educational Resources Information Center

    US House of Representatives, 2015

    2015-01-01

    This paper presents the first joint hearing of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce. The subcommittees met to examine data collection…

  6. The Confusion of Homeland Security with Homeland Defense

    DTIC Science & Technology

    2009-03-24

    Although President Wilson refused Garrison’s full idea, he accepted a small increase in the Regular Army and the concept of a Continental Army. Another...about the American preoccupation with terrorism. According to Taleb in his book The Black Swan , humans “[have a] hardwired heritage”40 to learn specifics...Scholer, a deputy military legislative assistant for Senator Joseph Lieberman. The assertion was preceded by the statement that “[t]he United States will

  7. Homeland Defense and Homeland Security: Creating Unity of Effort

    DTIC Science & Technology

    2009-02-12

    the United States. In addition, Canada-based Asian DTOs are increasingly producing methamphetamine in very 8 large clandestine laboratories in...highest-ever recorded levels for coca and domestic marijuana eradication, and a reduction in the domestic production of methamphetamine since 2004...control over a much greater portion of the U.S. methamphetamine market. As domestic methamphetamine production has decreased, Mexican DTOs have

  8. Computer Security and the Data Encryption Standard. Proceedings of the Conference on Computer Security and the Data Encryption Standard.

    ERIC Educational Resources Information Center

    Branstad, Dennis K., Ed.

    The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…

  9. Global climate change and international security. Report on a conference held at Argonne National Laboratory, May 8--10, 1991

    SciTech Connect

    Rice, M.

    1991-12-31

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  10. 76 FR 61950 - Security Zones, 2011 Asia-Pacific Economic Cooperation Conference, Oahu, HI

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-06

    ... Conference, Oahu, HI AGENCY: Coast Guard, DHS. ACTION: Temporary interim rule; request for comments. SUMMARY... Cooperation Conference, Oahu, HI. (a) Locations. The following areas, from the surface of the water to...

  11. A Domestic Intelligence Agency for the United States? A Comparative Analysis of Domestic Intelligence Agencies and Their Implications for Homeland Security

    DTIC Science & Technology

    2007-06-01

    Future, 358-359. 86 Saikat Datta, “There Are No Secrets Here,” New Delhi Outlook, 19 November 2006, p.1; http://www.outlookindia.com. The Joint...security shake up,” 2. 101 Saikat Datta, “War Below the Radar,” New Delhi Outlook, 31 July 2006, p.1; http://www.outlookindia.com. 102 National... details . 105 Office of the Director of National Intelligence, The National Intelligence Strategy of the United States: Transformation through

  12. Strengthening National, Homeland, and Economic Security. Networking and Information Technology Research and Development Supplement to the President’s FY 2003 Budget

    DTIC Science & Technology

    2002-07-01

    Internet , the graphical user interface, high-end parallel processing, the first end-to-end optical networks, advanced computational modeling and...prototypes and drove straight through to the teams’ rendezvous site, arriving the morning of September 12. As things turned out, an overriding issue...vulnerabilities of today’s Internet with self-healing, trusted, high-bandwidth systems for secure U.S. commerce, communication, and connectivity

  13. Papers from the Conference on Homeland Protection

    DTIC Science & Technology

    2007-11-02

    facilitators, it needs to be closely monitored for the severity of the consequences. So in closing, I would like to end with a quote from Mahatma Gandhi . Our...Such a prioritization of effort is not a matter of “putting the strategic cart before the deterrence horse.” It is a matter of making it clear where...the horse and cart are going, how they 269 are going to get there, and what they going to do once they arrive. In that connection, it is important to

  14. Homeland security planning: what victory gardens and Fidel Castro can teach us in preparing for food crises in the United States.

    PubMed

    Endres, A Bryan; Endres, Jody M

    2009-01-01

    Two historical examples provide important insight into how federal government policies can integrate regional and local food systems to achieve food security during a time of acute crisis. During World War II, American home gardeners, through the federal government's Victory Garden program, supplied 40 percent of the nation's fresh produce, while simultaneously maintaining pre-war commodity production policies favoring large agricultural interests. The recent food crisis in Cuba, precipitated by the collapse of Soviet-bloc trade in the early 1990s, is another historical example that could inform U.S. policymakers on how to achieve food self-sufficiency through reemphasis on small farmers using sustainable practices supplemented with urban gardening. This article aims to ignite government action to strengthen and integrate regional and local food systems into federal food security planning so that citizens can be best prepared for a food emergency. The article first examines laws, regulations and policies put in place during World War II that employed regional and local food networks to satisfy a significant amount of civilian food supply needs. The article also looks at more recent Cuban efforts to achieve forced food self-reliance when, after the end of the Cold War, Soviet subsidies and preferential trading of energy and food supplies ceased almost overnight.

  15. 16th Department of Energy Computer Security Group Training Conference: Proceedings

    SciTech Connect

    Not Available

    1994-04-01

    Various topic on computer security are presented. Integrity standards, smartcard systems, network firewalls, encryption systems, cryptography, computer security programs, multilevel security guards, electronic mail privacy, the central intelligence agency, internet security, and high-speed ATM networking are typical examples of discussed topics. Individual papers are indexed separately.

  16. Special Reports; Homeland Security and Information Management; The Development of Electronic Government in the United States: The Federal Policy Experience; Digital Rights Management: Why Libraries Should Be Major Players; The Current State and Future Promise of Portal Applications; Recruitment and Retention: A Professional Concern.

    ERIC Educational Resources Information Center

    Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.

    2003-01-01

    Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…

  17. Local Homeland Event Response Operations Grant Act of 2009

    THOMAS, 111th Congress

    Sen. Murray, Patty [D-WA

    2009-06-04

    06/04/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. To amend title 49, United States Code, to establish a 10-year term of office for any individual appointed as the Assistant Secretary of Homeland Security (Transportation Security Administration), and for other purposes.

    THOMAS, 111th Congress

    Rep. Wolf, Frank R. [R-VA-10

    2010-01-13

    01/28/2010 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. To amend title 49, United States Code, to direct the Secretary of Homeland Security to carry out a program to ensure fair treatment in the security screening of individuals with metal implants traveling in air transportation.

    THOMAS, 111th Congress

    Rep. Oberstar, James L. [D-MN-8

    2009-05-07

    05/26/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. National Computer Security Conference Proceedings (11th): Computer Security--Into the Future, 17-20 October 1988

    DTIC Science & Technology

    1988-10-20

    should be subsetted in such a way " E4: only the agent permitted to that the special requirements of the certify entities may change the list Clark...subjects based on associated with a TP. An agent that <Userld, TP, CDI> triples can be can certify an entity may not have any introduced without...include attractiveness to threat agents , perceived value, possible outcomes concerned with ensuring the security of the information, rather than a

  1. National Computer Security Conference Proceedings (11th): A Postscript: Computer Security--Into the Future, 17-20 October 1988

    DTIC Science & Technology

    1988-10-20

    on each access. However, this could lead to a dis- physical structure of the database, not the integrity cretionary violation since the access...function checks the internal physical integrity Hanscom AFB, Bedford, Mass., 1972. 12 [BELL76] Bell, D.E. and LaPadula, "Secure Com- puter Systems...Doc’s; as appropriate, provides techni- Data Base Specs., & VV&T Plan and Specs; as ap - cal support to Project Manager & Sponser/User propriate, provides

  2. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  3. 33 CFR 106.220 - Security training for all other OCS facility personnel.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.220 Security training for all...

  4. 33 CFR 106.220 - Security training for all other OCS facility personnel.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.220 Security training for all...

  5. 33 CFR 106.220 - Security training for all other OCS facility personnel.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.220 Security training for all...

  6. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  7. 33 CFR 106.220 - Security training for all other OCS facility personnel.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.220 Security training for all...

  8. 33 CFR 106.235 - Maritime Security (MARSEC) Level coordination and implementation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.235 Maritime Security (MARSEC)...

  9. 33 CFR 106.235 - Maritime Security (MARSEC) Level coordination and implementation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.235 Maritime Security (MARSEC)...

  10. 33 CFR 106.235 - Maritime Security (MARSEC) Level coordination and implementation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.235 Maritime Security (MARSEC)...

  11. 33 CFR 106.235 - Maritime Security (MARSEC) Level coordination and implementation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.235 Maritime Security (MARSEC)...

  12. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  13. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  14. 33 CFR 106.235 - Maritime Security (MARSEC) Level coordination and implementation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.235 Maritime Security (MARSEC)...

  15. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  16. 33 CFR 106.220 - Security training for all other OCS facility personnel.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.220 Security training for all...

  17. Transportation Security Administration

    MedlinePlus

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? ... form Search the Site Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  18. Data Mining and Homeland Security: An Overview

    DTIC Science & Technology

    2007-01-18

    discounts to visit new destinations).9 Beyond these specific limitations, some researchers suggest that the circumstances surrounding our knowledge of...90 days providing details about the TIA CRS-8 27 The report is available at [http://www.eff.org/Privacy/TIA/TIA- report.pdf ]. Some of the information...foreign terrorists). The notice also states that CAPPS II could be “linked with the U.S. Visitor and Immigrant Status Indicator Technology (US- VISIT

  19. Data Mining and Homeland Security: An Overview

    DTIC Science & Technology

    2007-12-05

    need to make trips on short notice), family status (a sick relative needing care), or a hobby (taking advantage of last minute discounts to visit new...available at [http://www.eff.org/Privacy/TIA/TIA- report.pdf ]. Some of the information required includes spending schedules, likely effectiveness of the...notice also states that CAPPS II could be “linked with the U.S. Visitor and Immigrant Status Indicator Technology (US- VISIT ) program” to identify

  20. Data Mining and Homeland Security: An Overview

    DTIC Science & Technology

    2008-08-27

    trips on short notice), family status (a sick relative needing care), or a hobby (taking advantage of last minute discounts to visit new destinations...http://www.eff.org/Privacy/TIA/TIA- report.pdf ]. Some of the information required includes spending schedules, likely effectiveness of the program...The notice also states that CAPPS II could be “linked with the U.S. Visitor and Immigrant Status Indicator Technology (US- VISIT ) program” to identify

  1. Data Mining and Homeland Security: An Overview

    DTIC Science & Technology

    2007-03-28

    need to make trips on short notice), family status (a sick relative needing care), or a hobby (taking advantage of last minute discounts to visit new...details about the TIA CRS-8 27 The report is available at [http://www.eff.org/Privacy/TIA/TIA- report.pdf ]. Some of the information required includes...The notice also states that CAPPS II could be “linked with the U.S. Visitor and Immigrant Status Indicator Technology (US- VISIT ) program” to

  2. Data Mining and Homeland Security: An Overview

    DTIC Science & Technology

    2008-04-03

    trips on short notice), family status (a sick relative needing care), or a hobby (taking advantage of last minute discounts to visit new destinations).9...http://www.eff.org/Privacy/TIA/TIA- report.pdf ]. Some of the information required includes spending schedules, likely effectiveness of the program...states that CAPPS II could be “linked with the U.S. Visitor and Immigrant Status Indicator Technology (US- VISIT ) program” to identify individuals who are

  3. A Balanced Approach to Funding Homeland Security

    DTIC Science & Technology

    2014-12-01

    representing the benefits derived as a reduction in risk or the “biggest bang for the buck.” Risk reduction can be achieved by reducing threat (T...not, know the players and rally around them, providing strategies, experience, and money, not so they can pay their way to the big game but so they

  4. The State of Homeland Security 2007

    DTIC Science & Technology

    2007-01-01

    divisions. • The State of Biosecurity. The Department’s grade in this area is a B-. A robust biointelligence and biosurveillance capability must...critical DNDO methods to conduct Advanced Spectroscopic Portal Monitors (ASP) cost-benefit analysis. The Department must improve upon the...methodologies applied toward radiation portal monitors. The Department should also examine the possibilities and implications of aggressive deployment of

  5. Homeland Security Department: FY2006 Appropriations

    DTIC Science & Technology

    2005-06-29

    radiation portal monitors (RPMs) under the S&T Directorate, rather than under CBP; and provides an additional $241 million for Border Patrol staffing...125 million for technology to detect WMD. This request includes $77 million for the purchase of additional radiation portal monitors (RPMs), and the...primary portal for communicating with states, localities, and the private sector. Connectivity via the (continued...) and sharing of classified

  6. Homeland Security Department: FY2010 Appropriations

    DTIC Science & Technology

    2009-06-23

    the acquisition and operational utilization of trace detection portal (puffer) machines in favor WBI devices, privacy rights organizations and some...BioWatch program, the National Biosurveillance Integration System (NBIS), and the department’s occupational health and safety programs.127 OHA is...because unobligated funds are available from previous fiscal years and because secretarial certification of Advanced Spectroscopic Portal (ASP

  7. Homeland Security Department: FY2010 Appropriations

    DTIC Science & Technology

    2009-12-14

    technology. While the TSA has abandoned the acquisition and operational utilization of trace detection portal (puffer) machines in favor WBI devices... Biosurveillance Integration System (NBIS), and the department’s occupational health and safety programs.160 Dr. Alexander G. Garza, President Obama’s...and $98 million is for biosurveillance , BioWatch, medical readiness planning, chemical response, and other activities

  8. Homeland Security Department: FY2008 Appropriations

    DTIC Science & Technology

    2007-07-17

    for carry-on bags; whole body imaging; explosive trace detection portal machines; cast and prosthetic device scanners; and bottled liquid scanners. The...transferred from the Science and Technology Directorate (S&T), and the National Biosurveillance Integration System (NBIS), which will be transferred from...transfer of the Biosurveillance program/project activity (PPA) to the new Office of Health Affairs. In addition, funding for the new Office of Emergency

  9. Building Collaborative Capacity for Homeland Security

    DTIC Science & Technology

    2004-11-01

    46(3), 303-316. Schermerhorn , J. R. (1975). Determinants of Interorganizational Cooperation. Academy of Management Journal, 18(4), 846-856. 11/10...04 27 Schermerhorn , J. R. (1976). Openness to Interorganizational Cooperation - Study of Hospital Administrators. Academy of Management Journal, 19(2...225-236. Schermerhorn , J. R. (1977). Information Sharing as an Interorganizational Activity. Academy of Management Journal, 20(1), 148-153

  10. An Interagency Command for Homeland Security

    DTIC Science & Technology

    2002-04-01

    rule for many citizens during the initial hours of a large-scale CRBN [chemical, radiological, biological, or nuclear] incident” yet the “lack of an...official source of information on CRBN incidents has left the average citizen much less prepared, both intellectually and emotionally, than the

  11. Department of Homeland Security Appropriations Act, 2013

    THOMAS, 112th Congress

    Sen. Landrieu, Mary L. [D-LA

    2012-05-22

    05/22/2012 Placed on Senate Legislative Calendar under General Orders. Calendar No. 409. (All Actions) Notes: For further action, see H.R.2017, which became Public Law 112-33 on 9/30/2011. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Department of Homeland Security Appropriations Act, 2010

    THOMAS, 111th Congress

    Sen. Byrd, Robert C. [D-WV

    2009-06-18

    06/18/2009 Placed on Senate Legislative Calendar under General Orders. Calendar No. 83. (All Actions) Notes: For further action, see H.R.2892, which became Public Law 111-83 on 10/28/2009. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. Department of Homeland Security Semiannual Regulatory Agenda

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-26

    ... Regulations to require carriers and importers to provide to CBP, via a CBP-approved electronic data interchange system, information necessary to enable CBP to identify high-risk shipments to prevent smuggling... electronic registration program for petitions subject to numerical limitations contained in the...

  14. The Chemical Corps and Homeland Security

    DTIC Science & Technology

    2007-11-02

    129. 16 Authors recollections. 17 Sadayoshi Ohbu, MD et al, “Sarin Poisoning on Tokyo Subway,” 3 June 1997; Available from http://www.sma.org/ smj ...June 1997. Available from http://www.sma.org/ smj /97june3.htm; Internet. Accessed 7 October 2002. “PA Active Guard/Reserve Announcement AGR 4-2003

  15. European Approaches to Homeland Security and Counterterrorism

    DTIC Science & Technology

    2006-07-24

    Expulser les Imams ‘ Radicaux ,’” Le Monde, July 17-18, 2005, p. 2. 33 “Sarkozy Plans ‘Contracts’ for New Migrants,” Financial Times, Feb. 6, 2006, p. 4...hijackers lived and plotted in Hamburg and other parts of Germany for several years, taking advantage of liberal asylum policies, low levels of

  16. Homeland Security Transparency Act of 2009

    THOMAS, 111th Congress

    Rep. Weiner, Anthony D. [D-NY-9

    2009-01-21

    02/05/2009 Referred to the Subcommittee on Emergency Communications, Preparedness, and Response. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. Department of Homeland Security Appropriations Act, 2013

    THOMAS, 112th Congress

    Rep. Aderholt, Robert B. [R-AL-4

    2012-05-23

    06/11/2012 Received in the Senate. Read twice. Placed on Senate Legislative Calendar under General Orders. Calendar No. 426. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  18. The Proposed Homeland Security Budget for 2013

    DTIC Science & Technology

    2012-09-01

    category finances civil support teams and other military support to civil authorities to prepare for and react to incidents involving chemical...remainder would go to the PHSSEF and the FDA. The CDC is responsible for the Strategic National Stockpile, a repository of pharma - ceuticals, medical

  19. The Submersible Threat to Maritime Homeland Security

    DTIC Science & Technology

    2013-09-01

    development. Even the use of aircraft as weapons of war was incremental in nature until World War II when the Japanese employed the use of suicide pilots...image of the submarine Nautilus from the 1954 Walt Disney motion picture 20,000 Leagues under the Sea. Imagery like this can create vivid and exotic... Walt Disney’s 20,000 Leagues under the Sea: The Ride., n.d.) ...........48 Figure 17. DTO Operated Self-Propelled Semi-Submersible Vessel (From U.S

  20. The Department of Defense and Homeland Security

    DTIC Science & Technology

    2002-01-01

    militia on several occasions. The most serious test to the fledgling democracy came soon after the Convention, in the form of The Whiskey Rebellion ...law or support state requests for intervention can best be categorized as episodic. After The Whiskey rebellion , up through the Civil War, the primary...Massachusetts. This action, known as Shays Rebellion , which was eventually subdued, highlighted the weaknesses of the Confederation as well as Congress

  1. ETV - HOMELAND SECURITY EVALUATION OF CYANIDE DETECTORS

    EPA Science Inventory

    EPA's Environmental Technology Verification (ETV) Program was established in 1995 to objectively verify the performance of technologies that measure / monitor the quality of our environment, both for background or at suspected contamination site. The ETV program has established...

  2. Homeland Security Department: FY2007 Appropriations

    DTIC Science & Technology

    2006-05-10

    oil well drilling in Alaska’s National Wildlife Refuge ( ANWR ). Division D contained provisions that would have distributed the revenues from the ANWR ...After a contentious floor debate concerning the attachment of the ANWR provisions to the Defense Appropriations Bill, both Divisions C and D were

  3. Homeland Security Behind the Redwood Curtain

    DTIC Science & Technology

    2007-09-01

    drink, then put it firmly down on the porch railing and turned toward me. “You wouldn’t believe how they talk to their mama ,” he said angrily. “They...a little boy who has cancer . Keep in touch!” she said with a friendly wave good-bye. Rugged is an appropriate adjective to describe this county

  4. Homeland Security Planning for Urban Area Schools

    DTIC Science & Technology

    2008-03-01

    building. Nearly 1,000 cameras monitor them every day. Additionally, visitors must have their driver’s licenses scanned and identity compared to a...equally controversial recommendation is to arrest the families and friends of the terrorists once their identities are known. They advocate taking them...www.israelnationalnews.com/News/News.aspx/123480 (Accessed August 28, 2007), 1. 159 Mijal Grinberg , “Tamir Vows School Will Open On Schedule in Sderot

  5. Intelligence Sharing, Fusion Centers, and Homeland Security

    DTIC Science & Technology

    2008-06-01

    33  VI. INTELIGENCE SHARING-LAW ENFORCEMENT...more competitive . Again, specifics on the results are scarce sense the public report is not available yet and because participants had to sign a...and local law enforcement. 36 VI. INTELIGENCE SHARING-LAW ENFORCEMENT Intelligence-led policing Intelligence-led policing is defined as

  6. Department of Homeland Security Appropriations Act, 2014

    THOMAS, 113th Congress

    Rep. Carter, John R. [R-TX-31

    2013-05-29

    07/18/2013 Placed on Senate Legislative Calendar under General Orders. Calendar No. 140. (All Actions) Notes: For further action, see H.R.3547, which became Public Law 113-76 on 1/17/2014. Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  7. Department of Homeland Security Appropriations Act, 2015

    THOMAS, 113th Congress

    Rep. Carter, John R. [R-TX-31

    2014-06-19

    06/19/2014 Placed on the Union Calendar, Calendar No. 357. (All Actions) Notes: For further action, see H.R.83, which became Public Law 113-235 on 12/16/2014. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Department of Homeland Security Appropriations Act, 2015

    THOMAS, 113th Congress

    Sen. Landrieu, Mary L. [D-LA

    2014-06-26

    06/26/2014 Placed on Senate Legislative Calendar under General Orders. Calendar No. 443. (All Actions) Notes: For further action, see H.R.83, which became Public Law 113-235 on 12/16/2014. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference

    MedlinePlus

    ... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...

  10. Computer-aided diagnosis workstation and teleradiology network system for chest diagnosis using the web medical image conference system with a new information security solution

    NASA Astrophysics Data System (ADS)

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaro; Moriyama, Noriyuki

    2010-03-01

    Diagnostic MDCT imaging requires a considerable number of images to be read. Moreover, the doctor who diagnoses a medical image is insufficient in Japan. Because of such a background, we have provided diagnostic assistance methods to medical screening specialists by developing a lung cancer screening algorithm that automatically detects suspected lung cancers in helical CT images, a coronary artery calcification screening algorithm that automatically detects suspected coronary artery calcification and a vertebra body analysis algorithm for quantitative evaluation of osteoporosis. We also have developed the teleradiology network system by using web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. Our teleradiology network system can perform Web medical image conference in the medical institutions of a remote place using the web medical image conference system. We completed the basic proof experiment of the web medical image conference system with information security solution. We can share the screen of web medical image conference system from two or more web conference terminals at the same time. An opinion can be exchanged mutually by using a camera and a microphone that are connected with the workstation that builds in some diagnostic assistance methods. Biometric face authentication used on site of teleradiology makes "Encryption of file" and "Success in login" effective. Our Privacy and information security technology of information security solution ensures compliance with Japanese regulations. As a result, patients' private information is protected. Based on these diagnostic assistance methods, we have developed a new computer-aided workstation and a new teleradiology network that can display suspected lesions three-dimensionally in a short time. The results of this study indicate that our radiological information system without film by using computer-aided diagnosis

  11. Environmental Problems: A Global Security Threat. Report of the United Nations of the Next Decade Conference (24th, Hamilton Parish, Bermuda, June 18-23, 1989).

    ERIC Educational Resources Information Center

    Stanley Foundation, Muscatine, IA.

    The world's political structure and many economic practices are out of harmony with nature. This disharmony threatens environmentally sustainable growth and human survival. United Nations (UN) conference participants discussed the degree of political acceptance of concepts such as environmental security and sustainable development. Their reading…

  12. United States Security and Salt Two. Report of a Wingspread Conference (Racine, Wisconsin, February 9, 1979).

    ERIC Educational Resources Information Center

    McLain, Douglas, Jr.

    Eugene Rostow (Yale University) and David Tarr (University of Wisconsin) present their views concerning the wisdom and validity of U.S. security policies, including SALT, and the adequacy of the country's political/military planning. Rostow, representing the views of the Committee on the Present Danger, believes that America is losing the…

  13. Selected Papers and Presentations Presented at MODSIM World 2010 Conference Expo. Part 2

    NASA Technical Reports Server (NTRS)

    Pinelli, Thomas E. (Editor)

    2011-01-01

    MODSIM World 2010 was held in Hampton, Virginia, October 13-15, 2010. The theme of the 2010 conference & expo was "21st Century Decision-Making: The Art of Modeling& Simulation". The conference program consisted of seven technical tracks - Defense, Engineering and Science, Health & Medicine, Homeland Security & First Responders, The Human Dimension, K-20 STEM Education, and Serious Games & Virtual Worlds. Selected papers and presentations from MODSIM World 2010 Conference & Expo are contained in this NASA Conference Publication (CP). Section 8.0 of this CP contains papers from MODSIM World 2009 Conference & Expo that were unavailable at the time of publication of NASA/CP-2010-216205 Selected Papers Presented at MODSIM World 2009 Conference and Expo, March 2010.

  14. Selected Papers and Presentations Presented at MODSIM World 2010 Conference and Expo. Part 1

    NASA Technical Reports Server (NTRS)

    Pinelli, Thomas E. (Editor)

    2011-01-01

    MODSIM World 2010 was held in Hampton, Virginia, October 13-15, 2010. The theme of the 2010 conference & expo was "21st Century Decision-Making: The Art of Modeling& Simulation". The conference program consisted of seven technical tracks - Defense, Engineering and Science, Health & Medicine, Homeland Security & First Responders, The Human Dimension, K-20 STEM Education, and Serious Games & Virtual Worlds. Selected papers and presentations from MODSIM World 2010 Conference & Expo are contained in this NASA Conference Publication (CP). Section 8.0 of this CP contains papers from MODSIM World 2009 Conference & Expo that were unavailable at the time of publication of NASA/CP-2010-216205 Selected Papers Presented at MODSIM World 2009 Conference and Expo, March 2010.

  15. Transnationalism: Diaspora-Homeland Development

    ERIC Educational Resources Information Center

    Patterson, Rubin

    2006-01-01

    Based on detected correlations between the strategic collaboration of U.S.-based diasporas and their respective ancestral homelands on the one hand and the socioeconomic and technological development of those homelands on the other, this paper, which provides a conceptual foundation of the correlation, attempts to ignite a new area of research on…

  16. 77 FR 26641 - Aviation Security Advisory Committee (ASAC) Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-04

    ... 4, 2012 Part III Department of Homeland Security Transportation Security Administration Aviation... Aviation Security Advisory Committee (ASAC) Meeting AGENCY: Transportation Security Administration, DHS... Security Administration (TSA) will hold a meeting of the Aviation Security Advisory Committee (ASAC) on...

  17. Homeland Security as a Stock Market: Antifragility as a Strategy for Homeland Security

    DTIC Science & Technology

    2013-12-01

    Metaphors,” European Journal of Clinical Hypnosis 11, no. 1 (2011): 2–9. 43 Eric Steinhart, “Analogical Truth Conditions for Metaphors,” Metaphor...recent rare events are overestimated and thus overweighted because of confirmatory bias of memory . Kahneman uses examples such as playing the...lottery or terrorism to show how the vividness of memory can make “the actual probability inconsequential; only possibility matters.”122 Another

  18. People-First Homeland Security: Recalibrating for Community Collaboration and Engagement within a Homeland Security Ecosystem

    DTIC Science & Technology

    2014-12-01

    Community Oriented Policing Services, July 2010, http://www.cops.usdoj.gov/files/ RIC / Publications/e071021293_buildingcommtrust_revision.pdf. 14 Peter...Milgram, Psychology Today 2 (1967): 60. 264 Robert Cross and Andrew Parker , The Hidden Power of Social Networks (Boston, MA: Harvard Business School... Parker . The Hidden Power of Social Networks. Boston, MA: Harvard Business School Press, 2004. Crossett, Kristen M., Thomas J. Culliton, Peter C

  19. Homeland Security: The Department of Defense, The Department of Homeland Security and Critical Vulnerabilities

    DTIC Science & Technology

    2007-11-02

    Daniel M. Klippstein US Army Professor Bert Tussing Project Advisor The views expressed in this academic research paper are those of the author and do...Catastrophic consequences will result from departmental and interagency friction, if it produces excessive parochialism or procrastination . The Department of...these supporting strategies follow are: The Quadrennial Defense Review. (September 2001). This review, required every four years by Congress, sets the

  20. Control Systems Cyber Security Standards Support Activities

    SciTech Connect

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  1. The Haptic Lines of Homeland

    NASA Astrophysics Data System (ADS)

    Dawson, P.; Takatsuka, M.

    2013-02-01

    This paper discusses the conceptual underpinnings, working processes and the tools used for preparing the scene files of a holographic art work which offers a subjective view point on the idea of homeland. The art work, Homeland, an optically formed fringe digital hologram, which is contextualized by the holographic maps used in situational awareness, indicates its subjectivity by strongly referencing the human body, particularly the lines of the palm of the hand. ... because the body belongs to the order of things as the world is universal flesh. Maurice Merleau-Ponty

  2. 3 CFR 8938 - Proclamation 8938 of March 1, 2013. 10th Anniversary of the United States Department of Homeland...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... of the United States Department of Homeland Security 8938 Proclamation 8938 Presidential Documents Proclamations Proclamation 8938 of March 1, 2013 Proc. 8938 10th Anniversary of the United States Department of Homeland SecurityBy the President of the United States of America A Proclamation Ten years ago, when...

  3. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  4. To amend the Immigration and Nationality Act to extend the authority of the Secretary of Homeland Security to waive certain requirements under the visa waiver program for an additional 2 years.

    THOMAS, 111th Congress

    Rep. Quigley, Mike [D-IL-5

    2009-06-18

    07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. To amend the Immigration and Nationality Act with respect to a country that denies or unreasonably delays accepting the country's nationals upon the request of the Secretary of Homeland Security.

    THOMAS, 111th Congress

    Rep. Castle, Michael N. [R-DE-At Large

    2010-07-30

    09/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. National Computer Security Conference (15th) held in Baltimore, Maryland on October 13-16, 1992. Volume 1: Proceedings

    DTIC Science & Technology

    1992-10-16

    Captain James Goldston, USAF Dr. Joshua Guttman Dr. Grace Hammonds Douglas Hardie Ronda Henning Dr. Harold Highland, FICS Jack Holleran Hilary ... Hilary H. Hosmer, Data Security Inc. 379 A Model for the Measurement of Computer Security Posture Lee Sutterfield, Todd Schell, Gregory White, Kent...M. Doshi. The MITRE Corporation 409 The Multipolicy Paradigm Hilary H. Hosmer, Data Security Inc. 423 The Need for a Multilevel Secure

  7. National Information Systems Security Conference (19th) held in Baltimore, Maryland on October 22-25, 1996. Volume 2

    DTIC Science & Technology

    1996-10-25

    cryptography, viruses, research and development, policies , vulnerabilities and threat, assurance, security engineering, and much more. As our technology...information systems and networks and build a strong foundation to make security a credible value-added part of your enterprise such that security, policy ...Science Applications International Corporation Internet Firewalls Policy Development and Technology Choices 259 Leonard J. D’Alotto, GTE

  8. 33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area...

  9. 33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area...

  10. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  11. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  12. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  13. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  14. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  15. Proceedings of National Computer Security Conference Held in Washington, DC on 15-18 September 1986 (Computer Security - for Today and for Tomorrow

    DTIC Science & Technology

    1986-09-18

    Troxell . . . . . . . . . .. 37 The Challenge After A! A View of the Security Market , Mr. L. Fraim .. . . . . . . . . . . . . . . . . . . 41 SE/VMS...CHALLENGE AFTER Al A VIEW OF TIHE SECURITY MARKET Lester J. Fraim Honeywell Information Systems Federal Systems Division 7900 westpark Drive Mclean, Virginia...further demonstrate the provide complete solutions to the high end of effective use of the Scomp to meet a variety the market . Another key element in the

  16. Application of military uncooled infrared sensors to homeland defense

    NASA Astrophysics Data System (ADS)

    Hornberger, Chris

    2002-08-01

    During the early 1990's, uncooled microbolometer thermal imaging technology began a journey from Government and corporate laboratories to practical application in addressing military, Government, and commercial customer needs. Today, that transition could arguably be considered complete, punctuated by BAE SYSTEMS' delivery of the 10,000th microbolometer camera on 12 February 2002. While microbolometer developmental research continues to advance the state-of-the-art at an ever increasing pace, uncooled infrared cameras are widely deployed serving society in meaningful ways; from preventative maintenance and process inspection to law enforcement and rescue operations. Following last years terrorist attacks in New York and Virginia, President Bush appointed Governor Ridge to lead federal coordination efforts for defense of the homeland. While uncooled microbolometer sensors served in Homeland Security long before September 2001, it is certain that new applications will be identified for surveillance, security, law enforcement and protection needs. In this paper we will describe advances in military uncooled infrared sensor technology and how these sensors can serve in the role of Homeland Defense. Developments in uncooled sensors that will be described include the rugged performance validation of a thermal weapon sight and head-mounted imager. We will look at those areas of Homeland Defense that are most likely to benefit from the application of uncooled microbolometer thermal imaging sensor technology. These include: a) search & rescue camera systems, b) handheld surveillance systems and c) hands-free camera systems.

  17. 49 CFR 1580.101 - Rail security coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY RAIL TRANSPORTATION... any of this information changes. (e) Each freight railroad carrier, rail hazardous materials...

  18. 49 CFR 1580.201 - Rail security coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY RAIL TRANSPORTATION... any of this information changes. (e) Each passenger railroad carrier and rail transit system...

  19. The Role of National Guard in Defending the Homeland

    DTIC Science & Technology

    2002-04-09

    known as the Whiskey Rebellion .40 In 1992, more than 22,000 federal troops deployed to South Florida to help civilian officials deal with the aftermath...providing support to the nation in a variety of endeavors- from disaster relief, to medical research, to the quelling of rebellion . The homeland has not...always been secure, and military support has been necessary to protect civilians in the development of our nation. In Pennsylvania in 1794 , for example

  20. Homeland Defense: Continued Actions Needed to Improve Management of Air Sovereignty Alert Operations

    DTIC Science & Technology

    2012-01-01

    Better Outcomes, GAO-10-374T (Washington, D.C.: May 20, 2009); Aviation Security : DHS and TSA Have Researched, Developed and Begun Deploying Passenger... Security : TSA Has Made Progress, but Additional Efforts Are Needed to Improve Security. GAO-11-938T. Washington, D.C.: September 16, 2011. Aviation ...Washington, D.C.: October 23, 2009. Related GAO Products Homeland Defense DOD Tactical Aircraft Aviation Security Risk Management Related GAO

  1. 77 FR 6813 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-09

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee..., National Protection and Programs Directorate, Department of Homeland Security, 245 Murray Lane, Mail...

  2. 75 FR 16159 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-31

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee...: The President's National Security Telecommunications Advisory Committee (NSTAC) will hold its annual... Management Branch, Department of Homeland Security, 245 Murray Lane, SW., Washington, DC 20598-0615....

  3. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-17

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Advisory Committee Meeting; Correction. SUMMARY: The Department of Homeland Security published a document...'s National Security Telecommunications Advisory Committee (NSTAC). The document contained...

  4. 78 FR 16694 - Chemical Security Assessment Tool (CSAT)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... SECURITY Chemical Security Assessment Tool (CSAT) AGENCY: National Protection and Programs Directorate, DHS.... SUMMARY: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP), Infrastructure Security Compliance Division (ISCD), will...

  5. 75 FR 3913 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-25

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee...: The President's National Security Telecommunications Advisory Committee (NSTAC) will be meeting by... Communications System (Government Industry Planning and Management Branch), Department of Homeland Security,...

  6. 75 FR 29781 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-27

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee... meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC) will be...), Department of Homeland Security, 245 Murray Lane, SW., Washington, DC 20598-0615; Fax:...

  7. 77 FR 74678 - Chemical Security Assessment Tool (CSAT)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-17

    ... SECURITY Chemical Security Assessment Tool (CSAT) AGENCY: National Protection and Programs Directorate, DHS.... SUMMARY: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP), Infrastructure Security Compliance Division (ISCD), will...

  8. Teleradiology network system and computer-aided diagnosis workstation using the web medical image conference system with a new information security solution

    NASA Astrophysics Data System (ADS)

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki

    2011-03-01

    We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of RAID. With RAID technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. We can safely share the screen of workstation to which the medical image of Data Center is displayed from two or more web conference terminals at the same time. Moreover, Real time biometric face authentication system is connected with Data Center. Real time biometric face authentication system analyzes the feature of the face image of which it takes a picture in 20 seconds with the camera and defends the safety of the medical information. We propose a new information transmission method and a new information storage method with a new information security solution.

  9. Secure Chemical Facilities Act

    THOMAS, 111th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2010-07-15

    07/15/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Secure Chemical Facilities Act

    THOMAS, 112th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2011-03-31

    03/31/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Secure Chemical Facilities Act

    THOMAS, 113th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2013-01-23

    01/23/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. 76 FR 62311 - Ammonium Nitrate Security Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-07

    ...; ] DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 31 RIN 1601-AA52 Ammonium Nitrate Security...), entitled ``Ammonium Nitrate Security Program,'' which was published in the Federal Register on August 3... of ammonium nitrate pursuant to section 563 of the Fiscal Year 2008 Department of Homeland...

  13. National Computer Security Conference Proceedings (12th): Information Systems Security: Solutions for Today - Concepts for Tomorrow Held in Baltimore, Maryland on 10-13 October 1989

    DTIC Science & Technology

    1989-10-13

    is not without some risk. The main risk seems to be the relh_,e being placed upon the FITLS. Any flaws in it will adversely affect the security...bulletin board ware needs. Your supplier is (public domain software, well-known, widely used, and even vaccines !). A new has a good track record of sup...353 Specialized Software Many commercial vendors now offer " vaccine " programs, software designed to limit your computer’s exposure to virus programs

  14. 49 CFR 1554.103 - Security Directives.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security Directives. 1554.103 Section 1554.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT REPAIR STATION SECURITY Security...

  15. 49 CFR 1554.101 - Security Measures.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security Measures. 1554.101 Section 1554.101 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT REPAIR STATION SECURITY Security...

  16. One-Day Conference on School Safety & Security and Fair Dismissals Issues (Dayton, Ohio, June 24, 1999).

    ERIC Educational Resources Information Center

    Education Law Association, Dayton, OH.

    This booklet contains five chapters relating to issues in school safety and security, and fair dismissals: (1) "Ohio Legislation and Federal and State Decisions" (Richard J. Dickinson). Items of deliberation include financial matters, school safety issues, administrator and teacher contract matters, Title IX liability, school prayer, drug testing…

  17. Environmental Planning, Prevention and Disaster Response in The Arabian Gulf USCENTICOM’s Regional Environmental Security Conference

    DTIC Science & Technology

    2002-09-01

    Gen Ali Mohammed Al - Kaabi , Head of the United Arab Emirates Delegation. Figure 2. rec om men da tions to the GCC Armed Forces and USCENTCOM on ways to...ences in its area of re spon si bil ity. Two Cen tral Asia con fer ences es tab lished the re la tion ships that al lowed ac cess to the bases re quired...Issues Paper 09-02 MG Al -Attia, Chief of Staff, Qatar Armed Forces, Opens the Conference. Report Documentation Page Form ApprovedOMB No. 0704-0188

  18. National Computer Security Conference (16th) held at Baltimore Convention Center, Baltimore, Maryland on September 20-23, 1993. Proceedings

    DTIC Science & Technology

    1993-09-23

    focus this paper and sharpen its message. In particular we acknowledge Jeffrey Edelheit, Lester Fraim, Richard Graubart, Steve Lipner, Carol Oakes...Electronic Crime Prevention Robert Lau, Chairman National Security Agency Speakers Special Agent Jim Christy, AFS/OSI Special Agent Jack Lewis ...Computer Crime programs in the Department of Defense. Special Agent Jack Lewis will discuss programs in the Secret Service. Special Agent Mark Pollitt

  19. National Information Systems Security Conference (19th) held in Baltimore, Maryland on October 22-25, 1996. Volume 1

    DTIC Science & Technology

    1996-10-25

    Director Computer Systems Laboratory National Computer Security Center »,.— • , This Page Intentionally Left Blank 11 RISE OF THE MOBILE ...becoming a political and economic power in the global scene - a " mobile state", that rivals the multinational corporate giants in political and...evade prosecution. Like the nomadic tribes of antiquity, who used the mobility of their fast steeds to prey on organized societies, these criminal

  20. Threats at Our Threshold: Homeland Defense and Homeland Security in the New Century

    DTIC Science & Technology

    2006-10-21

    chiefs were fragmented and fundamentally separated. These divisions caused unhealthy competition between DoD organizations ranging from procurement to...of this option argue that such a change would likely be more cosmetic than substantive and might not ultimately provide sufficient focus on the non...have so far stood the test of time. Also, many of the Commission’s recommendations have been adopted. In our first year, we assessed the threat and