Science.gov

Sample records for homeland security conference

  1. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  2. 2008 Homeland Security S and T Stakeholders Conference West

    DTIC Science & Technology

    2008-01-16

    Cellucci , Chief Commercialization Officer DHS S&T Directorate Training Session 28: SBIR Tutorial Ms. Lisa Sobolewski, DHS S&T Training Session 29...Dr. Tom Cellucci Chief Commercialization Officer DHS S&T Directorate (confirmed) Training Workshop Track 2 Training Session 23 Homeland Security...Security Opportunities Moderator: Mr. Tom Cellucci Chief Commercialization Officer DHS S&T Directorate (confirmed) Panelists: Matt McCooe

  3. Homeland Security and Information.

    ERIC Educational Resources Information Center

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  4. Homeland Security and Information.

    ERIC Educational Resources Information Center

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  5. 2008 Homeland Security S and T Stakeholders Conference West-Volume 3 Tuesday

    DTIC Science & Technology

    2008-01-16

    Cellucci , Chief Commercialization Officer DHS S&T Directorate Training Session 28: SBIR Tutorial Ms. Lisa Sobolewski, DHS S&T Training Session 29...DHS S&T Dr. Tom Cellucci Chief Commercialization Officer DHS S&T Directorate (confirmed) Training Workshop Track 2 Training Session 23 Homeland...Harnessing Global Security Opportunities Moderator: Mr. Tom Cellucci Chief Commercialization Officer DHS S&T Directorate (confirmed) Panelists: Matt

  6. 2008 Homeland Security S and T Stakeholders Conference West. Volume 4. Wednesday

    DTIC Science & Technology

    2008-01-16

    Cellucci , Chief Commercialization Officer DHS S&T Directorate Training Session 28: SBIR Tutorial Ms. Lisa Sobolewski, DHS S&T Training Session 29...DHS S&T Dr. Tom Cellucci Chief Commercialization Officer DHS S&T Directorate (confirmed) Training Workshop Track 2 Training Session 23 Homeland...Harnessing Global Security Opportunities Moderator: Mr. Tom Cellucci Chief Commercialization Officer DHS S&T Directorate (confirmed) Panelists: Matt

  7. U.S. Homeland Security R&D Budgets

    SciTech Connect

    Halvorson, C S

    2009-03-30

    The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.

  8. Homeland Security Technical Group update and a snapshot of Homeland Security research budgets

    NASA Astrophysics Data System (ADS)

    Saito, Theodore T.

    2006-05-01

    An overview of this conference (#6203) will include an overview of the program. A summary of the background and activities of SPIE's Global Homeland Security Technical Group, especially the Port and Harbor Security and Drinking Water Safety sub-committees will be included. Highlights and interesting aspects of the FY 06 & 07 Department of Homeland Security Budgets will be briefly discussed as well as the FY 07 Federal R&D budget focusing on Homeland Security.

  9. Homeland Security A Selected Bibliography

    DTIC Science & Technology

    2006-05-01

    Constructing Consensus: Homeland Security as a Symbol of Government Politics and Administration.” Government Information Quarterly 22 (2005): 152... Information Quarterly 21, no. 4 (2004): 420-438. Available from Wilson OmniFile. Relyea, Harold C. “Organizing for Homeland Security.” Presidential...169. Available from Wilson OmniFile. Relyea, Harold C. “Homeland Security and Information Sharing: Federal Policy Considerations.” Government

  10. 77 FR 59627 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-28

    ... Cyber Skills Task Force. DATES: The HSAC conference call will take place from 4 p.m. to 5 p.m. EDT on... matters related to homeland security. The HSAC will meet to review and deliberate on the Cyber Skills Task... (202) 447-3135. HSAC conference call details and the Cyber Skills Task Force report will be provided to...

  11. Department of Homeland Security

    MedlinePlus

    ... National Cybersecurity Awareness Month 1 October is National Cyber Security Awareness Month. HP - SCF 2017 Hurricanes HP - SCF ... theme is, “Inclusion Drives Innovation.” Oct 10 Blog Cyber Security Awareness Month Is Here You do not have ...

  12. Structuring Homeland Security

    DTIC Science & Technology

    2002-04-09

    20 AIRPORT SECURITY .............................................................................................. 20...using an existing command and control structure. Since September 11, 2001 airport security has been of heightened importance to the American public...In order to use Reserves to provide airport security the airports themselves should be made federal property. This would allow greater flexibility for

  13. 76 FR 58813 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-22

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of open teleconference Federal Advisory Committee meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will... message. Fax: (202) 282-9207 Mail: Homeland Security Advisory Council, Department of Homeland Security...

  14. 75 FR 59278 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-27

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of Closed Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will meet on... message. Fax: (202) 282-9207. Mail: Homeland Security Advisory Council, Department of Homeland Security...

  15. 75 FR 26782 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-12

    ... No: 2010-11293] DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0039] Homeland Security Advisory... Committee Meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will meet via teleconference for the purpose of reviewing the final report of the HSAC's Quadrennial (Homeland Security) Review...

  16. Homeland Security and Defense Applications

    SciTech Connect

    2014-11-06

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  17. Homeland Security and Defense Applications

    ScienceCinema

    None

    2016-07-12

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  18. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-02

    ... SECURITY Homeland Security Information Network Advisory Committee AGENCY: Department of Homeland Security... Applicants for Appointment to Homeland Security Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network...

  19. Changing Homeland Security: In 2010, Was Homeland Security Useful?

    DTIC Science & Technology

    2011-02-01

    noteworthy puzzle has given rise to a crisis.”22 September 11, 2001 was the initial crisis that opened the door to homeland security as a potential new...2010 scientists made a reasonable interpretation of the color of a dinosaur , created a synthetic self-replicating form of life, decoded another drug

  20. Homeland Security and Civil Liberties

    DTIC Science & Technology

    2004-06-01

    liberties, immigration policy, privacy issues, first amendment rights, and the balance of executive and judicial power in relation to civil liberties and...homeland security is extraordinarily complex with immigration policy, criminal law, privacy, First Amendment , and separation of powers dimensions

  1. 77 FR 64532 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-22

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of open teleconference Federal advisory committee meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will... in the subject line of the message. Fax: (202) 282-9207 Mail: Homeland Security Advisory Council...

  2. 75 FR 2880 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-19

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Committee management; Notice of partially closed federal advisory committee meeting. SUMMARY: The Homeland Security Advisory.... E-mail: HSAC@dhs.gov . Fax: 202-282-9207. Mail: Homeland Security Advisory Council, 1100 Hampton...

  3. 76 FR 55079 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-06

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of Open Teleconference Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will... subject line of the message. Fax: (202) 282-9207. Mail: Homeland Security Advisory Council, Department of...

  4. Changing Homeland Security: An Opportunity for Competence

    DTIC Science & Technology

    2005-01-01

    Homeland Security Affairs Volume I, Issue   Article  2005 Changing Homeland Security: An Opportunity for Competence Christopher Bellavita...DATES COVERED 00-00-2005 to 00-00-2005 4. TITLE AND SUBTITLE Changing Homeland Security: An Opportunity for Competence 5a. CONTRACT NUMBER 5b... Opportunity for Competence Christopher Bellavita Abstract Hurricane Katrina shattered belief that the nation’s homeland security system was ready for a major

  5. Department of Homeland Security Semiannual Regulatory Agenda

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-26

    ... Part VIII Department of Homeland Security Semiannual Regulatory Agenda ] DEPARTMENT OF HOMELAND SECURITY (DHS) DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Chs. I and II Unified Agenda of Federal Regulatory and Deregulatory Actions AGENCY: Office of the Secretary, DHS. ACTION: Semiannual regulatory agenda. SUMMARY: This...

  6. 75 FR 53707 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-01

    ...-53708] [FR Doc No: 2010-21787] DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0074] Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of Open Teleconference Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will meet via...

  7. 76 FR 4123 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-24

    ... homeland security, results of a cyber security exercise, sharing information with others, and Southwest... would be a road map to those who wish to attack our cyber security, and hence, would certainly frustrate... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of partially...

  8. Radiation scientists and homeland security.

    PubMed

    Rose, Christopher M

    2002-05-01

    Radiation scientists represent an important resource in homeland defense. Security analysts worry that a crude but deadly radiological bomb might be fashioned from stolen nuclear material and a few sticks of dynamite. Such a device could kill dozens, hundreds, and possibly thousands and could contaminate a square mile or more. Emergency workers may call upon radiation scientists to aid the injured. Educational materials are available on the ACR, ASTRO, and RRS websites, linked to the Armed Forces Radiobiology Research Institute and the Oak Ridge National Laboratory, to provide radiation workers material that they can use to help emergency room and civil defense personnel after a terrorist attack. Radiation scientists are urged to obtain these materials and contact their local hospital and public health authorities to volunteer their services and expertise.

  9. Community Colleges Are Key to Homeland Security

    ERIC Educational Resources Information Center

    Gilroy, Marilyn

    2005-01-01

    In this article, the author discusses the importance of Homeland Security in community colleges as a counter terrorism solution. Homeland Security, a phrase born after September 11, 2001, has entered the nation's vocabulary and is now becoming part of the curriculum at hundreds of colleges and universities. No sector of higher education is…

  10. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-20

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: On April 12, 2010, the Homeland Security Science and Technology Advisory Committee announced in the... supplements that original meeting notice. DATES: The Homeland Security Science and Technology Advisory...

  11. 76 FR 81516 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ...) Frequent Traveler Program; examine evolving threats in cyber security; and provide information on the... (EMP) Threat--Lessons Learned and Areas of Vulnerability, and Evolving Threats in Cyber Security. Basis... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Closed Federal...

  12. 77 FR 55218 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-07

    ... violent extremism domestically; the current threat environment; evolving threats in cyber security... receive a briefing on evolving threats in cyber security. This will include lessons learned and potential... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of partially...

  13. 33 CFR 101.205 - Department of Homeland Security alignment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Department of Homeland Security... Department of Homeland Security alignment. The MARSEC Levels are aligned with the Department of Homeland Security's Homeland Security Advisory System (HSAS), established by Homeland Security Presidential...

  14. Homeland security challenges in nursing practice.

    PubMed

    Boatright, Connie; McGlown, K Joanne

    2005-09-01

    Nurses need a comprehensive knowledge of doctrine, laws, regulations,programs, and processes that build the operational framework for health care preparedness. Key components of this knowledge base reside in the areas of: evolution of homeland security: laws and mandates affecting health care and compliance and regulatory issues for health care organizations. This article addresses primary components in both of these areas, after first assessing the status of nursing's involvement (in homeland security), as portrayed in the professional literature.

  15. Data Mining and Homeland Security: An Overview

    DTIC Science & Technology

    2006-01-27

    Data mining has become one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and...product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data...sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and

  16. Homeland Security Lessons for the United States

    DTIC Science & Technology

    2004-06-01

    37 B. PORT/BORDER/AIRLINE SECURITY ............................................ 38 C. DOMESTIC LEGISLATION...or emergency that overwhelms the capabilities of State and local governments. Federal assistance is available under the Robert T . Stafford Disaster...Initiative Forging Ahead (Washington: Customs, 2002) 1. 32 Bodenheimer , David. “Technology for Border Protection: Homeland Security Funding and Priorities

  17. Ethical Decision-Making for Homeland Security

    DTIC Science & Technology

    2013-09-01

    the work of homeland security. Philosophical underpinnings include virtue ethics, deontology, utilitarianism , decision-making practices, and values...deontology, utilitarianism , torture, terrorism, Canadian Defense Ethics Program, Wildfire Leadership Development Program, DRIVE 15. NUMBER OF PAGES...security. Philosophical underpinnings include virtue ethics, deontology, utilitarianism , decision- making practices, and values common to the

  18. A Homeland Security Net Assessment Needed Now!

    DTIC Science & Technology

    2015-12-01

    DHS and suggests that such an assessment would expand the discussion of homeland security threats beyond terrorism and would encourage greater...involve discussions not only about the seriousness of threats from terrorism and other sources but also consideration of the legitimacy of the...and suggests a new model for the process that should be undertaken by the DHS in assessing the key threats to the US homeland, which are terror - ism

  19. 76 FR 27642 - Department of Homeland Security; Transfer of Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-12

    ... AGENCY Department of Homeland Security; Transfer of Data AGENCY: Environmental Protection Agency (EPA... of Homeland Security. The Department of Homeland Security will work with OPP pursuant to the Homeland Security Presidential Directives and the 2009 National Infrastructure Protection Plan. DATES: The...

  20. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    .... 9701.508 Section 9701.508 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security...

  1. 77 FR 61421 - Committee Name: Homeland Security Academic Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-09

    ... opportunities; how to define the core elements of a homeland security degree at the associate's, bachelor's and... SECURITY Committee Name: Homeland Security Academic Advisory Council AGENCY: Department of Homeland Security. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland...

  2. Homeland Security: A Selected Bibliography

    DTIC Science & Technology

    2011-04-01

    2007. 64pp. http://www.cnas.org/files/documents/publications/DanzigBleekKleinfeld_Bioterror_June07 .pdf 6 Maloney , Michael S. Cruise Missile Attack...Review 28, no. 1 (Winter-Spring 2008): 75-87. ProQuest 13 Protz, Jonathan, and Timothy J. Junio. "Smarter Surveillance." C4ISR 9, no. 4 (May 2010): 36...PA: U.S. Army War College, April 2, 2009. 22pp. (AD-A499-287) http://handle.dtic.mil/100.2/ADA499287 Richardt, Timothy P. The Security and Defense

  3. Homeland Security Intelligence: To What End

    DTIC Science & Technology

    2010-09-01

    things right then the judgment of a mind lacking those qualities. Walter Laqueur (1999, p. 308) 21 An adaptive threat orientation is a threat ontology...Homeland Security The decisive test for any intelligence agency is to warn…of trouble before it occurs. Walter Laqueur (1985, p. 21) Perhaps the...security theorist Thomas Quiggin (2007, p. 42), “With only ten different dots to connect, there would be a total of forty-five different dot

  4. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-15

    ... presentations regarding relationships between Science & Technology and selected Defense related topics... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: The Homeland Security Science and Technology Advisory Committee will meet January 26-28, 2010, at the...

  5. Department of Homeland Security Interoperable Communications Act

    THOMAS, 113th Congress

    Rep. Payne, Donald M., Jr. [D-NJ-10

    2014-03-24

    07/09/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  6. Changing Homeland Security: Shape, Patterns, Not Programs

    DTIC Science & Technology

    2006-10-01

    Nietzsche wrote about this process: To make plans and project designs brings with it many good sensations; and whoever had the strength to be...Friedrich Wilhelm Nietzsche , Human, All Too Human (Stanford University Press, 2000). 3 The phrase “homeland security community” and the pronoun “we

  7. Homeland Security. Management Challenges Facing Federal Leadership

    DTIC Science & Technology

    2002-12-01

    including attention to management practices and key success factors. HOMELAND SECURITY Management Challenges Facing Federal Leadership www.gao.gov/cgi...Plan and Guidelines to include operational and logistical considerations associated with implementing a large-scale voluntary vaccination program in... Hospital Preparedness Program to help state and local hospitals develop plans to respond to bioterrorism events and other public health emergencies

  8. Critical Infrastructure Information Disclosure and Homeland Security

    DTIC Science & Technology

    2002-08-31

    Information Disclosure and Homeland Security Updated August 31, 2002 John D. Moteff Specialist in Science and Technology Policy Resources, Science...share confidential business information, and the government is reluctant to share information that might compromise intelligence sources or...and exemption 4 ( confidential business information). Congress has considered several proposals to exempt critical infrastructure information from

  9. Department of Homeland Security Interoperable Communications Act

    THOMAS, 113th Congress

    Rep. Payne, Donald M., Jr. [D-NJ-10

    2014-03-24

    07/09/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  10. Department of Homeland Security Interoperable Communications Act

    THOMAS, 113th Congress

    Rep. Payne, Donald M., Jr. [D-NJ-10

    2014-03-24

    Senate - 07/09/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  11. Measuring the Foundation of Homeland Security

    DTIC Science & Technology

    2007-03-01

    Forthcoming 2006. Katzenbach , Jon R., and Douglas K. Smith. The Discipline of Teams. New York: John Wiley & Sons, Inc., 2001. Larson, Carl E., and Frank...Michael P. Casey Joe McGeary Gregory Dean Annette Neu Nancy Demme Bill Pelfrey Amy Donahue Michael Peterson Jane Dowling John ...local level is critical to a successful response and recovery. 5 Conference speakers included then Attorney General John Ashcroft, then Homeland

  12. 77 FR 65394 - Homeland Security Advisory Council; Open Teleconference Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-26

    ... SECURITY Homeland Security Advisory Council; Open Teleconference Meeting AGENCY: Office of Policy, Department of Homeland Security. ACTION: Notice of Correction of the Notice of Federal Advisory Committee... corrects the date of the teleconference meeting of the Homeland Security Advisory Council (HSAC) that was...

  13. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-13

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet July 20-21... will be partially closed to the public. DATES: The Homeland Security Science and Technology...

  14. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Homeland Security Labor Relations Board. 9701.508 Section 9701.508 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  15. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Homeland Security Labor Relations Board. 9701.508 Section 9701.508 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security...

  16. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 3 2014-01-01 2014-01-01 false Homeland Security Labor Relations Board. 9701.508 Section 9701.508 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security...

  17. 76 FR 56208 - Homeland Security Advisory Council, Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-12

    ... SECURITY Homeland Security Advisory Council, Correction AGENCY: The Office of Policy, DHS. ACTION: Notice... published a notice of meeting for the Homeland Security Advisory Council in the Federal Register on.... Becca Sharp, Executive Director, Homeland Security Advisory Council, DHS. BILLING CODE 9110-9M-P ...

  18. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-12

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: The Homeland Security Science and Technology Advisory Committee will meet April 20-22, 2010 at the.... This meeting will be closed to the public. DATES: The Homeland Security Science and Technology...

  19. 77 FR 37912 - Committee Name: Homeland Security Academic Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-25

    ... SECURITY Committee Name: Homeland Security Academic Advisory Council AGENCY: Department of Homeland Security. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Academic Advisory Council (HSAAC) will meet on July 10, 2012 in Washington, DC. The meeting will...

  20. European Approaches to Homeland Security and Counterterrorism

    DTIC Science & Technology

    2006-07-24

    Protecting the European Homeland: The CBR Dimension. Chaillot Paper No. 60. By Gustav Lindstrom. EU Institute for Security Studies. July, 2004. p...intended to crash the plane into the Eiffel Tower. In 1995, an Algerian terrorist organization, the Armed Islamic Group (GIA), carried out bombings in the...Deputy Director of the CSI, Feb. 14, 2006; “Le Conseil de sécurité,” Ministry of the Interior, Nov. 11, 2005. 19 Gustav Lindstrom, Protecting the European

  1. 2008 Homeland Security Symposium and Exposition

    DTIC Science & Technology

    2008-09-10

    Implementation, DHS Opportunities for the Private Sector Mr. Thomas A. Cellucci , Ph.D., M.B.A., Chief Commercialization Officer, DHS Wednesday, September 10...DHS 4:00-5:00 PM Opportunities for the private sector Thomas A. Cellucci , Ph.D., M.B.A. Chief Commercialization Officer, DHS 5:00...Opportunities for the Private Sector Thomas A. Cellucci , Ph.D., MBA Chief Commercialization Officer Department of Homeland Security Science and Technology

  2. A Joint Department of Homeland Security?

    DTIC Science & Technology

    2012-02-15

    Maxims of War, in BG Charles J. Dunlap, Jr., Neo-Strategicon: Modernized Principles of War for the 21st Century, in Air Command and Staff College...standardize equipment purchases or identify common mission requirements among components.” – DHS Inspector General Charles K. Edwards37 17 Examples of...45 Quoted in CDR Michael Day, Lt Col Charles Cody, and John Saxe, Developing Homeland Security

  3. Homeland security in the USA: past, present, and future.

    PubMed

    Kemp, Roger L

    2012-01-01

    This paper examines the evolving and dynamic field of homeland security in the USA. Included in this analysis is the evolution of the creation of the Department of Homeland Security, an overview of the National Warning System, a summary of citizen support groups, and how the field of homeland security has had an impact on the location and architecture of public buildings and facilities. Also included are website directories of citizen support groups and federal agencies related to the field of homeland security.

  4. Exploring the Educational Needs of the Homeland Security Community

    ERIC Educational Resources Information Center

    France, Paul

    2012-01-01

    This study involved an evaluation of the subjective perspectives held by a panel of 16 homeland security subject matter experts to determine what the needs of the homeland security professional community are for educational programs. The researcher examined the knowledge, skills, and abilities deemed important in homeland security to determine…

  5. Exploring the Educational Needs of the Homeland Security Community

    ERIC Educational Resources Information Center

    France, Paul

    2012-01-01

    This study involved an evaluation of the subjective perspectives held by a panel of 16 homeland security subject matter experts to determine what the needs of the homeland security professional community are for educational programs. The researcher examined the knowledge, skills, and abilities deemed important in homeland security to determine…

  6. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    .... 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313...

  7. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    .... 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System §...

  8. Radiation Detection for Homeland Security Applications

    NASA Astrophysics Data System (ADS)

    Ely, James

    2008-05-01

    In the past twenty years or so, there have been significant changes in the strategy and applications for homeland security. Recently there have been significant at deterring and interdicting terrorists and associated organizations. This is a shift in the normal paradigm of deterrence and surveillance of a nation and the `conventional' methods of warfare to the `unconventional' means that terrorist organizations resort to. With that shift comes the responsibility to monitor international borders for weapons of mass destruction, including radiological weapons. As a result, countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments at land, rail, air, and sea ports of entry in the US and in European and Asian countries. Radioactive signatures of concern include radiation dispersal devices (RDD), nuclear warheads, and special nuclear material (SNM). Radiation portal monitors (RPMs) are used as the main screening tool for vehicles and cargo at borders, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. This talk will present an overview of radiation detection equipment with emphasis on radiation portal monitors. In the US, the deployment of radiation detection equipment is being coordinated by the Domestic Nuclear Detection Office within the Department of Homeland Security, and a brief summary of the program will be covered. Challenges with current generation systems will be discussed as well as areas of investigation and opportunities for improvements. The next generation of radiation portal monitors is being produced under the Advanced Spectroscopic Portal program and will be available for deployment in the near future. Additional technologies, from commercially available to experimental, that provide additional information for radiation screening, such as density imaging equipment, will

  9. Tl-201 stress tests and homeland security.

    PubMed

    Dauer, Lawrence T; Williamson, Matthew J; St Germain, Jean; Strauss, H William

    2007-07-01

    This study estimates the length of time a patient might trigger security radiation detection devices after thallium 201 cardiac imaging. The US Department of Homeland Security is supporting the purchase and deployment of radiation detection pagers and portal monitors. Concurrently, there are an increasing number of cardiac perfusion imaging studies being performed using Tl-201. Therefore there is a higher probability that patients who have undergone nuclear medicine procedures could trigger alarms resulting in security questions. The length of time patients could trigger such devices is estimated based on the radiopharmacokinetics of Tl-201 and potential radioactive contaminants as well as the capabilities of current sensitive radiation detection devices, assuming the radioactive sources are distributed in and attenuated by the patient. It is estimated that patients may trigger portable pager devices for up to 33 days and may trigger portal detectors for up to 51 days after studies using Tl-201. This is much longer than length of time for a patient to trigger such alarms after technetium 99m myocardial imaging tests, which is potentially up to 6 days. It should be standard practice for patients to be issued information cards that indicate the potential time for triggering security radiation detectors after diagnostic cardiac procedures involving the use of Tl-201 or other radiopharmaceuticals.

  10. Metro Optical Networks for Homeland Security

    NASA Astrophysics Data System (ADS)

    Bechtel, James H.

    Metro optical networks provide an enticing opportunity for strengthening homeland security. Many existing and emerging fiber-optic networks can be adapted for enhanced security applications. Applications include airports, theme parks, sports venues, and border surveillance systems. Here real-time high-quality video and captured images can be collected, transported, processed, and stored for security applications. Video and data collection are important also at correctional facilities, courts, infrastructure (e.g., dams, bridges, railroads, reservoirs, power stations), and at military and other government locations. The scaling of DWDM-based networks allows vast amounts of data to be collected and transported including biometric features of individuals at security check points. Here applications will be discussed along with potential solutions and challenges. Examples of solutions to these problems are given. This includes a discussion of metropolitan aggregation platforms for voice, video, and data that are SONET compliant for use in SONET networks and the use of DWDM technology for scaling and transporting a variety of protocols. Element management software allows not only network status monitoring, but also provides optimized allocation of network resources through the use of optical switches or electrical cross connects.

  11. A value model for evaluating homeland security decisions.

    PubMed

    Keeney, Ralph L; von Winterfeldt, Detlof

    2011-09-01

    One of the most challenging tasks of homeland security policymakers is to allocate their limited resources to reduce terrorism risks cost effectively. To accomplish this task, it is useful to develop a comprehensive set of homeland security objectives, metrics to measure each objective, a utility function, and value tradeoffs relevant for making homeland security investments. Together, these elements form a homeland security value model. This article develops a homeland security value model based on literature reviews, a survey, and experience with building value models. The purposes of the article are to motivate the use of a value model for homeland security decision making and to illustrate its use to assess terrorism risks, assess the benefits of countermeasures, and develop a severity index for terrorism attacks. © 2011 Society for Risk Analysis.

  12. Muon Fluence Measurements for Homeland Security Applications

    SciTech Connect

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  13. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 3 2012-01-01 2012-01-01 false Homeland Security Compensation Committee. 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System §...

  14. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security... Privacy Act of 1974, the Department of Homeland Security is giving notice that it will retire the...

  15. Detecting objects in radiographs for homeland security

    NASA Astrophysics Data System (ADS)

    Prasad, Lakshman; Snyder, Hans

    2005-05-01

    We present a general scheme for segmenting a radiographic image into polygons that correspond to visual features. This decomposition provides a vectorized representation that is a high-level description of the image. The polygons correspond to objects or object parts present in the image. This characterization of radiographs allows the direct application of several shape recognition algorithms to identify objects. In this paper we describe the use of constrained Delaunay triangulations as a uniform foundational tool to achieve multiple visual tasks, namely image segmentation, shape decomposition, and parts-based shape matching. Shape decomposition yields parts that serve as tokens representing local shape characteristics. Parts-based shape matching enables the recognition of objects in the presence of occlusions, which commonly occur in radiographs. The polygonal representation of image features affords the efficient design and application of sophisticated geometric filtering methods to detect large-scale structural properties of objects in images. Finally, the representation of radiographs via polygons results in significant reduction of image file sizes and permits the scalable graphical representation of images, along with annotations of detected objects, in the SVG (scalable vector graphics) format that is proposed by the world wide web consortium (W3C). This is a textual representation that can be compressed and encrypted for efficient and secure transmission of information over wireless channels and on the Internet. In particular, our methods described here provide an algorithmic framework for developing image analysis tools for screening cargo at ports of entry for homeland security.

  16. Congressional Oversight of Homeland Security: Help or Hinderance?

    DTIC Science & Technology

    2012-12-01

    39 Who Became Part of the Department, U.S. Department of Homeland Security, accessed September 24th, 2012. http:// ipv6 .dhs.gov/xabout...U.S. Department of Homeland Security, accessed September 24th, 2012, http:// ipv6 .dhs.gov/xabout/history/editorial_0133.shtm; LCDR D.C. Baldinelli...2012, http:// ipv6 .dhs.gov/xabout/history/editorial_0585.shtm. 42 U.S. Library of Congress, Congressional Research Service, Department of Homeland

  17. Department of Homeland Security and Information Sharing: Is it Working

    DTIC Science & Technology

    2010-03-01

    Elizabeth Borja , “Brief Documentary History of the Department of Homeland Security 2001-2008,” dhs.gov, http://www.dhs.gov/xlibrary/assets...Washington, D.C.: The White House, June 2002), 1. 21 21 Ibid 22 Elizabeth Borja , “Brief Documentary History of the Department of Homeland Security

  18. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... support the Compensation Committee. (c) DHS will establish procedures governing the membership and...

  19. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... to provide options and/or recommendations for consideration by the Secretary or designee on strategic...

  20. 75 FR 44800 - Notice of Meeting of the Homeland Security Information Network Advisory Committee, Tuesday...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-29

    ... SECURITY Notice of Meeting of the Homeland Security Information Network Advisory Committee, Tuesday, August... meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSINAC) will meet from... Homeland Security Information Network Advisory Committee is to identify issues and provide to...

  1. 77 FR 66351 - Establishing the White House Homeland Security Partnership Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-02

    ... ] Executive Order 13629 of October 26, 2012 Establishing the White House Homeland Security Partnership Council... homeland security priorities. Partnerships are collaborative working relationships in which the goals... improve performance. Partnerships enhance our ability to address homeland security priorities, from...

  2. Managing Materials and Wastes for Homeland Security Incidents

    EPA Pesticide Factsheets

    To provide information on waste management planning and preparedness before a homeland security incident, including preparing for the large amounts of waste that would need to be managed when an incident occurs, such as a large-scale natural disaster.

  3. 78 FR 14102 - Committee Name: Homeland Security Academic Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-04

    ... relating to student and recent graduate recruitment; international students; academic research; campus and... (Student and Recent Graduate Recruitment, Homeland Security Academic Programs, Academic Research and... opportunities; how academic research can address DHS' biggest challenges; how DHS operational Components can...

  4. Analysis of Systems Used to Budget for Homeland Security

    DTIC Science & Technology

    2004-02-01

    National Strategy for Homeland Security that defined homeland security as a concerted national effort to accomplish three major missions: Prevent...Fashioning partnership programs operating within and across policy and operational communities such as border control , public health, transportation and...Each year more than 500 million persons, 130 million motor vehicles, 2.5 million railcars, and 5.7 million cargo containers must be inspected at

  5. Strengthening Homeland Security through Improved Foreign Language Capability

    DTIC Science & Technology

    2011-12-01

    attending the Russian Basic Course. In only a couple of cases did interpreters study non- Romance or Germanic languages prior to joining the...HOMELAND SECURITY THROUGH IMPROVED FOREIGN LANGUAGE CAPABILITY by Sean C. Stevens December 2011 Thesis Advisor: Erik Dahl Second Reader...AND DATES COVERED Master‘s Thesis 4. TITLE AND SUBTITLE Strengthening Homeland Security through Improved Foreign Language Capability 5. FUNDING

  6. Control and positioning surveillance sensor technologies for homeland security and homeland defense

    NASA Astrophysics Data System (ADS)

    Lutz, James R.; Cloud, Dan; Lareau, Andre; Bratton, Raymond; Harris, Rodney

    2004-09-01

    The tremendous demand for Homeland Defense and Homeland Security (HD/HS) equipment for all types of commercial, industrial, civic, government and military facilities has resulted in an explosion of new applications for pan and tilt positioners. This paper discusses the technology of high performance positioning equipment in conjunction with various sensor systems now being utilized for HD/HS applications, and how this equipment is becoming more critical to the success of the HD/HS mission.

  7. Department of Homeland Security Semiannual Regulatory Agenda

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-20

    ... Modification of the Aviation Security Infrastructure Fee (ASIF) (Market Share)........ 1652-AA43 Department of... Administration (TSA) 389. MODIFICATION OF THE AVIATION SECURITY INFRASTRUCTURE FEE (ASIF) (MARKET SHARE) Legal... method for apportioning the Aviation Security Infrastructure Fee (ASIF) among air carriers. The ASIF is a...

  8. Homeland Security Strategic Planning: Mission Area Analysis

    DTIC Science & Technology

    2007-03-28

    appropriate authorities including the establishment of chain of custody. Store materials safely. Label and place materials in appropriate secure...accurate. Store data. Secure information according to established standards and protocols. Generate reports. Prepare outputs of data, analysis, and...methodology to enable comparison within and across sectors. Verify data. Ensure that information collected is reliable and accurate. Store data. Secure

  9. 76 FR 34088 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-10

    ... Resilience Task Force. DATES: The HSAC conference call will take place from 1 p.m. to 2 p.m. E.D.T. on Monday... to review and approve the Community Resilience Task Force's report of findings and recommendations... conference call details and the Community Resilience Task Force's report will be provided to...

  10. Science and Technology Challenges for Homeland Security

    SciTech Connect

    Murray, C A

    2006-03-24

    Preventing and protecting against catastrophic terrorism is a complex and dynamic challenge. Small groups or individuals can use advanced technology to cause massive destruction, and the rapid pace of technology and ease of information dissemination continually gives terrorists new tools. A 100% defense is not possible. It's a numbers problem--there are simply too many possible targets to protect and too many potential attack scenarios and adversaries to defend against. However, science and technology (S&T) is a powerful force multiplier for defense. We must use S&T to get ahead of the game by making terrorist attacks more difficult to execute, more likely to be interdicted, and less devastating in terms of casualties, economic damage, or lasting disruption. Several S&T areas have potential to significantly enhance homeland security efforts with regard to detecting radiation, pathogens, explosives, and chemical signatures of weapons activities. All of these areas require interdisciplinary research and development (R&D), and many critically depend on advances in materials science. For example, the science of nuclear signatures lies at the core of efforts to develop enhanced radiation detection and nuclear attribution capabilities. Current radiation detectors require cryogenic cooling and are too bulky and expensive. Novel signatures of nuclear decay, new detector materials that provide high resolution at ambient temperatures, and new imaging detectors are needed. Such technologies will improve our ability to detect and locate small, distant, or moving sources and to discriminate threat materials from legitimate sources. A more complete understanding of isotopic ratios via secondary ion mass spectrometry (SIMS), NanoSIMS, or yet-to-be-developed technologies is required to elucidate critical characteristics of nuclear materials (e.g., isotopics, age, reprocessing) in order to identify their source and route history. S&T challenges abound in the biodefense arena as

  11. 8 CFR 2.1 - Authority of the Secretary of Homeland Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Security. 2.1 Section 2.1 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY GENERAL PROVISIONS AUTHORITY OF THE SECRETARY OF HOMELAND SECURITY § 2.1 Authority of the Secretary of Homeland Security. All authorities and functions of the Department of Homeland Security to administer and enforce the immigration...

  12. 75 FR 20371 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-19

    ... Countering Violent Extremism Working Group. DATES: The HSAC conference call will take place from 4 p.m. to 5... publication 15 days prior to a meeting. The HSAC will meet to review the Countering Violent Extremism...

  13. 77 FR 26774 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... Transportation Security Administration's (TSA) airport security program that will include lessons learned, and... regarding the latest viable threats against the United States, and how DHS and other Federal agencies plan... terrorists with a road map regarding the Department's plan to counter their actions, and thus, allow them to...

  14. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... SECURITY Homeland Security Information Network Advisory Committee (HSINAC) AGENCY: OPS/OCIO, DHS. ACTION... Information Network Advisory Committee (HSIN AC) will meet on February 27th-28th, 2013 in Washington, DC. The... Network Advisory Committee), go to http://www.regulations.gov . Short public comment periods will be held...

  15. A Department of Homeland Security Reserves (DHS-R): Simultaneously Protecting the Homeland While Alleviating the Increased DoD Role in Homeland Defense and Security

    DTIC Science & Technology

    2007-12-01

    tribuneedition.html accessed on May 12, 2007. 21 Personal Interview with Ellis Stanley, General Manager- Emergency Preparedness Department, City ...California Office of Homeland Security, the Los Angeles City and County office of Emergency Preparedness, the FEMA/USNORTHCOM liaison, Citizen Corps...Preparedness for LA City , who guided my research. I also met with Mr. Bill Carwile of FEMA and Mr. Charles Adams of DHS, whose homeland security

  16. Homeland Security Department: FY2007 Appropriations

    DTIC Science & Technology

    2006-07-05

    American Energy Independence and Security Act of 2005, would have allowed oil well drilling in Alaska’s National Wildlife Refuge ( ANWR ). Division D...contained provisions that would have distributed the revenues from the ANWR drilling. Among the items that would have been funded with these revenues was...more than $1 billion in additional border security funding for DHS.138 After a contentious floor debate concerning the attachment of the ANWR

  17. Communicating Homeland Security Threats: Government and Public Efforts

    DTIC Science & Technology

    2010-12-01

    further analyze public perception and involvement in homeland security, this research will continue beyond the evolution of the National Exercise Program...information continues to undermine the importance of threats to the homeland. Current research identifies a growing perception disparity relative to...localities, loss to tourism , and the indirect cost on the economy during a period of heightened threat level.”15 Yim also presents a perspective

  18. Does the Army Need a Homeland Security Skill Identifier?

    DTIC Science & Technology

    2011-06-10

    Chemical, Biological, Radiological, Nuclear, & High-Yield Explosive CGSC Command and General Staff College CT Counterterrorism DA Department of the...omitted from most illustrations of the interrelationship of HD and CS as it applies to HS. However, “Domestic CT operations 6 are considered part of...homeland security under the lead of Department of Homeland Security” (Department of Defense 2009a, xx) and “ CT is one of the core tasks of the US

  19. Homeland Security Department: FY2011 Appropriations

    DTIC Science & Technology

    2010-08-27

    administers several programs, including the BioWatch program, the National Biosurveillance Integration System (NBIS), and the department’s...coordination activities are implemented); the National Biosurveillance Integration Center; and the Rapidly Deployable Chemical Detection System.104...Acquisition 20 61 78 Radiation Portal Monitoring Program — 8 20 Securing the Cities 20 — 20 Human Portable Radiation Detection Systems — 53 38

  20. How Homeland Security Affects Spatial Information

    ERIC Educational Resources Information Center

    Zellmer, Linda

    2004-01-01

    A recent article in Security-Focus described the fact that several U.S. government buildings in Washington DC could no longer be clearly seen by people using MapQuest's aerial photo database. In addition, the photos of these buildings were altered at the Web sites wherein they are posted at the request of the U.S. Secret Service. This is an…

  1. How Homeland Security Affects Spatial Information

    ERIC Educational Resources Information Center

    Zellmer, Linda

    2004-01-01

    A recent article in Security-Focus described the fact that several U.S. government buildings in Washington DC could no longer be clearly seen by people using MapQuest's aerial photo database. In addition, the photos of these buildings were altered at the Web sites wherein they are posted at the request of the U.S. Secret Service. This is an…

  2. 2009 Homeland Security Symposium and Exhibition

    DTIC Science & Technology

    2009-09-10

    economic success and security. While age, increasing demands and lack of upkeep all wear upon them, these structures are also...Opportunities, New Technology, and Speed - New Products and Product Functionalities • Expansion of criminal elements Organized Crime Street Gangs Local...of Access Opportunities, New Technology, and Speed - New Products and Product Functionalities • Expansion of criminal elements Organized Crime

  3. Nanomaterials and their application to defense and homeland security

    NASA Astrophysics Data System (ADS)

    Reynolds, John G.; Hart, Bradley R.

    2004-01-01

    A critical issue to homeland security and defense is the development of broad range collectors and detectors of weapons of mass destruction. Nanoscience and nanotechnology are increasingly important in the area of such separation and detection. This article presents an overview of the research at the Forensic Science Center at Lawrence Livermore National Laboratory to develop nanostructured materials for applications to forensics and homeland security. Among the many types of nanomaterials reviewed are silica-based materials, molecular imprinted polymers, and silicon platforms. The main aim of the article is to optimize these new classes of materials for the collection concentration and detection of chemical weapons or other related compounds.

  4. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security.../Transportation Security Administration- 019, Secure Flight Records (November 9, 2007, 72 FR 63711) to cover the..., Director, Privacy Policy and Compliance, TSA-36, Transportation Security Administration, 601......

  5. Germanium Detectors in Homeland Security at PNNL

    SciTech Connect

    Stave, Sean C.

    2015-05-01

    Neutron and gamma-ray detection is used for non-proliferation and national security applications. While lower energy resolution detectors such as NaI(Tl) have their place, high purity germanium (HPGe) also has a role to play. A detection with HPGe is often a characterization due to the very high energy resolution. However, HPGe crystals remain small and expensive leaving arrays of smaller crystals as an excellent solution. PNNL has developed two similar HPGe arrays for two very different applications. One array, the Multisensor Aerial Radiation Survey (MARS) detector is a fieldable array that has been tested on trucks, boats, and helicopters. The CASCADES HPGe array is an array designed to assay samples in a low background environment. The history of HPGe arrays at PNNL and the development of MARS and CASCADES will be detailed in this paper along with some of the other applications of HPGe at PNNL.

  6. Germanium detectors in homeland security at PNNL

    DOE PAGES

    Stave, S.

    2015-05-01

    Neutron and gamma-ray detection is used for non-proliferation and national security applications. While lower energy resolution detectors such as NaI(Tl) have their place, high purity germanium (HPGe) also has a role to play. A detection with HPGe is often a characterization due to the very high energy resolution. However, HPGe crystals remain small and expensive leaving arrays of smaller crystals as an excellent solution. PNNL has developed two similar HPGe arrays for two very different applications. One array, the Multisensor Aerial Radiation Survey (MARS) detector is a fieldable array that has been tested on trucks, boats, and helicopters. The CASCADESmore » HPGe array is an array designed to assay samples in a low background environment. The history of HPGe arrays at PNNL and the development of MARS and CASCADES will be detailed in this paper along with some of the other applications of HPGe at PNNL.« less

  7. Germanium detectors in homeland security at PNNL

    SciTech Connect

    Stave, S.

    2015-05-01

    Neutron and gamma-ray detection is used for non-proliferation and national security applications. While lower energy resolution detectors such as NaI(Tl) have their place, high purity germanium (HPGe) also has a role to play. A detection with HPGe is often a characterization due to the very high energy resolution. However, HPGe crystals remain small and expensive leaving arrays of smaller crystals as an excellent solution. PNNL has developed two similar HPGe arrays for two very different applications. One array, the Multisensor Aerial Radiation Survey (MARS) detector is a fieldable array that has been tested on trucks, boats, and helicopters. The CASCADES HPGe array is an array designed to assay samples in a low background environment. The history of HPGe arrays at PNNL and the development of MARS and CASCADES will be detailed in this paper along with some of the other applications of HPGe at PNNL.

  8. 77 FR 1942 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-12

    ... as new developments in systems engineering, cyber- security, knowledge management and how best to... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Department of Homeland Security Science and Technology Directorate (DHS S&T), Department of Homeland Security. ACTION...

  9. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-13

    ... as new developments in systems engineering, cyber-security, knowledge management and how best to... SECURITY Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC) ACTION... Homeland Security has determined that the renewal of the charter of the Homeland Security Science and...

  10. 76 FR 54234 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-31

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION... Goldthorp, Associate Bureau Chief, Public Safety and Homeland Security Bureau, Federal Communications...

  11. 75 FR 56533 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-16

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION... Chief for Cybersecurity and Communications Reliability Public Safety and Homeland Security Bureau...

  12. 77 FR 12054 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-28

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION... Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street SW., Room 7- A325...

  13. 78 FR 35295 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-12

    ... National Cybersecurity Initiative (CNCI). In response to increased cyber threats across the Nation, the... SECURITY Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...-NEW. SUMMARY: The Department of Homeland Security, Cybersecurity Education Office, will submit the...

  14. 78 FR 57643 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-19

    ... increased cyber threats across the Nation, the National Initiative for Cybersecurity Education (NICE... SECURITY Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...-NEW. SUMMARY: The Department of Homeland Security, Cybersecurity Education Office, DHS will submit the...

  15. Emergency management and homeland security: Exploring the relationship.

    PubMed

    Kahan, Jerome H

    2015-01-01

    In the years after the 9/11 tragedy, the United States continues to face risks from all forms of major disasters, from potentially dangerous terrorist attacks to catastrophic acts of nature. Professionals in the fields of emergency management and homeland security have responsibilities for ensuring that all levels of government, urban areas and communities, nongovernmental organizations, businesses, and individual citizens are prepared to deal with such hazards though actions that reduce risks to lives and property. Regrettably, the overall efficiency and effectiveness of the nation's ability to deal with disasters is unnecessarily challenged by the absence of a common understanding on how these fields are related in the workforce and educational arenas. Complicating matters further is the fact that neither of these fields has developed agreed definitions. In many ways, homeland security and emergency management have come to represent two different worlds and cultures. These conditions can have a deleterious effect on preparedness planning for public and private stakeholders across the nation when coordinated responses among federal, state, and local activities are essential for dealing with consequential hazards. This article demonstrates that the fields of emergency management and homeland security share many responsibilities but are not identical in scope or skills. It argues that emergency management should be considered a critical subset of the far broader and more strategic field of homeland security. From analytically based conclusions, it recommends five steps that be taken to bring these fields closer together to benefit more from their synergist relationship as well as from their individual contributions.

  16. Homeland Security: A Role for the Community Colleges.

    ERIC Educational Resources Information Center

    Pfefferbaum, Rose

    2002-01-01

    Identifies the elements of a comprehensive community college terrorism preparedness program and outlines the rationale for a national network of community college programs devoted to homeland security. Argues that community colleges are an ideal venue for reaching the general public, providing information about disasters, and developing service…

  17. Public Health Specializations and Education Needs to Support Homeland Security

    DTIC Science & Technology

    2006-03-01

    their prime concern would be a biological event, be it bioterrorism, influenza or a superbug . Additional documentation of interviewee responses...homeland security? No Question 8. What are your greatest fears relating to public health and a terrorist event? Superbug 110

  18. Homeland Security Strategic Research Action Plan 2012 - 2016

    EPA Pesticide Factsheets

    EPA’s Homeland Security research plan outline and how it will address science and technological gaps and improve the Agency’s ability to carry out its responsibilities associated with preparing for and responding to, terrorist attacks, and other disasters.

  19. United States Homeland Security and National Biometric Identification

    DTIC Science & Technology

    2002-04-09

    IMPORTANCE OF AMERICA’S FREEDOMS AND HOMELAND SECURITY: ................... 1 W HAT IS A BIO M ETRIC...2 W AYS/M EANS O F BIO M ETRICS...9 THE DEPARTMENT OF DEFENSE’S ROLE IN NATIONAL IDENTIFICATION AND BIO M ETRICS

  20. Homeland Security: Developing National Doctrine to Guide State Strategy Development

    DTIC Science & Technology

    2012-03-01

    reminders to stop procrastinating and newfound cooking skills, I not only would never have finished, I also may have starved. xvi THIS PAGE INTENTIONALLY...doctrine in developing a homeland security doctrine. There are limitations, however, in that the military model is a narrow view. To overcome this

  1. Homeland Security Cybersecurity Boots-on-the-Ground Act

    THOMAS, 113th Congress

    Rep. Clarke, Yvette D. [D-NY-9

    2013-09-17

    07/29/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  2. Deciding Who Lives: Considered Risk Casualty Decisions in Homeland Security

    DTIC Science & Technology

    2008-12-01

    philosophy, theology, bioethics , and the military, etc. have examined principles that are involved in the concept of accepting loss of life and have...205 14. SUBJECT TERMS Considered Risk Casualty; Acceptable Losses; Bioethics ; Philosophy; Theology; Military; Homeland Security; Decision-making...under circumstances that bring this condition to the civilian population. Other disciplines such as philosophy, theology, bioethics , and the military

  3. Role of Information Management in Advancing Homeland Security

    DTIC Science & Technology

    2011-07-01

    sharing in a collaborative learning context. In this complex realm of persistent threats and constricted decision cycles, information management is...king. For decades, homeland security decision makers have struggled with information management . It is difficult to gather, organize, and share data...these functions of information management . For this article, information management is the process to collect, store, and disseminate significant

  4. Department of Homeland Security Component Privacy Officer Act of 2009

    THOMAS, 111th Congress

    Rep. Carney, Christopher P. [D-PA-10

    2009-03-19

    Senate - 03/26/2009 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  5. Homeland Security and the Coast Guard: Postured for Technology Improvements

    DTIC Science & Technology

    2003-06-01

    14 Table 2. Required satellite imagery resolution to detect various maritime objects...invest in its future through technology. There is fertile ground in exploring satellite surveillance, directed-energy weapons, and a host of other...looking at satellites , primarily due to cost.20 This dismissal of satellites and what they can bring to the role of Maritime Homeland Security

  6. Risk Unbound: Threat, Catastrophe, and the End of Homeland Security

    DTIC Science & Technology

    2015-09-01

    govern the present. Risk undermined the long held view of causality that dominated Aristotle’s Physics and critiques of Aristotle in the...Homeland Security Review, requires an 23 Aristotle , Physics, translated by Robin Waterfield, and... Aristotle . Physics. Translated Robin Waterfield and David Bostock. Oxford, UK: Oxford University Press, 1999. Barkun, Michael. “Defending Against

  7. Homeland Security Cybersecurity Boots-on-the-Ground Act

    THOMAS, 113th Congress

    Rep. Clarke, Yvette D. [D-NY-9

    2013-09-17

    07/29/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  8. Department of Homeland Security Component Privacy Officer Act of 2009

    THOMAS, 111th Congress

    Rep. Carney, Christopher P. [D-PA-10

    2009-03-19

    03/26/2009 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  9. The Army National Guard; Operational Reserve or Homeland Security Force?

    DTIC Science & Technology

    2008-12-12

    General Staff College in partial fulfillment of the requirements for the degree MASTER OF MILITARY ART AND SCIENCE Homeland Security......instilling a lifetime of discipline, values and dedication. vi TABLE OF CONTENTS Page MASTER OF MILITARY ART AND SCIENCE THESIS APPROVAL PAGE

  10. Homeland Security Science and Technology Authorization Act of 2010

    THOMAS, 111th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2010-03-15

    Senate - 07/21/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  11. Homeland Security Science and Technology Authorization Act of 2010

    THOMAS, 111th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2010-03-15

    07/21/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  12. Department of Homeland Security Component Privacy Officer Act of 2009

    THOMAS, 111th Congress

    Rep. Carney, Christopher P. [D-PA-10

    2009-03-19

    03/26/2009 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  13. Homeland Security Cybersecurity Boots-on-the-Ground Act

    THOMAS, 113th Congress

    Rep. Clarke, Yvette D. [D-NY-9

    2013-09-17

    Senate - 07/29/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  14. Homeland Security Science and Technology Authorization Act of 2010

    THOMAS, 111th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2010-03-15

    07/21/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  15. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel... to update and reissue Department of Homeland Security/ALL--023 Personnel Security Management System... separate from Department of Homeland Security/ALL 026--Personal Identity Verification Management System of...

  16. 78 FR 24669 - Reorganization of Regulations on the Adjudication of Department of Homeland Security Practitioner...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-26

    ... Regulations on the Adjudication of Department of Homeland Security Practitioner Disciplinary Cases AGENCY... that are the responsibility of the Department of Homeland Security (DHS). This rule also transferred... Security Practitioner Disciplinary Cases, 77 FR 2011 (Jan. 13, 2012). The Homeland Security Act of 2002, as...

  17. 77 FR 54835 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative [HSAR Case 2009-002...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-06

    ... SECURITY 48 CFR Part 3052 RIN 1601-AA28 Homeland Security Acquisition Regulation (HSAR); Revision... appropriate date of ``(SEP 2012)''. The final rule amended multiple sections of the Homeland Security... length of certain noncompetitive contracts entered into by the Department of Homeland Security to...

  18. 78 FR 55657 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ...; ] DEPARTMENT OF HOMELAND SECURITY 6 CFR Part 5 Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation Security Administration, DHS/TSA-021, TSA Pre TM Application Program System of Records AGENCY: Department of Homeland Security. ACTION: Notice of proposed rulemaking....

  19. Water System Security and Resilience in Homeland Security Research

    EPA Pesticide Factsheets

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  20. Ergonomics issues in national identity card for homeland security.

    PubMed

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security.

  1. Homeland Security Research Improves the Nation's Ability to ...

    EPA Pesticide Factsheets

    Technical Brief Homeland Security (HS) Research develops data, tools, and technologies to minimize the impact of accidents, natural disasters, terrorist attacks, and other incidents that can result in toxic chemical, biological or radiological (CBR) contamination. HS Research develops ways to detect contamination, sampling strategies, sampling and analytical methods, cleanup methods, waste management approaches, exposure assessment methods, and decision support tools (including water system models). These contributions improve EPA’s response to a broad range of environmental disasters.

  2. Homeland Security Research Improves the Nation's Ability to ...

    EPA Pesticide Factsheets

    Technical Brief Homeland Security (HS) Research develops data, tools, and technologies to minimize the impact of accidents, natural disasters, terrorist attacks, and other incidents that can result in toxic chemical, biological or radiological (CBR) contamination. HS Research develops ways to detect contamination, sampling strategies, sampling and analytical methods, cleanup methods, waste management approaches, exposure assessment methods, and decision support tools (including water system models). These contributions improve EPA’s response to a broad range of environmental disasters.

  3. Predicting Weapon Effects for Defense and Homeland Security

    DTIC Science & Technology

    2014-06-01

    team is supporting the programs of today and pushing forward the technology development and validation that will make the programs of tomorrow ...survivability for defense and homeland security applications. They provide the United States with a strategic advantage today and, with sustained investment...blast-mitigating seats, IED blasts continue to be a major source of casualties today . Better solutions are needed, and modeling and simulation con

  4. Federal-Tribal Government Collaboration in Homeland Security

    DTIC Science & Technology

    2007-09-01

    wide variety of national critical infrastructure. Dams, water impoundments and reservoirs, electrical generation plants, drinking water, and...Kalt and Singer point out, “did not and do not absorb the tribes into the United States; rather, the reverse is true. The treaties recognize and...identified as a point of need for effective homeland security actions, Kettl points out that without better collaboration between the state and local

  5. Creation of a Homeland Security Jail Information Model

    DTIC Science & Technology

    2012-03-01

    In contrast, law enforcement officers at a jail have a better gestalt understanding of homeland security threats and trends in the same...and my personal familiarity with each model. In his book Beyond the Two Disciplines of Scientific Psychology , Lee Cronbach claims that...muhajir.background/index.html Cronbach, L. J. (1975). Beyond the two disciplines of scientific psychology . Washington, D.C.: American Psychologist

  6. Systems Analysis, Centers of Gravity and Homeland Security

    DTIC Science & Technology

    2011-02-25

    Research Project (Carlisle Barracks, PA: U.S. Army War College, January 2009), 1. 8 Warren S. Eller and Brian J. Gerber, "Contemplating the Role of...Research Service, 2010), 10, http://www.fas .org/sgp/crs/homesec/RL30153.pdf (accessed October 17, 2010). 45 Ibid., 27. 46 Eller and Gerber... Eller and Gerber, "Contemplating the Role of Precision," 43. 51 Ibid. 52 Department of Homeland Security, National Infrastructure Protection

  7. Top Ten Challenges Facing the Next Secretary of Homeland Security

    DTIC Science & Technology

    2008-09-11

    Principato President, Airports Council International-North America James A. “Jay” Rasulo Chairman, Walt Disney Parks and Resorts Keith Reinhard...must ensure that a similar effort, taking into account the unique nature of homeland security, provides the Nation with leaders for the future with...mechanisms to enhance “red team” thinking and capabilities among its leadership by incorporating programs that provide alternate world -views and build

  8. Homeland Security Research and Development Funding, Organization, and Oversight

    DTIC Science & Technology

    2006-08-22

    infrastructures and key assets and includes cybersecurity R&D. EPA has focused on toxic materials research. In the DOC, R&D at the National Institute of Standards...toxic agents, genomic sequencing, DNA-based diagnostics, and microfabrication technologies.4 NASA’s homeland security R&D deals with aviation safety and...communications interoperability and compatibility, cybersecurity , and radiological and nuclear countermeasures. All other areas of R&D would receive

  9. Developing the Bench: Building An Effective Homeland Security Undergraduate Program

    DTIC Science & Technology

    2008-03-01

    Ranking of HLS Topics by Community College Students..............................31 Figure 5-4. Ranking of HLS Topics by All Persons Surveyed...necessary core courses. Like-named academic programs in different institutions are seldom carbon copies. By contrast, a person with an...military fits into the domestic Homeland Security effort Civil Rights/legal/ethics respecting personal rights as they relate to the practice of HLS

  10. Purdue University graduate certificate program in Veterinary Homeland Security.

    PubMed

    Amass, Sandra F; Blossom, Thaddaeus D; Ash, Marianne; McCay, Don; Mattix, Marc E

    2008-01-01

    Our nation lacks a critical mass of professionals trained to prevent and respond to food- and animal-related emergencies. Training veterinarians provides an immediate means of addressing this shortage of experts. Achievement of critical mass to effectively address animal-related emergencies is expedited by concurrent training of professionals and graduate students in related areas. Purdue University offers a Web-based Graduate Certificate in Veterinary Homeland Security to address this special area of need. The program is a collaborative effort among the Purdue University School of Veterinary Medicine, the Purdue Homeland Security Institute, the Indiana State Board of Animal Health, the Indiana State Police, and others with the overall goal of increasing capacity and preparedness to manage animal-related emergencies. Individuals with expertise in veterinary medicine, public health, animal science, or homeland security are encouraged to participate. The Web-based system allows courses to be delivered efficiently and effectively around the world and allows participants to continue their graduate education while maintaining full-time jobs. Participants enhance their understanding of natural and intentional threats to animal health, strengthen their skills in managing animal-health emergencies, and develop problem-solving expertise to become effective members of animal emergency response teams and of their communities. Students receive graduate credit from Purdue University that can be used toward the certificate and toward an advanced graduate degree. Currently, 70 participants from 28 states; Washington, DC; Singapore; and Bermuda are enrolled.

  11. Homeland security: sharing and managing critical incident information

    NASA Astrophysics Data System (ADS)

    Ashley, W. R., III

    2003-09-01

    Effective critical incident response for homeland security requires access to real-time information from many organizations. Command and control, as well as basic situational awareness, are all dependant on quickly communicating a dynamically changing picture to a variety of decision makers. For the most part, critical information management is not unfamiliar or new to the public safety community. However, new challenges present themselves when that information needs to be seamlessly shared across multiple organizations at the local, state and federal level in real-time. The homeland security problem does not lend itself to the traditional military joint forces planning model where activities shift from a deliberate planning process to a crisis action planning process. Rather, the homeland security problem is more similar to a traditional public safety model where the current activity state moves from complete inactivity or low-level attention to immediate crisis action planning. More often than not the escalation occurs with no warning or baseline information. This paper addresses the challenges of sharing critical incident information and the impacts new technologies will have on this problem. The value of current and proposed approaches will be critiqued for operational value and areas will be identified for further development.

  12. A bill to amend the Homeland Security Act of 2002 to authorize the Securing the Cities Initiative of the Department of Homeland Security, and for other purposes.

    THOMAS, 111th Congress

    Sen. Gillibrand, Kirsten E. [D-NY

    2010-05-05

    05/05/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. A bill to amend the Homeland Security Act of 2002 to authorize the Securing the Cities Initiative of the Department of Homeland Security, and for other purposes.

    THOMAS, 111th Congress

    Sen. Gillibrand, Kirsten E. [D-NY

    2010-05-05

    05/05/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. A bill to amend the Homeland Security Act of 2002 to authorize the Securing the Cities Initiative of the Department of Homeland Security, and for other purposes.

    THOMAS, 111th Congress

    Sen. Gillibrand, Kirsten E. [D-NY

    2010-05-05

    Senate - 05/05/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Bigfoot or Big Mistake: Is CBP’s Expanding Footprint Helping or Hurting Homeland Security

    DTIC Science & Technology

    2017-03-31

    Deputy Assistant John Wagner for House Committee on Homeland Security, Subcommittee on Border and Maritime Security Hearing Titled’ The Outer Ring of...Congress. Written Testimony of CBP Office of Field Operations Deputy Assistant John Wagner for House Committee on Homeland Security, Subcommittee on... Wagner for House Committee on Homeland Security, Subcommittee on Border and Maritime Security Hearing Titled “The Outer Ring of Border Security: DHS’s

  16. Application of Near-Space Passive Radar for Homeland Security

    NASA Astrophysics Data System (ADS)

    Wang, Wenqin

    2007-03-01

    To protect the homeland from terrorist attacks employing explosive devices, revolutionary advances across a wide range of technologies are required. Inspired by recent advances in near-space (defined as the region between 20 km and 100 km), this paper proposes a new passive radar system using opportunistic transmitter as an illuminator and near-space platform as a receiver. This concept differs substantially from current radars. This system can be operated as a passive bistatic or multistatic radar and hence largely immune to jamming. By placing the receiver in near-space platforms, many functions that are currently performed with satellites or airplanes could be performed much more cheaply and with much greater operational utility. These advantages make near-space passive attractive for a variety of applications, many of which fit well with the needs of homeland security. This paper details the role of near-space passive radar as sensor system that can support homeland security applications. The strengths and weakness of near-space passive radar, compared to current spaceborne and airborne radars, are detailed. The signal models and processing algorithms for near-space passive radar are provided. It is shown that the use of cost effective near-space platforms can provide the solutions that were previously thought to be out of reach to remote sensing and government customers.

  17. 75 FR 7979 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... of Homeland Security/ALL-027 The History of the Department of Homeland Security System of Records... Act of 1974 for the Department of Homeland Security/ALL-027 The History of the Department of Homeland..., Department of Homeland Security, Washington, DC 20528. For privacy issues please contact: Mary Ellen Callahan...

  18. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    DTIC Science & Technology

    2015-09-01

    based view of the security relationship. Figure 1. Analytical Process Used to Explore the Relationship Between Economic, Homeland and National...security and economic security are connected, based on claims in the National Security Strategy (NSS). The NSS states that America’s economic growth and...policy development. The analysis began by looking for common definitions for each element based on existing research (Figure 1, areas 1–3). The analysis

  19. Health-based Provisional Advisory Levels (PALs) for Homeland Security

    SciTech Connect

    Adeshina, Femi; Sonich-Mullin, Synthia; Wood, Carol S

    2009-01-01

    In compliance with Homeland Security Presidential Directive No.8, the US EPA National Homeland Security Research Center, in collaboration with the Department of Energy, is developing health-based Provisional Advisory Levels (PALs) for priority toxic industrial chemicals, pesticides, and chemical warfare agents in air and drinking water. The PALs Program will provide exposure levels to assist emergency response decision-making, and to serve as criteria for determining re-use and re-entry into affected areas resulting from transport/storage accidents, natural disasters, and subversive activities. PALs are applicable at federal, state, and local levels, and are intended for use in homeland security efforts, public health, law enforcement, and emergency response, as well as decisions by water utilities, and national and regional EPA offices. PALS have not been promulgated nor have they been formally issued as regulatory guidance. They are intended to be used at the discretion of risk managers in emergency situations when site specific risk assessments are not available. Three levels (PAL 1, PAL 2, and PAL 3), distinguished by severity of toxic effects, are developed for 24-hour, 30-day, 90-day, and 2-year durations of potential drinking water and inhalation exposures for the general public. Draft PALs are evaluated both by an EPA working group, and an external multidisciplinary panel to ensure scientific credibility and wide acceptance. In this issue, we present background information on the PAL program, the methodology used in deriving PALs, and the technical support documents for the derivation of PALs for acrylonitrile, phosgene, hydrogen chloride, and hydrogen sulfide.

  20. People-First Homeland Security: Recalibrating for Community Collaboration and Engagement within a Homeland Security Ecosystem

    DTIC Science & Technology

    2014-12-01

    public that is understandable, plain, easy to read , welcoming and inclusive fosters participation and trust in government. The literature review...Spider: The Unstoppable Power of Leaderless Organizations 74. 60 Ibid., 40. 61 Robert Mood and Dennis Smith, “History of Fire Fighting,” A Fire Pro...Soviet Union, Britain, and France met to discuss global security,80 a secret panel of 12 men appointed by Nelson Rockefeller, then Special Assistant

  1. Critical issues for homeland security and health care sector readiness.

    PubMed

    Blair, James D; Edwards, Judith T

    2005-01-01

    The "war on terrorism" and the nation's response to associated terrorist threats has created a significant challenge for health care risk management professionals. The Department of Homeland Security and initiation of the National Response Plan have set in motion a series of national requirements and obligations designed to protect and prepare the country to meet terrorist threats. These requirements and obligations have an impact on the health care industry with its ownership of critical infrastructure/key resources requiring protection from all-hazards events. Health care risk management professionals should be aware that the consequences of not meeting expectations during a future attack are significant.

  2. Forensic and homeland security applications of modern portable Raman spectroscopy.

    PubMed

    Izake, Emad L

    2010-10-10

    Modern detection and identification of chemical and biological hazards within the forensic and homeland security contexts may well require conducting the analysis in field while adapting a non-contact approach to the hazard. Technological achievements on both surface and resonance enhancement Raman scattering re-developed Raman spectroscopy to become the most adaptable spectroscopy technique for stand-off and non-contact analysis of hazards. On the other hand, spatially offset Raman spectroscopy proved to be very valuable for non-invasive chemical analysis of hazards concealed within non-transparent containers and packaging. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  3. Bayesian truthing and experimental validation in homeland security and defense

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Forrester, Thomas; Wang, Wenjian; Kostrzewski, Andrew; Pradhan, Ranjit

    2014-05-01

    In this paper we discuss relations between Bayesian Truthing (experimental validation), Bayesian statistics, and Binary Sensing in the context of selected Homeland Security and Intelligence, Surveillance, Reconnaissance (ISR) optical and nonoptical application scenarios. The basic Figure of Merit (FoM) is Positive Predictive Value (PPV), as well as false positives and false negatives. By using these simple binary statistics, we can analyze, classify, and evaluate a broad variety of events including: ISR; natural disasters; QC; and terrorism-related, GIS-related, law enforcement-related, and other C3I events.

  4. Overview of accelerators with potential use in homeland security

    DOE PAGES

    Garnett, Robert W.

    2015-01-01

    Quite a broad range of accelerators have been applied to solving many of the challenging problems related to homeland security and defense. These accelerator systems range from relatively small, simple, and compact, to large and complex, based on the specific application requirements. They have been used or proposed as sources of primary and secondary probe beams for applications such as radiography and to induce specific reactions that are key signatures for detecting conventional explosives or fissile material. A brief overview and description of these accelerator systems, their specifications, and application will be presented. Some recent technology trends will also bemore » discussed.« less

  5. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... the system of records notice DHS/TSA-009 General Legal Records, will have no adverse impacts on... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security. ACTION: Notice of retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the...

  6. Field-Capable Biodetection Devices for Homeland Security Missions

    SciTech Connect

    Dougherty, G M; Clague, D S; Miles, R R

    2007-04-05

    Biodetection instrumentation that is capable of functioning effectively outside the controlled laboratory environment is critical for the detection of health threats, and is a crucial technology for Health Security. Experience in bringing technologies from the basic research laboratory to integrated fieldable instruments suggests lessons for the engineering of these systems. This overview will cover several classes of such devices, with examples from systems developed for homeland security missions by Lawrence Livermore National Laboratory (LLNL). Recent trends suggest that front-end sample processing is becoming a critical performance-determining factor for many classes of fieldable biodetection devices. This paper introduces some results of a recent study that was undertaken to assess the requirements and potential technologies for next-generation integrated sample processing.

  7. 78 FR 34665 - Homeland Security Information Network Advisory Committee (HSINAC); Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-10

    ... SECURITY Homeland Security Information Network Advisory Committee (HSINAC); Meeting AGENCY: OPS/OCIO, DHS... Security Information Network Advisory Committee (HSINAC) will meet on Tuesday, June 25th, 2013 from 1 p.m...: http://www.dhs.gov/homeland-security-information-network-advisory-committee . There is a meeting room...

  8. 78 FR 17219 - Homeland Security Science and Technology Advisory Committee Meeting Cancellation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-20

    ..., such as new developments in systems engineering, cyber-security, ] knowledge management and how best to... SECURITY Homeland Security Science and Technology Advisory Committee Meeting Cancellation AGENCY: Science... Meeting for Homeland Security Science and Technology Advisory Committee (HSSTAC). SUMMARY: The meeting of...

  9. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ... engineering, cyber-security, knowledge management and how best to leverage related technologies funded by... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) ACTION: Notice of Federal Advisory Committee charter renewal. SUMMARY: The Secretary of Homeland Security has determined that the...

  10. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-07

    ... Science and Technology, such as new developments in systems engineering, cyber-security, knowledge... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science and.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet on December 4...

  11. 19 CFR 111.34 - Undue influence upon Department of Homeland Security employees.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Undue influence upon Department of Homeland... Brokers § 111.34 Undue influence upon Department of Homeland Security employees. A broker must not influence or attempt to influence the conduct of any representative of the Department of Homeland Security...

  12. Test of radiation detectors used in homeland security applications.

    PubMed

    Pibida, L; Minniti, R; O'Brien, M; Unterweger, M

    2005-05-01

    This work was performed as part of the National Institute of Standards and Technology (NIST) program to support the development of the new American National Standards Institute (ANSI) standards N42.32-2003 and N42.33-2003 for hand-held detectors, and personal electronic dosimeters, as well as to support the Office of Law Enforcement Standards (OLES) and the Department of Homeland Security (DHS) in testing these types of detectors for their use by first responders. These instruments are required to operate over a photon energy range of 60 keV to 1.33 MeV and over a wide range of air-kerma rates. The performance and response of various radiation detectors, purchased by the NIST, was recorded when placed in 60Co, 137Cs, and x-ray beams at different air-kerma rates. The measurements described in this report were performed at the NIST x-ray and gamma-ray radiation calibration facilities. The instruments' response (exposure or dose rate readings) shows strong energy dependence but almost no dependence to different air-kerma rates. The data here reported provide a benchmark in support of current protocols that are being developed for radiation detection instrumentation used in homeland security applications. A future plan is to test these devices, plus other commercially available detectors, against ANSI standards N42.32-2003 and N42.33-2003.

  13. Wireless sensors and sensor networks for homeland security applications.

    PubMed

    Potyrailo, Radislav A; Nagraj, Nandini; Surman, Cheryl; Boudries, Hacene; Lai, Hanh; Slocik, Joseph M; Kelley-Loughnane, Nancy; Naik, Rajesh R

    2012-11-01

    New sensor technologies for homeland security applications must meet the key requirements of sensitivity to detect agents below risk levels, selectivity to provide minimal false-alarm rates, and response speed to operate in high throughput environments, such as airports, sea ports, and other public places. Chemical detection using existing sensor systems is facing a major challenge of selectivity. In this review, we provide a brief summary of chemical threats of homeland security importance; focus in detail on modern concepts in chemical sensing; examine the origins of the most significant unmet needs in existing chemical sensors; and, analyze opportunities, specific requirements, and challenges for wireless chemical sensors and wireless sensor networks (WSNs). We further review a new approach for selective chemical sensing that involves the combination of a sensing material that has different response mechanisms to different species of interest, with a transducer that has a multi-variable signal-transduction ability. This new selective chemical-sensing approach was realized using an attractive ubiquitous platform of battery-free passive radio-frequency identification (RFID) tags adapted for chemical sensing. We illustrate the performance of RFID sensors developed in measurements of toxic industrial materials, humidity-independent detection of toxic vapors, and detection of chemical-agent simulants, explosives, and strong oxidizers.

  14. Wireless sensors and sensor networks for homeland security applications

    PubMed Central

    Potyrailo, Radislav A.; Nagraj, Nandini; Surman, Cheryl; Boudries, Hacene; Lai, Hanh; Slocik, Joseph M.; Kelley-Loughnane, Nancy; Naik, Rajesh R.

    2012-01-01

    New sensor technologies for homeland security applications must meet the key requirements of sensitivity to detect agents below risk levels, selectivity to provide minimal false-alarm rates, and response speed to operate in high throughput environments, such as airports, sea ports, and other public places. Chemical detection using existing sensor systems is facing a major challenge of selectivity. In this review, we provide a brief summary of chemical threats of homeland security importance; focus in detail on modern concepts in chemical sensing; examine the origins of the most significant unmet needs in existing chemical sensors; and, analyze opportunities, specific requirements, and challenges for wireless chemical sensors and wireless sensor networks (WSNs). We further review a new approach for selective chemical sensing that involves the combination of a sensing material that has different response mechanisms to different species of interest, with a transducer that has a multi-variable signal-transduction ability. This new selective chemical-sensing approach was realized using an attractive ubiquitous platform of battery-free passive radio-frequency identification (RFID) tags adapted for chemical sensing. We illustrate the performance of RFID sensors developed in measurements of toxic industrial materials, humidity-independent detection of toxic vapors, and detection of chemical-agent simulants, explosives, and strong oxidizers. PMID:23175590

  15. I-WASTE: EPA's Suite of Homeland Security Decision Support ...

    EPA Pesticide Factsheets

    In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major disasters, and other emergencies. A significant component of responding to and recovering from wide-area or isolated events, whether natural, accidental, or intentional, is the management of waste resulting from the incident itself or from activities cleaning up after the incident. To facilitate the proper management of incident-derived waste, EPA developed the Incident Waste Assessment and Tonnage Estimator (I-WASTE). I-WASTE was developed by the U.S. EPA’s Homeland Security Research Program in partnership with EPA program and regional offices, other U.S. government agencies, industry, and state and local emergency response programs. Presenting the disaster waste tool at the ORD Tools Café held in EPA Region 7th on Dec 9th.

  16. 77 FR 70777 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION: Notice of cancellation of meeting. SUMMARY: The meeting of the Communications Security, Reliability, and...

  17. No Failure of Imagination: Examining Foundational Flaws in America’s Homeland Security Enterprise

    DTIC Science & Technology

    2011-09-01

    Rural Electrification Administration SEC Securities and Exchange Commission SHSP State Homeland Security Program SSA Social Security...youth 1935 Rural Electrification Administration (REA) Before the New Deal, only 10 percent of the country outside cities and towns had electricity

  18. 76 FR 42003 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-18

    ... of Homeland Security Transportation Security Administration--023 Workplace Violence Prevention...--023 Workplace Violence Prevention Program System of Records'' from certain provisions of the Privacy.../Transportation Security Administration--023 Workplace Violence Prevention Program System of Records'' from one or...

  19. Pulse-shape discrimination scintillators for homeland security applications

    NASA Astrophysics Data System (ADS)

    Ellis, Mark E.; Duroe, Kirk; Kendall, Paul A.

    2016-09-01

    An extensive programme of research has been conducted for scintillation liquids and plastics capable of neutron-gamma discrimination for deployment in future passive and active Homeland Security systems to provide protection against radiological and nuclear threats. The more established detection materials such as EJ-301 and EJ-309 are compared with novel materials such as EJ-299-33 and p-terphenyl. This research also explores the benefits that can be gained from improvements in the analogue-to-digital sampling rate and sample bit resolution. Results are presented on the Pulse Shape Discrimination performance of various detector and data acquisition combinations and how optimum configurations from these studies have been developed into field-ready detector arrays. Early results from application-specific experimental configurations of multi-element detector arrays are presented.

  20. Chemical supply chain modeling for analysis of homeland security events

    SciTech Connect

    Ehlen, Mark A.; Sun, Amy C.; Pepple, Mark A.; Eidson, Eric D.; Jones, Brian S.

    2013-09-06

    The potential impacts of man-made and natural disasters on chemical plants, complexes, and supply chains are of great importance to homeland security. To be able to estimate these impacts, we developed an agent-based chemical supply chain model that includes: chemical plants with enterprise operations such as purchasing, production scheduling, and inventories; merchant chemical markets, and multi-modal chemical shipments. Large-scale simulations of chemical-plant activities and supply chain interactions, running on desktop computers, are used to estimate the scope and duration of disruptive-event impacts, and overall system resilience, based on the extent to which individual chemical plants can adjust their internal operations (e.g., production mixes and levels) versus their external interactions (market sales and purchases, and transportation routes and modes). As a result, to illustrate how the model estimates the impacts of a hurricane disruption, a simple example model centered on 1,4-butanediol is presented.

  1. A Geospatial Integrated Problem Solving Environment for Homeland Security Applications

    SciTech Connect

    Koch, Daniel B

    2010-01-01

    Effective planning, response, and recovery (PRR) involving terrorist attacks or natural disasters come with a vast array of information needs. Much of the required information originates from disparate sources in widely differing formats. However, one common attribute the information often possesses is physical location. The organization and visualization of this information can be critical to the success of the PRR mission. Organizing information geospatially is often the most intuitive for the user. In the course of developing a field tool for the U.S. Department of Homeland Security (DHS) Office for Bombing Prevention, a geospatial integrated problem solving environment software framework was developed by Oak Ridge National Laboratory. This framework has proven useful as well in a number of other DHS, Department of Defense, and Department of Energy projects. An overview of the software architecture along with application examples are presented.

  2. Health-based Provisional Advisory Levels (PALs) for homeland security.

    PubMed

    Adeshina, Femi; Sonich-Mullin, Cynthia; Ross, Robert H; Wood, Carol S

    2009-12-01

    The Homeland Security Presidential Directive #8 (HSPD-8) for National Emergency Preparedness was issued to " establish policies to strengthen the preparedness of the United States to prevent and respond to threatened or actual domestic terrorist attacks, major disasters, and other emergencies by requiring a national domestic all- hazards preparedness goal. "In response to HSPD-8 and HSPD-22 (classified) on Domestic Chemical Defense, the US Environmental Protection Agency (US EPA) National Homeland Security Research Center (NHSRC) is developing health-based Provisional Advisory Levels (PALs) for priority chemicals (including chemical warfare agents, pesticides, and toxic industrial chemicals) in air and drinking water. PALs are temporary values that will neither be promulgated, nor be formally issued as regulatory guidance. They are intended to be used at the discretion of risk managers in emergency situations. The PAL Program provides advisory exposure levels for chemical agents to assist in emergency planning and response decision-making, and to aid in making informed risk management decisions for evacuation, temporary re-entry into affected areas, and resumed-use of infrastructure, such as water resources. These risk management decisions may be made at the federal, state, and local levels. Three exposure levels (PAL 1, PAL 2, and PAL 3), distinguished by severity of toxic effects, are developed for 24-hour, 30-day, 90-day, and 2-year durations for potential exposure to drinking water and ambient air by the general public. Developed PALs are evaluated both by a US EPA working group, and an external multidisciplinary panel to ensure scientific credibility and wide acceptance. In this Special Issue publication, we present background information on the PAL program, the methodology used in deriving PALs, and the technical support documents for the derivation of PALs for acrylonitrile, hydrogen sulfide, and phosgene.

  3. Application of telecom planar lightwave circuits for homeland security sensing

    NASA Astrophysics Data System (ADS)

    Veldhuis, Gert J.; Elders, Job; van Weerden, Harm; Amersfoort, Martin

    2004-03-01

    Over the past decade, a massive effort has been made in the development of planar lightwave circuits (PLCs) for application in optical telecommunications. Major advances have been made, on both the technological and functional performance front. Highly sophisticated software tools that are used to tailor designs to required functional performance support these developments. In addition extensive know-how in the field of packaging, testing, and failure mode and effects analysis (FMEA) has been built up in the struggle for meeting the stringent Telcordia requirements that apply to telecom products. As an example, silica-on-silicon is now a mature technology available at several industrial foundries around the world, where, on the performance front, the arrayed-waveguide grating (AWG) has evolved into an off-the-shelf product. The field of optical chemical-biological (CB) sensors for homeland security application can greatly benefit from the advances as described above. In this paper we discuss the currently available technologies, device concepts, and modeling tools that have emerged from the telecommunications arena and that can effectively be applied to the field of homeland security. Using this profound telecom knowledge base, standard telecom components can readily be tailored for detecting CB agents. Designs for telecom components aim at complete isolation from the environment to exclude impact of environmental parameters on optical performance. For sensing applications, the optical path must be exposed to the measurand, in this area additional development is required beyond what has already been achieved in telecom development. We have tackled this problem, and are now in a position to apply standard telecom components for CB sensing. As an example, the application of an AWG as a refractometer is demonstrated, and its performance evaluated.

  4. Homeland Security Vulnerabilities Of The US National Capital Region’s Bridges

    DTIC Science & Technology

    2016-06-10

    within the National Capital Region in order to support homeland security measures? Additionally, 15 there are three secondary research questions: (1... Capital Region in order to support homeland security measures? The secondary research questions are as follows: Who is responsible for the upkeep...the bridges within the National Capital Region in order to support homeland security measures? The secondary research questions are as follows: Who is

  5. 77 FR 50631 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative [HSAR Case 2009-002

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-22

    ... regulations; and make editorial corrections. DATES: Effective Date: September 21, 2012. FOR FURTHER... Printing office at http://www.gpoaccess.gov/ecfr/index.html . The Homeland Security Acquisition...

  6. To amend the Homeland Security Act of 2002 to authorize the Securing the Cities Initiative of the Department of Homeland Security, and for other purposes.

    THOMAS, 111th Congress

    Rep. King, Peter T. [R-NY-3

    2009-05-21

    01/21/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  7. To amend the Homeland Security Act of 2002 to authorize the Securing the Cities Initiative of the Department of Homeland Security, and for other purposes.

    THOMAS, 111th Congress

    Rep. King, Peter T. [R-NY-3

    2009-05-21

    01/21/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  8. To amend the Homeland Security Act of 2002 to authorize the Securing the Cities Initiative of the Department of Homeland Security, and for other purposes.

    THOMAS, 111th Congress

    Rep. King, Peter T. [R-NY-3

    2009-05-21

    Senate - 01/21/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  9. Wearable high-tech gear for homeland security personnel

    NASA Astrophysics Data System (ADS)

    Venkateswarlu, Ronda; Hui Wei, Choo; Li Lian, Ngiam; Lim, E. T.; Zhu, Zijian; Yang, Mingjiang

    2006-05-01

    Recent homeland security problems in various countries indicate that fixed surveillance systems at important places are not adequate enough. As the security threats take new dimensions in future, mobile smart security personnel wearing high-tech gear will form the basic infrastructure. See first, listen first, detect first, track first, communicate first with peers, assess the threat and coordinate with security head-quarters are the functions of high-tech gear. This paper proposes a high-tech gear involving (i) hands-free and obtrusion-free textile-based wearable microphone array to capture users voice and interface with body-worn computer, (ii) microphone arrays embedded in textiles to listen and record others voices from a distance, (iii) miniature cameras embedded in the shirt to provide the user with omni vision (iv) wireless personal display as GUI hidden in textile or natural glasses, (v) GPS and body area network for positional awareness for information in the form of text or textile integrated, (vi) reconfigurable HW/SW for all the above functions configured in the form of a usual belt. The main focus of this paper is how to configure the high-tech gear with all these sophisticated functions to disappear into the natural wearables of the user giving him normal look in the public. This project is sponsored by Defence Science & Technology Agency, Ministry of Defence, Singapore. This paper covers multi-discipline technologies at system level, hence not possible to go into details of any subsystem. The main objective of this paper is to share our thoughts and get feedback. Progress and some critical design issues are discussed in this paper.

  10. How to Fund Homeland Security without Federal Dollars: State and Local Funding of Homeland Security Initiatives in Light of Decreased Support by the Federal Government

    DTIC Science & Technology

    2008-09-01

    1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188...that homeland security professionals and emergency management directors take the initiative and determine in their jurisdiction which programs are the...discussed in this thesis should provide legislators and homeland security and emergency management professionals with innovative ideas and methods to

  11. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-04

    ... systems engineering, cyber-security, knowledge management and how best to leverage related technologies... Security and the evolution of the Cyber Security Division of DHS S&T. The committee will review the... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science and...

  12. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    ERIC Educational Resources Information Center

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  13. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    ERIC Educational Resources Information Center

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  14. 78 FR 14629 - 10th Anniversary of the United States Department of Homeland Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-06

    ... Homeland Security By the President of the United States of America A Proclamation Ten years ago, when the... world, the United States Department of Homeland Security (DHS) opened its doors with a single task... mission through a decade of shifting threats and new challenges. We take this opportunity to recognize its...

  15. Rapid response radiation sensors for homeland security applications

    NASA Astrophysics Data System (ADS)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Guss, Paul

    2014-09-01

    The National Security Technologies, LLC, Remote Sensing Laboratory is developing a rapid response radiation detection system for homeland security field applications. The intelligence-driven system is deployed only when non-radiological information about the target is verifiable. The survey area is often limited, so the detection range is small; in most cases covering a distance of 10 meters or less suffices. Definitive response is required in no more than 3 seconds and should minimize false negative alarms, but can err on the side of positive false alarms. The detection system is rapidly reconfigurable in terms of size, shape, and outer appearance; it is a plug-and-play system. Multiple radiation detection components (viz., two or more sodium iodide scintillators) are used to independently "over-determine" the existence of the threat object. Rapid response electronic dose rate meters are also included in the equipment suite. Carefully studied threat signatures are the basis of the decision making. The use of Rad-Detect predictive modeling provides information on the nature of the threat object. Rad-Detect provides accurate dose rate from heavily shielded large sources; for example those lost in Mexico were Category 1 radiation sources (~3,000 Ci of 60Co), the most dangerous of five categories defined by the International Atomic Energy Agency. Taken out of their shielding containers, Category 1 sources can kill anyone who is exposed to them at close range for a few minutes to an hour. Whenever possible sub-second data acquisition will be attempted, and, when deployed, the system will be characterized for false alarm rates. Although the radiation detection materials selected are fast (viz., faster scintillators), their speed is secondary to sensitivity, which is of primary importance. Results from these efforts will be discussed and demonstrated.

  16. Communicating Health Risks under Pressure: Homeland Security Applications

    SciTech Connect

    Garrahan, K.G.; Collie, S.L.

    2006-07-01

    The U.S. Environmental Protection Agency's (EPA) Office of Research and Development (ORD) Threat and Consequence Assessment Division (TCAD) within the National Homeland Security Research Center (NHSRC) has developed a tool for rapid communication of health risks and likelihood of exposure in preparation for terrorist incidents. The Emergency Consequence Assessment Tool (ECAT) is a secure web-based tool designed to make risk assessment and consequence management faster and easier for high priority terrorist threat scenarios. ECAT has been designed to function as 'defensive play-book' for health advisors, first responders, and decision-makers by presenting a series of evaluation templates for priority scenarios that can be modified for site-specific applications. Perhaps most importantly, the risk communication aspect is considered prior to an actual release event, so that management or legal advisors can concur on general risk communication content in preparation for press releases that can be anticipated in case of an actual emergency. ECAT serves as a one-stop source of information for retrieving toxicological properties for agents of concern, estimating exposure to these agents, characterizing health risks, and determining what actions need to be undertaken to mitigate the risks. ECAT has the capability to be used at a command post where inputs can be checked and communicated while the response continues in real time. This front-end planning is intended to fill the gap most commonly identified during tabletop exercises: a need for concise, timely, and informative risk communication to all parties. Training and customization of existing chemical and biological release scenarios with modeling of exposure to air and water, along with custom risk communication 'messages' intended for public, press, shareholders, and other partners enable more effective communication during times of crisis. For DOE, the ECAT could serve as a prototype that would be amenable to

  17. Chemical supply chain modeling for analysis of homeland security events

    DOE PAGES

    Ehlen, Mark A.; Sun, Amy C.; Pepple, Mark A.; ...

    2013-09-06

    The potential impacts of man-made and natural disasters on chemical plants, complexes, and supply chains are of great importance to homeland security. To be able to estimate these impacts, we developed an agent-based chemical supply chain model that includes: chemical plants with enterprise operations such as purchasing, production scheduling, and inventories; merchant chemical markets, and multi-modal chemical shipments. Large-scale simulations of chemical-plant activities and supply chain interactions, running on desktop computers, are used to estimate the scope and duration of disruptive-event impacts, and overall system resilience, based on the extent to which individual chemical plants can adjust their internal operationsmore » (e.g., production mixes and levels) versus their external interactions (market sales and purchases, and transportation routes and modes). As a result, to illustrate how the model estimates the impacts of a hurricane disruption, a simple example model centered on 1,4-butanediol is presented.« less

  18. COAMPS Application to Global and Homeland Security Threat Problems

    SciTech Connect

    Chin, H S; Glascoe, L G

    2004-09-14

    Atmospheric dispersion problems have received more attention with regard to global and homeland security than their conventional roles in air pollution and local hazard assessment in the post 9/11 era. Consequently, there is growing interest to characterize meteorology uncertainty at both low and high altitudes (below and above 30 km, respectively). A 3-D Coupled Ocean Atmosphere Prediction System (COAMPS, developed by Naval Research Laboratory; Hodur, 1997) is used to address LLNL's task. The objective of this report is focused on the effort at the improvement of COAMPS forecast to address the uncertainty issue, and to provide new capability for high-altitude forecast. To assess the atmospheric dispersion behavior in a wider range of meteorological conditions and to expand its vertical scope for the potential threat at high altitudes, several modifications of COAMPS are needed to meet the project goal. These improvements include (1) the long-range forecast capability to show the variability of meteorological conditions at a much larger time scale (say, a year), and (2) the model physics enhancement to provide new capability for high-altitude forecast.

  19. 78 FR 20680 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-05

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and..., ``Department of Homeland Security/U.S. Citizenship and Immigration Services-014 Electronic Immigration System-1... Department of Homeland Security/U.S. Citizenship and Immigration Services to collect and maintain records on...

  20. 76 FR 39408 - Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the Terrorist Screening...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the... Homeland Security/ALL-030 Use of the Terrorist Screening Database System of Records.'' The Department of... of Homeland Security, Washington, DC 20528. Instructions: All submissions received must include the...

  1. 76 FR 53921 - Privacy Act of 1974; Department of Homeland Security ALL-034 Emergency Care Medical Records...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-30

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security ALL--034 Emergency... of Homeland Security/ ALL--034 Emergency Care Medical Records System of Records Notice.'' This system... of Homeland Security, Washington, DC 20528. Instructions: All submissions received must include the...

  2. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-004 General... Homeland Security system of records notice titled, Department of Homeland Security/ALL-004 General..., Washington, DC 20528. Instructions: All submissions received must include the agency name and docket number...

  3. 76 FR 8755 - Privacy Act of 1974; Department of Homeland Security/ALL-032 Official Passport Application and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-15

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--032 Official... titled, ``Department of Homeland Security/ ALL--032 Official Passport Application and Maintenance Records..., Privacy Office, Department of Homeland Security, Washington, DC 20528. Instructions: All submissions...

  4. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/United States Secret... Department of Homeland Security's biennial review of system of record notices, DHS/United States Secret..., ``Department of Homeland Security/United States Secret Service--004 Protection Information System of...

  5. 77 FR 47411 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-08

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and...,'' Department of Homeland Security/U.S. Citizenship and Immigration Services--006 Fraud Detection and National... records assists the Department of Homeland Security/U.S. Citizenship and Immigration Services...

  6. 78 FR 43893 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and... Homeland Security system of records titled ``Department of Homeland Security/United States Citizenship and Immigration Services--011 E- Verify Program System of Records.'' The United States Citizenship and...

  7. 78 FR 69858 - Privacy Act of 1974; Department of Homeland Security/Federal Emergency Management Agency-001...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-21

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/Federal Emergency... AGENCY: Department of Homeland Security, Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes...

  8. A Social Infrastructure for Hometown Security: Advancing the Homeland Security Paradigm

    DTIC Science & Technology

    2009-05-01

    private and non- profit sectors; and regions, communities, and individual citizens – along with our partners in the international community – will...chastised previous efforts that failed to mobilize communities across the land . Referring to Americans’ readiness to serve after the 9/11 attacks, he...impressive efforts to stand-up a new federal bureaucracy, however, have created a vast divide between a homeland security enterprise, with all the

  9. 75 FR 9085 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Immigration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-01

    ... Federal Regulations, which is published #0;under 50 titles pursuant to 44 U.S.C. 1510. #0; #0;The Code of... Visa Security Program Tracking System (VSPTS-Net) in support of Section 428 of the Homeland Security Act of 2002. Under the Visa Security Program, ICE conducts security reviews of visa applicants....

  10. The National Guard and its Role in Homeland Security

    DTIC Science & Technology

    2007-11-02

    Mobilizing Against Terrorism," CQ Weekly 57, no. 10 (6 March 99) 522 [ database on-line]; available from EBSCOhost ; accessed 8 September 2001. 34 Alan Ferber...November 2001. 6 Ibid. ś Kevin Stringer, "A Homeland Defense Mission," Military Review 80 (May/June 2000) 98 [ database on-line]; available from UMI...Implications for Homeland Defense," Abstract from Air University Research Database ; available from http://au.af.mil/au/ database /research/ay2001/affp

  11. The United States Department of Homeland Security Concept of Regionalization - Will It Survive the Test

    DTIC Science & Technology

    2006-09-01

    by the nation’s big cities. 98 Richard Clarke and Rand Beers , The Forgotten Homeland (New York...99 Clarke and Beers , Forgotten Homeland, 60. 100 “Mayor Testifies for Homeland Security Funds in Washington,” NY1 News...insight into the dangers associated with regionalization, there may be no reason to suspect there is a problem brewing . The potential failure of

  12. Investigating the Benefits and Drawbacks of Realigning the National Guard Under the Department of Homeland Security

    DTIC Science & Technology

    2016-08-01

    the nation’s current and future defense strat- egy.1 Defending the homeland from external threats and aggression requires a robust military...defense strat- egy.1 Defending the homeland from external threats and aggression requires a robust military capability. In this sense, both the...expanding interest in securing and protecting the homeland from external threats, aggression , and potential disasters. As the active and reserve compo

  13. 41 CFR 102-73.196 - What types of special purpose space may the Department of Homeland Security lease?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... purpose space may the Department of Homeland Security lease? 102-73.196 Section 102-73.196 Public... Delegations § 102-73.196 What types of special purpose space may the Department of Homeland Security lease? The Department of Homeland Security is delegated authority to lease whatever space its organizational...

  14. 75 FR 50845 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-18

    .../ALL--027 The History of the Department of Homeland Security System of Records AGENCY: Privacy Office... Act of 1974 for the ``Department of Homeland Security/ALL--027 The History of the Department of... Department exempts portions of the ``Department of Homeland Security/ALL--027 The History of the...

  15. 75 FR 39184 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-029 Civil...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... Exemptions; Department of Homeland Security/ALL--029 Civil Rights and Civil Liberties Records System of... Privacy Act of 1974 for the Department of Homeland Security/ALL--029 Civil Rights and Civil Liberties.... Background The Department of Homeland Security (DHS) civil rights and civil liberties staff, including...

  16. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Exemptions; Department of Homeland Security Transportation Security Administration-023 Workplace Violence... Security Administration-023 Workplace Violence Prevention Program System of Records and this proposed... a new system of records under the Privacy Act (5 U.S.C. 552a) titled, DHS/TSA-023 Workplace Violence...

  17. 75 FR 18857 - Privacy Act of 1974; Department of Homeland Security Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... Immigration Services Ombudsman-001 Virtual Ombudsman System of Records AGENCY: Privacy Office, DHS. ACTION... Security system of records notice titled, ``Department of Homeland Security Citizenship and Immigration... efficient and secure processing of information to aid the Citizenship and Immigration Services Ombudsman in...

  18. An Exploratory Risk Perception Study of Attitudes Toward Homeland Security Systems

    SciTech Connect

    Sanquist, Thomas F.; Mahy, Heidi A.; Morris, Fred A.

    2008-08-01

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used to measure attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis yielded a two factor solution, with the rating scale loading pattern suggesting factors of Perceived Effectiveness and Perceived Intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors, which were used to rank the systems in terms of overall acceptability. Difference scores for the rating scales and PCA factors were used to compute a single acceptability value reflecting the relative weight of risks and benefits. Of the 12 systems studied, airport screening, canine detectors and radiation monitoring at borders were found to be relatively acceptable, i.e., the perceived benefits for homeland security outweighed the perceived risks to civil liberties. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies, and can be used to anticipate potentially significant public acceptance issues.

  19. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-29

    ... system requirements, operating policies, community organization, knowledge management, interoperability... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Information Network... comment period Deliberation/Voting/Obtain guidance from HSINAC on: Stakeholder Management...

  20. 75 FR 74050 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-30

    ... include: Cybersecurity best practices, ISP network protection practices, transition to NG9-1-1, technical..., Associate Chief for Cybersecurity and Communications Reliability Public Safety and Homeland Security Bureau...

  1. EPA/ORD NATIONAL EXPOSURE RESEARCH LABORATORY MEASUREMENT SCIENCE SUPPORT FOR HOMELAND SECURITY

    EPA Science Inventory

    This product describes the National Exposure Research Laboratory research and development support for homeland security through the proposed National Exposure Measurements Center (NEMC). Key NEMC functional areas depicted in this poster are: standardized analytical method develo...

  2. 77 FR 2011 - Reorganization of Regulations on the Adjudication of Department of Homeland Security Practitioner...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-13

    ... / Friday, January 13, 2012 / Rules and Regulations#0;#0; ] DEPARTMENT OF JUSTICE Executive Office for... of Department of Homeland Security Practitioner Disciplinary Cases AGENCY: Executive Office for... technical amendments to the Executive Office for Immigration Review's (EOIR) practitioner...

  3. State and Local Homeland Security Officials: Who Are They and What Do They Do?

    DTIC Science & Technology

    2011-09-01

    Homeland Security Strategy of 2002. The definition does, however, make the point that ―homeland security is evolving‖ ( Hutton , 2003). The Barron‘s guide...at best and are housed with the state‘s SEMO or governor‘s offices. ( Hutton , 2003, p. 99) It also includes a statement explains that: Like police...SEMO‘s utilize existing state employees in various agencies for staffing. ( Hutton , 2003, p. 99) 12 These passages seem to indicate that, from the

  4. The Crime-Terror Nexus and the Threat to U.S. Homeland Security

    DTIC Science & Technology

    2015-12-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited THE CRIME- TERROR NEXUS AND THE...TITLE AND SUBTITLE THE CRIME- TERROR NEXUS AND THE THREAT TO U.S. HOMELAND SECURITY 5. FUNDING NUMBERS 6. AUTHOR(S) Mike Schofield 7. PERFORMING...historical context of the crime- terror nexus, and what challenges does it present to U.S. homeland security practitioners? This thesis uses a case

  5. How Should Municipal Police Agencies Participate in America’s Homeland Security Strategy?

    DTIC Science & Technology

    2008-12-01

    Homeland Security Strategy? 6. AUTHOR( S ) Michael D. Andreas 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) Naval...Postgraduate School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME( S ) AND ADDRESS(ES) N/A 10...AMERICA’S HOMELAND SECURITY STRATEGY? Michael D. Andreas Detective Sergeant, Police Department, Salem, Massachusetts M.A., Anna Maria College, 1999

  6. Utilizing K-12 school and higher education programs to incorporate homeland security topics for public education.

    PubMed

    McCarthy, Margaret E

    2003-08-01

    The broad based mission statements of public institutions whose charters are to educate the public is analyzed so that common threads pertinent to homeland security action items can be correlated with the public education scope. The intent of the coordination is to ensure that the prevention component in addition to the preparedness issues of homeland security is incorporated into the educational system with short and long term goals.

  7. Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support Through Interdisciplinary Education

    DTIC Science & Technology

    2010-03-01

    organizations, and close relationships with Canada and Mexico . The Command’s interagency coordination group is considered a critical component with...legal haggling that helped hamstring the federal response to Hurricane Katrina. (Gaynard, 2009) A conference on Collaboration in Times of

  8. Risk Management as Strategic Change in National Homeland Security Policy

    DTIC Science & Technology

    2007-09-01

    Training IAIP Information Analysis and Infrastructure Protection IGP Office of Intergovernmental Programs IP Infrastructure Protection ISAC...Infrastructure Protection (OIP), Office of Risk Management and Analysis (RMA), and Office of Intergovernmental Programs ( IGP ). 77 Another important...risk across the country. 79 Office of Intergovernmental Programs ( IGP ) – IGP’s mission is to promote an integrated national approach to homeland

  9. Effect of Assessment Process on Measuring Homeland Security Capability

    DTIC Science & Technology

    2007-09-01

    16 Gail Thomas, Susan Hocevar and Erik Jansen, A Diagnostic Approach to Building Collaborative Capacity in an Interagency...36 Hocevar, Susan , Gail Thomas and Erik Jansen, “Building Collaborative Capacity: An Innovative Strategy for Homeland...and Training. (2006): Appendix A. Hocevar, Susan , Gail Thomas and Erik Jansen. “Building Collaborative Capacity: An Innovative Strategy for

  10. U.S. Army Special Forces and Homeland Security Operations

    DTIC Science & Technology

    2008-03-01

    were used in the 1960s to enforce school desegregation and control civil rights protest in the Southern United States. 157 Ibid., 31. 46 wire...59 C. POTENTIAL DEFENSE SUPPORT OF CIVIL AUTHORITIES MISSIONS...situated to provide specialized capabilities in both homeland 2 defense and civil support operations. Enhancing the National Guard’s capacity

  11. Integrating statewide research and education resources for homeland security: the State University System of Florida Consortium on Homeland Security (Invited Paper)

    NASA Astrophysics Data System (ADS)

    Pearson, James E.; Olson, Peter J.

    2005-05-01

    The eleven universities of the State University System of Florida (SUS-FL) have established a consortium to address the full range of homeland security and domestic preparedness requirements for both Florida and the U.S. The Consortium has established the Florida Homeland Security Institute to provide an effective and efficient mechanism to coordinate, mobilize, combine, and form into teams the diverse, cross-disciplinary expertise, facilities, and established large base of technology development activities within the SUS-FL institutions and their established associates at industrial companies, governmental labs, and other universities. The Florida Consortium and Institute may provide a model for other state university systems for how to combine established resources effectively to address specific homeland security and domestic preparedness needs. This paper describes the Consortium and Institute goals, structure, and operations, with examples of how it has functioned in its brief existence as an effective mechanism for integrating the wide range of university, industry, and government capabilities within the state for addressing homeland security requirements.

  12. Homeland Security: Federal Assistance Funding and Business Opportunities

    DTIC Science & Technology

    2003-11-21

    Business/Business.htm] Department of Commerce, National Institute of Standards and Technology (NIST) Fire safety standards, materials, cybersecurity ...Security Page Data mining, national hazards, ecology of infectious diseases, microbial genome sequencing, critical infrastructure, computer security

  13. E PLURIBUS UNUM Homeland Security versus Homeland Defense Who Does What and to Whom

    DTIC Science & Technology

    2010-04-01

    112 APPENDIX IV: SWOT ANALYSIS ............................................................................. 113 APPENDIX V...thesis is a prima facie, Strength, Weakness, Opportunity and Threat ( SWOT ) analysis of both the NSC/DoD and the HSC/DHS security/defense...collaborative construct that monitors U.S. information and intelligence of developing events. 113 APPENDIX IV: SWOT ANALYSIS SWOT

  14. War in the Atlantic: A Historical Case of Homeland Security

    DTIC Science & Technology

    2015-09-01

    alliances, Britain could not have gained the upper hand. 14. SUBJECT TERMS military history , strategy, homeland defense 15. NUMBER OF PAGES 75...demonstrated that it was possible for England’s population to be attacked at home. The Gotha raids caused the British to realize that their ancient ...Germany would build a larger, more capable U-boat fleet. Given the formidable history of German pressure on the British merchant marine, the decision to

  15. Future Role of Fire Service in Homeland Security

    DTIC Science & Technology

    2008-09-01

    responding to emergencies in progress to protect the lives, and property of their citizens. The problem is that the world has changed . Increasing...tradition, collaboration, firefighters as collectors, strategic change in fire service, adaptive changes , first responders, future role in homeland...emergencies in progress to protect the lives, and property of their citizens. The problem is that the world has changed . Increasing terrorist

  16. Curriculum Evaluation and Revision in a Nascent Field: The Utility of the Retrospective Pretest-Posttest Model in a Homeland Security Program of Study

    ERIC Educational Resources Information Center

    Pelfrey, William V., Sr.; Pelfrey, William V., Jr.

    2009-01-01

    Although most academic disciplines evolve at a measured pace, the emerging field of homeland security must, for reasons of safety and security, evolve rapidly. The Department of Homeland Security sponsored the establishment of a graduate educational program for key officials holding homeland security roles. Because homeland security is a nascent…

  17. An exploratory risk perception study of attitudes toward homeland security systems.

    PubMed

    Sanquist, Thomas F; Mahy, Heidi; Morris, Frederic

    2008-08-01

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used in an exploratory study of attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis (PCA) yielded a two-factor solution with the rating scale loading pattern suggesting factors of perceived effectiveness and perceived intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors. Of the 12 systems studied, airport screening, canine detectors, and radiation monitoring at borders were found to be the most acceptable, while email monitoring, data mining, and global positioning satellite (GPS) tracking were found to be least acceptable. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies and can be used to anticipate potentially significant public acceptance issues.

  18. 77 FR 12606 - Homeland Security Academic Advisory Council; Establishment and Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-01

    .../Office of Academic Engagement/Mailstop 0440, Department of Homeland Security, 245 Murray Lane SW... Security, 245 Murray Lane SW., Washington, DC 20528-0440, tel: 202-447-4686 and fax: 202-447-3713. Name of... Murray Lane SW., Washington, DC 20528-0440. Instructions: All submissions received must include the words...

  19. 75 FR 10633 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security United States...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-09

    ... United States Immigration and Customs Enforcement-- 011 Immigration and Enforcement Operational Records... Security/U.S. Immigration and Customs Enforcement system of records titled, ``Department of Homeland Security/U.S. Immigration and Customs Enforcement--011 Removable Alien Records System of Records''...

  20. Gamma-Ray Detectors: From Homeland Security to the Cosmos (443rd Brookhaven Lecture)

    SciTech Connect

    Bolotnikov, Aleksey

    2008-12-03

    Many radiation detectors are first developed for homeland security or industrial applications. Scientists, however, are continuously realizing new roles that these detectors can play in high-energy physics and astrophysics experiments. On Wednesday, December 3, join presenter Aleksey Bolotnikov, a physicist in the Nonproliferation and National Security Department (NNSD) and a co-inventor of the cadmium-zinc-telluride Frisch-ring (CdZnTe) detector, for the 443rd Brookhaven Lecture, entitled Gamma-Ray Detectors: From Homeland Security to the Cosmos. In his lecture, Bolotnikov will highlight two primary radiation-detector technologies: CdZnTe detectors and fluid-Xeon (Xe) detectors.

  1. A Strategic View of Homeland Security: Relooking the Posse Comitatus Act and DOD’s Role in Homeland Security

    DTIC Science & Technology

    2002-05-14

    power. The Boston Massacre of April 1770 was the event that permanently embedded the prejudice against standing armies into the American political...tradition, affecting military defense policy in the U.S. homeland for several generations.20 Following the Boston Massacre , the newly formed Second...the Military Establishment in America, (New York, NY: The Free Press, 1975), 3-6. The Boston Massacre was a riot which broke out between

  2. Analytical Chemistry for Homeland Defense and National Security

    SciTech Connect

    S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  3. Exploring the Lack of Interoperability of Databases within Department of Homeland Security Interagency Environment Concerning Maritime Port Security

    DTIC Science & Technology

    2009-03-01

    41 V. DATA SHARING ENVIROMENT EXPERIMENT IN MIO 08-4 .........45 VI. CONCLUSION .............................................57...agencies across the United States. An example of this is the establishment of Data Fusion Centers in major urban areas. The Fusion Centers...connecting all fifty states, five territories, Washington, D.C and fifty major urban areas. HSIN is Department of Homeland Security secure, Sensitive

  4. The DoD Role in Homeland Security: Past, Present, and Future

    DTIC Science & Technology

    2013-03-01

    events served as a catalyst in clarifying baseline DoD definitions of Homeland Defense ( HD ) and Homeland Security (HS). National emphasis surrounding...Iranian hostage rescue efforts were revealed.22 These efforts were a significant catalyst for DoD change and became some of the major issues prompting...prosperity. The reduced threat was expected to require less DoD spending on HD and HS. For the first time since beginning the Cold War, focus on

  5. Interagency Collaboration Challenges Among Homeland Security Disciplines in Urban Areas

    DTIC Science & Technology

    2006-03-01

    Strategic National Stockpile SPD Seattle Police Department SPOC Seattle Police Operations Center SWAT Special Weapons and Tactics xix TCL Target...established a command post at their Seattle Police Operations Center ( SPOC ) and not at the incident site. The SPOC is a secure police facility and its choice

  6. Surface-enhanced Raman spectroscopy and homeland security: a perfect match?

    PubMed

    Golightly, Rebecca S; Doering, William E; Natan, Michael J

    2009-10-27

    This Nano Focus article reviews recent developments in surface-enhanced Raman spectroscopy (SERS) and its application to homeland security. It is based on invited talks given at the "Nanorods and Microparticles for Homeland Security" symposium, which was organized by one of the authors and presented at the 238th ACS National Meeting and Exhibition in Washington, DC. The three-day symposium included approximately 25 experts from academia, industry, and national laboratories and included both SERS and non-SERS approaches to detection of chemical and biological substances relevant to homeland security, as well as fundamental advances. Here, we focus on SERS and how it is uniquely positioned to have an impact in a field whose importance is increasing rapidly. We describe some technical challenges that remain and offer a glimpse of what form solutions might take.

  7. Homeland security R&D roadmapping : risk-based methodological options.

    SciTech Connect

    Brandt, Larry D.

    2008-12-01

    The Department of Energy (DOE) National Laboratories support the Department of Homeland Security (DHS) in the development and execution of a research and development (R&D) strategy to improve the nation's preparedness against terrorist threats. Current approaches to planning and prioritization of DHS research decisions are informed by risk assessment tools and processes intended to allocate resources to programs that are likely to have the highest payoff. Early applications of such processes have faced challenges in several areas, including characterization of the intelligent adversary and linkage to strategic risk management decisions. The risk-based analysis initiatives at Sandia Laboratories could augment the methodologies currently being applied by the DHS and could support more credible R&D roadmapping for national homeland security programs. Implementation and execution issues facing homeland security R&D initiatives within the national laboratories emerged as a particular concern in this research.

  8. 76 FR 41274 - Privacy Act of 1974; Department of Homeland Security/ALL-033 Reasonable Accommodations Records...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-13

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-033 Reasonable... to ] establish a new system of records titled, ``Department of Homeland Security/ALL-033 Reasonable..., Washington, DC 20528. Instructions: All submissions received must include the agency name and docket number...

  9. 75 FR 39266 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights...,'' January 6, 2004. The system name is being changed to, ``Department of Homeland Security/ALL-029 Civil... Department Office for Civil Rights and Civil Liberties, as well as all component offices that perform civil...

  10. 75 FR 28035 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and... titled, ``Department of Homeland Security/U.S. Citizenship and Immigration Services--011 E-Verify Program System of Records.'' The U.S. Citizenship and Immigration Services E-Verify Program allows employers...

  11. Are We Prepared to Use Armed Forces for Homeland Security?

    DTIC Science & Technology

    2007-11-02

    security operations - civil services, chem./ bio response, military police, intelligence - are also capabilities required to perform many overseas...the law should be changed....”49 Civil libertarians are opposed to review of the posse comitatus act for fear that changes will diminish protection...military. However, historical precedents support the president’s authority to do so. The civil libertarians fear that the review will lead to the

  12. The Fire Service’s Role in Maritime Homeland Security

    DTIC Science & Technology

    2011-03-01

    States Coast Guard xiv THIS PAGE INTENTIONALLY LEFT BLANK xv ACKNOWLEDGMENTS Most importantly, I would like to thank my family for their love...federal agencies (U.S. Coast Guard, Customs and Border Patrol, Immigration and Customs Enforcement, Transportation Security Administration, and... Coast Guard’s Captain of the Port is a step in the right direction; however, gaps remain in the planning process. Gaps include voluntary

  13. The Role of the Corps of Engineers in Homeland Security

    DTIC Science & Technology

    2007-11-02

    meet the requirements of a war or 22other national emergency involving an external threat to the national security. Reserve units called up in the...stationed in the US to provide the necessary response to the various types of national emergencies. All three components of the Corps (Active, Reserve and...Guard) will be examined to determine the optimum configuration and stationing to meet state and federal missions. iii iv TABLE OF CONTENTS ABSTRACT

  14. State Defense Force Monograph Series. Winter 2005, Homeland Security

    DTIC Science & Technology

    2005-01-01

    Fish and Game Commission by flying reconnaissance missions over the Shenandoah Valley searching for poachers as bear poaching is on the rise in the...terror on a daily basis. Every day we see terrorist groups killing and destroying to demonstrate that what we believe, what we stand for, is of no value...in New York City with ferry services across the Hudson River ; provided the waterborne security that allowed for the opening of the George Washington

  15. Securing Nuclear and Radiological Material in the Homeland

    DTIC Science & Technology

    2007-03-01

    measures at the facility, a ballistic vest, night vision goggles, a gas mask, handcuffs, and a pepper spray canister. Further investigation revealed...25 C. D. Ferguson , T. Kazi and J. Perera, Commercial Radioactive Sources: Surveying the Security Risks (Monterey Institute of...http://www.ewg.org/reports/nuclearwaste/faq/faq_terroristthreat_more.php (accessed 10 February 2006). Ferguson , C. D., T. Kazi, and J. Perera

  16. Does Homeland Security Constitute an Emerging Academic Discipline?

    DTIC Science & Technology

    2013-03-01

    Postgraduate School NSA National Security Agency OED Oxford English Dictionary U.S. United States xiv THIS PAGE INTENTIONALLY LEFT BLANK xv...Curriculum Design: A Case Study in Neuroscience ,” The Journal of Undergraduate Neuroscience Education 10, no. 1 (2011): A71–A79. 37 physical reaction...article entitled, “A Conceptual Framework for Interdisciplinary Curriculum Design: A Case Study in Neuroscience :”140 Table 2. An Overview of

  17. Homeland Security Collaboration: Catch Phrase or Preeminent Organizational Construct?

    DTIC Science & Technology

    2009-09-01

    Thesis Advisor Glen Woodbury Second Reader Harold A. Trinkunas, PhD Chairman, Department of National Security Affairs iv THIS PAGE...Barry Berman and Joel R. Evans define gap analysis as the tool that “Enables a company to compare its actual performance against its potential...Management: A Strategic Approach 7/E, Barry Berman and Joel R Evans,” Prentice Hall, http://www.prenhall.com/rm_student/html/start.html (accessed

  18. Homeland Security Research and Development Funding, Organization, and Oversight

    DTIC Science & Technology

    2005-02-24

    work on security, materials, detection of toxic agents, genomic sequencing, DNA-based diagnostics, and microfabrication technologies.4 Table 1. Non...vulnerability assessment (TVTA) 36 59 66 47 — Critical Infrastructure Protection — 12 27 21 — Cybersecurity , a new Sen. acct., was in Critical...Urges Government to Step Up Spending on Study of Cybersecurity ,” Chronicle of Higher Education, Jan. 18, 2005. 6 Caitlin Harrington, “EPA Ordered to work

  19. Minor Corrections to Physics for Optimizing Homeland Security by Our Pal Asija

    NASA Astrophysics Data System (ADS)

    Asija, Pal

    2008-04-01

    To optimize Homeland security it must be based on correct physics. There is But ONE Reality of Physics and finding that rugged reality requires identifying and expunging erroneous knowledge. Six examples are included. *Lighter Bodies Travel Faster. (Aristotle got it backwards) *Faster Objects Become Lighter. (Einstein got it backwards) *Two Minor Corrections to Newton's First Law of Motion. *Three D or No D (Any theory based on other than 3 D is fantastic) *Gravity is A Local and Physical Contact Force *Light is never Waves and Photons at the Same Instant. These corrections are then further delineated by several examples for leading and driving innovations in homeland security.

  20. Homeland security and public health: role of the Department of Veterans Affairs, the US Department of Homeland Security, and implications for the public health community.

    PubMed

    Koenig, Kristi L

    2003-01-01

    The terrorist attacks of 11 September 2001 led to the largest US Government transformation since the formation of the Department of Defense following World War II. More than 22 different agencies, in whole or in part, and >170,000 employees were reorganized to form a new Cabinet-level Department of Homeland Security (DHS), with the primary mission to protect the American homeland. Legislation enacted in November 2002 transferred the entire Federal Emergency Management Agency and several Department of Health and Human Services (HHS) assets to DHS, including the Office of Emergency Response, and oversight for the National Disaster Medical System, Strategic National Stockpile, and Metropolitan Medical Response System. This created a potential separation of "health" and "medical" assets between the DHS and HHS. A subsequent presidential directive mandated the development of a National Incident Management System and an all-hazard National Response Plan. While no Department of Veterans Affairs (VA) assets were targeted for transfer, the VA remains the largest integrated healthcare system in the nation with important support roles in homeland security that complement its primary mission to provide care to veterans. The Emergency Management Strategic Healthcare Group (EMSHG) within the VA's medical component, the Veteran Health Administration (VHA), is the executive agent for the VA's Fourth Mission, emergency management. In addition to providing comprehensive emergency management services to the VA, the EMSHG coordinates medical back-up to the Department of Defense, and assists the public via the National Disaster Medical System and the National Response Plan. This article describes the VA's role in homeland security and disasters, and provides an overview of the ongoing organizational and operational changes introduced by the formation of the new DHS. Challenges and opportunities for public health are highlighted.

  1. Nuclear and Solar Energy: Implications for Homeland Security

    DTIC Science & Technology

    2008-12-01

    environmental degradation and global warming according to the bulk of scientific analysis.FF1FF Global warming’s climate change predictions include... environmentally hazardous,FF4FF costs too much,FF5FF presents a security threat,FF6FF or will suffer the same fate as oil by virtue of being a non...and maintain that nuclear power can be more environmentally friendly than alternatives.FF10FF Solar power has drawn its share of critics as well

  2. Redox Active Binary Logic Gate Circuit for Homeland Security.

    PubMed

    Gaikwad, Pramod; Kadlag, Kavita; Nambiar, Manasa; Devendrachari, Mruthyunjayachari Chattanahalli; Aralekallu, Shambhulinga; Kottaichamy, Alagar Raja; Manzoor Bhat, Zahid; Thimmappa, Ravikumar; Shafi, Shahid Pottachola; Thotiyl, Musthafa Ottakam

    2017-08-01

    Bipolar junction transistors are at the frontiers of modern electronics owing to their discrete voltage regulated operational levels. Here we report a redox active binary logic gate (RLG) which can store a "0" and "1" with distinct operational levels, albeit without an external voltage stimuli. In the RLG, a shorted configuration of half-cell electrodes provided the logic low level and decoupled configuration relaxed the system to the logic high level due to self-charge injection into the redox active polymeric system. Galvanostatic intermittent titration and electrochemical quartz crystal microbalance studies indicate the kinetics of self-charge injection are quite faster and sustainable in polypyrrole based RLG, recovering more than 70% signal in just 14 s with minor signal reduction at the end of 10000 cycles. These remarkable properties of RLGs are extended to design a security sensor which can detect and count intruders in a locality with decent precision and switching speed.

  3. SEVIS: The Impact of Homeland Security on American Colleges and Universities

    ERIC Educational Resources Information Center

    Danley, Janet V.

    2010-01-01

    This chapter covers the impact of homeland security mandates on institutions and international students and scholars. The author traces the history of interest by the Immigration and Naturalization Service (INS) in developing a management system for international students and scholars that eventually resulted in the birth of Student and Exchange…

  4. Reasons for secrecy and deception in homeland-security resource allocation.

    PubMed

    Zhuang, Jun; Bier, Vicki M

    2010-12-01

    In this article, we explore reasons that a defender might prefer secrecy or deception about her defensive resource allocations, rather than disclosure, in a homeland-security context. Our observations not only summarize and synthesize the results of existing game-theoretic work, but also provide intuitions about promising future research directions. © 2010 Society for Risk Analysis.

  5. Homeland Security: Implications for Information Policy and Practice--First Appraisal.

    ERIC Educational Resources Information Center

    Feinberg, Lotte E.

    2002-01-01

    Discusses information policy in the wake of the September 11 terrorist attacks. Topics include access to government records, including Freedom of Information Act issues; removing or expanding information on government Web sites; state actions; coordination versus secrecy in homeland security; and patterns and trends in federal and state…

  6. A Model for Effective Organization and Communication of Homeland Security Activity at the State Level

    DTIC Science & Technology

    2007-03-01

    Ocean Strategy : How to Create Uncontested Market Space and Make the Competition Irrelevant.” Boston: Harvard Business School Press, 2005. Kudyba...for Homeland Security.” American Review of Public Administration 33, no. 3 (September 2003):253-277. 76 Kim, W. Chan and Renee Mauborgne. “ Blue

  7. 6 CFR 25.9 - Procedures for certification of approved products for Homeland Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... obtained by mail by sending a request to: Directorate of Science and Technology, SAFETY Act/room 4320...://www.safetyact.gov and by mail upon request sent to: Directorate of Science and Technology, SAFETY Act... to: Directorate of Science and Technology, SAFETY Act/room 4320, Department of Homeland Security...

  8. 6 CFR 25.9 - Procedures for certification of approved products for Homeland Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... obtained by mail by sending a request to: Directorate of Science and Technology, SAFETY Act/room 4320...://www.safetyact.gov and by mail upon request sent to: Directorate of Science and Technology, SAFETY Act... to: Directorate of Science and Technology, SAFETY Act/room 4320, Department of Homeland Security...

  9. 6 CFR 25.9 - Procedures for certification of approved products for Homeland Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... obtained by mail by sending a request to: Directorate of Science and Technology, SAFETY Act/room 4320...://www.safetyact.gov and by mail upon request sent to: Directorate of Science and Technology, SAFETY Act... to: Directorate of Science and Technology, SAFETY Act/room 4320, Department of Homeland Security...

  10. 76 FR 34616 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/National...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... Facility Anti-Terrorism Standards Personnel Surety Program System of Records AGENCY: Privacy Office, DHS... Homeland Security/National Protection and Programs Directorate--002 Chemical Facility Anti-Terrorism...--002 Chemical Facility Anti-Terrorism Standards Personnel Surety Program System of Records.''...

  11. 6 CFR 25.9 - Procedures for certification of approved products for Homeland Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.9... applicant seeking a Certification of anti-terrorism Technology as an Approved Product for Homeland Security...) A Certification shall: (i) Describe the Qualified Anti-Terrorism Technology (in such detail as...

  12. 6 CFR 25.9 - Procedures for certification of approved products for Homeland Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.9... applicant seeking a Certification of anti-terrorism Technology as an Approved Product for Homeland Security...) A Certification shall: (i) Describe the Qualified Anti-Terrorism Technology (in such detail as...

  13. PRESERVING DRINKING WATER INTEGRITY IN OUR COMMUNITIES: HOMELAND SECURITY PRIORITIES OF THE ENVIRONMENTAL PROTECTION AGENCY

    EPA Science Inventory

    A book chapter published in a 3-volume textbook series by the U. S. Military Academy at West Point, Combating Terrorism Center. Book title: Homeland Security: Protecting America's Targets. The chapter is a review of background of water systems, impact of September 11, 2001, a...

  14. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-21

    ... Management Agency, Federal Government--001 National Defense Executive Reserve System of Records AGENCY.../Federal Emergency Management Agency/Federal Government--001 National Defense Executive Reserve System of Records.'' This system allows the Department of Homeland Security/Federal Emergency Management Agency to...

  15. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    .... ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland... Science and Technology, such as new developments in systems engineering, cyber-security, knowledge management and how best to leverage related technologies funded by other federal agencies and by the...

  16. Photonics engineering: snapshot applications in healthcare, homeland security, agriculture, and industry

    NASA Astrophysics Data System (ADS)

    Sumriddetchkajorn, Sarun

    2015-01-01

    Throughout my experience in photonics engineering, this article shows that photonics is indeed a key technology enabler for enhancing our competitiveness. In particular, I snapshot the achievements of NECTEC research teams in implementing devices and systems suitable for healthcare, homeland security, agriculture, and industry.

  17. PRESERVING DRINKING WATER INTEGRITY IN OUR COMMUNITIES: HOMELAND SECURITY PRIORITIES OF THE ENVIRONMENTAL PROTECTION AGENCY

    EPA Science Inventory

    A book chapter published in a 3-volume textbook series by the U. S. Military Academy at West Point, Combating Terrorism Center. Book title: Homeland Security: Protecting America's Targets. The chapter is a review of background of water systems, impact of September 11, 2001, a...

  18. 76 FR 10898 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-28

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response... advises interested persons that the FCC Emergency Response Interoperability Center Public Safety Advisory Committee (PSAC) will hold its first meeting on March 15, 2011, at 10 a.m. in the Commission Meeting Room of...

  19. 76 FR 63206 - Supplemental Standards of Ethical Conduct for Employees of the Department of Homeland Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-12

    ... Ethical Conduct for Employees of the Department of Homeland Security AGENCY: Office of the Secretary, DHS... concurrence of the Office of Government Ethics (OGE), is proposing supplemental standards of ethical conduct for DHS employees. The proposed regulations would supplement the OGE Standards of Ethical Conduct for...

  20. 3 CFR 13629 - Executive Order 13629 of October 26, 2012. Establishing the White House Homeland Security...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... United States to support homeland security priorities. Partnerships are collaborative working... Committee, determine their agendas, and coordinate their work. The Council may establish subgroups... work of the Council to the President through the Chair. Sec. 4. General Provisions. (a) The heads...

  1. Homeland Security Science and Technology Authorization Act of 2010

    THOMAS, 111th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    07/21/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  2. SEVIS: The Impact of Homeland Security on American Colleges and Universities

    ERIC Educational Resources Information Center

    Danley, Janet V.

    2010-01-01

    This chapter covers the impact of homeland security mandates on institutions and international students and scholars. The author traces the history of interest by the Immigration and Naturalization Service (INS) in developing a management system for international students and scholars that eventually resulted in the birth of Student and Exchange…

  3. Public Sector Unionization: Understanding the Rise in Membership Rates and Impact on Homeland Security

    DTIC Science & Technology

    2011-12-01

    network of aviation, rail, pipeline , highway, cargo, maritime and mass transit. 15. NUMBER OF PAGES 87 14. SUBJECT TERMS Homeland Security...devastation resulting from a TSA work strike could potentially cripple the complex transportation network of aviation, rail, pipeline , highway...Arizona, Arkansas, Florida, Georgia, Idaho, Iowa, Kansas, Louisiana, Mississippi, Nebraska, Nevada, North Carolina, North Dakota , Oklahoma, South

  4. Homeland Security: Implications for Information Policy and Practice--First Appraisal.

    ERIC Educational Resources Information Center

    Feinberg, Lotte E.

    2002-01-01

    Discusses information policy in the wake of the September 11 terrorist attacks. Topics include access to government records, including Freedom of Information Act issues; removing or expanding information on government Web sites; state actions; coordination versus secrecy in homeland security; and patterns and trends in federal and state…

  5. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... enforcement activities, intelligence activities, man-made disasters and acts of terrorism, natural disasters... natural disasters. The NOC serves as the nation's homeland security center for information sharing and... disasters and acts of terrorism, and natural disasters. Operating 24 hours a day, seven days a week,...

  6. 76 FR 19107 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-06

    ... Management Agency--011 Training and Exercise Program Records System of Records AGENCY: Privacy Office, DHS... titled, ``Department of Homeland Security Federal Emergency Management Agency--011 Training and Exercise.../Federal Emergency Management Agency to collect and maintain records on its training and exercise...

  7. 76 FR 42004 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-18

    ... of Homeland Security Federal Emergency Management Agency--011 Training and Exercise Program Records... Training and Exercise Program Records System of Records'' from certain provisions of the Privacy Act... Management Agency--011 Training and Exercise Program Records System of Records'' from one or more...

  8. 76 FR 18954 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-06

    ... of Homeland Security Federal Emergency Management Agency DHS/FEMA-011 Training and Exercise Program... Agency--011 Training and Exercise Program Records System of Records'' and this proposed rulemaking. In... DHS system of records titled, ``DHS/FEMA--011 Training and Exercise Program Records System of...

  9. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-08

    ... Operations Center Database system of records, April 15, 2005, with the overall intent of narrowing the focus of these records to the specific purpose outlined in this system of records notice. It is the... Operations Center Database system of records. The Department of Homeland Security has issued a Notice...

  10. 75 FR 69689 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... Center Database system of records, April 15, 2005, with the overall intent of narrowing the focus of these records to the specific purpose outlined in this system of records notice. It is the Department's... Operations Center Database system of records. Additionally, the Department of Homeland Security is issuing...

  11. 78 FR 43890 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-006...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Management Agency--006 Citizen Corps Database'' and retitle it ``Department of Homeland Security/ Federal... individuals; (3) categories of records; (4) authorities; (5) purpose; (6) routine uses of information; (7..., ``DHS/FEMA--006 Citizen Corps Database'' and retitle it ``DHS/FEMA--006 Citizen Corps Program System...

  12. Multimodal biometric digital watermarking on immigrant visas for homeland security

    NASA Astrophysics Data System (ADS)

    Sasi, Sreela; Tamhane, Kirti C.; Rajappa, Mahesh B.

    2004-08-01

    Passengers with immigrant Visa's are a major concern to the International Airports due to the various fraud operations identified. To curb tampering of genuine Visa, the Visa's should contain human identification information. Biometric characteristic is a common and reliable way to authenticate the identity of an individual [1]. A Multimodal Biometric Human Identification System (MBHIS) that integrates iris code, DNA fingerprint, and the passport number on the Visa photograph using digital watermarking scheme is presented. Digital Watermarking technique is well suited for any system requiring high security [2]. Ophthalmologists [3], [4], [5] suggested that iris scan is an accurate and nonintrusive optical fingerprint. DNA sequence can be used as a genetic barcode [6], [7]. While issuing Visa at the US consulates, the DNA sequence isolated from saliva, the iris code and passport number shall be digitally watermarked in the Visa photograph. This information is also recorded in the 'immigrant database'. A 'forward watermarking phase' combines a 2-D DWT transformed digital photograph with the personal identification information. A 'detection phase' extracts the watermarked information from this VISA photograph at the port of entry, from which iris code can be used for identification and DNA biometric for authentication, if an anomaly arises.

  13. Preliminary Benchmarking Efforts and MCNP Simulation Results for Homeland Security

    SciTech Connect

    Robert Hayes

    2008-04-18

    It is shown in this work that basic measurements made from well defined source detector configurations can be readily converted in to benchmark quality results by which Monte Carlo N-Particle (MCNP) input stacks can be validated. Specifically, a recent measurement made in support of national security at the Nevada Test Site (NTS) is described with sufficient detail to be submitted to the American Nuclear Society’s (ANS) Joint Benchmark Committee (JBC) for consideration as a radiation measurement benchmark. From this very basic measurement, MCNP input stacks are generated and validated both in predicted signal amplitude and spectral shape. Not modeled at this time are those perturbations from the more recent pulse height light (PHL) tally feature, although what spectral deviations are seen can be largely attributed to not including this small correction. The value of this work is as a proof-of-concept demonstration that with well documented historical testing can be converted into formal radiation measurement benchmarks. This effort would support virtual testing of algorithms and new detector configurations.

  14. 19 CFR 0.2 - All other CBP regulations issued under the authority of the Department of Homeland Security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false All other CBP regulations issued under the authority of the Department of Homeland Security. 0.2 Section 0.2 Customs Duties U.S. CUSTOMS AND BORDER... § 0.2 All other CBP regulations issued under the authority of the Department of Homeland Security. (a...

  15. 75 FR 38824 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-06

    ...] Privacy Act of 1974; Department of Homeland Security/ALL--029 Civil Rights and Civil Liberties Records... system name is being changed to, ``Department of Homeland Security/ALL--029 Civil Rights and Civil... Rights and Civil Liberties, as well as all component offices that perform civil rights and civil...

  16. 76 FR 72428 - Privacy Act of 1974; Department of Homeland Security/ALL-017 General Legal Records System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... [Docket No. DHS-2011-0094] Privacy Act of 1974; Department of Homeland Security/ALL--017 General Legal.../ ALL--017 General Legal Records System of Records.'' This system will assist attorneys in providing..., Department of Homeland Security, Washington, DC 20528. Instructions: All submissions received must include...

  17. 78 FR 28867 - Privacy Act of 1974; Department of Homeland Security/U.S. Immigration and Customs Enforcement-014...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-16

    ... Customs Enforcement--014 Homeland Security Investigations Forensic Laboratory System of Records AGENCY....S. Immigration and Customs Enforcement--014 Homeland Security Investigations Forensic Laboratory... Forensic Laboratory (HSI-FL). The HSI-FL is a U.S. crime laboratory specializing in scientific...

  18. 76 FR 27847 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Coast...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ....S. Coast Guard--008 Courts Martial Case Files System of Records AGENCY: Privacy Office, DHS. ACTION..., ``Department of Homeland Security/U.S. Coast Guard--008 Courts Martial Case Files System of Records'' from... Homeland Security/U.S. Coast Guard--008 Courts Martial Case Files System of Records from one or more...

  19. 75 FR 14335 - Revisions to the Export Administration Regulations To Enhance U.S. Homeland Security: Addition of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-25

    ... issues identified by an interagency working group that is reviewing export control issues related to homeland security. The interagency working group is made up of representatives from the Departments of Commerce, Defense, Homeland Security and State. The purpose of the interagency working group is to...

  20. 76 FR 67621 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-02

    ... routine uses proposed are compatible with the purpose for which the information was collected and CBP's...; ] DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 5 Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP-003 Credit/Debit Care...

  1. Does the Department of Defense Possess Solutions for the Department of Homeland Security’s Personnel Management Issues?

    DTIC Science & Technology

    2015-12-01

    travel and transportation of household goods to first-term personnel, and increased recruiting and advertising funds.102 The incentives were...the Department of Homeland Security in its ability to accomplish its mission. Leadership weaknesses, insufficient education and training for employees ...Homeland Security in its ability to accomplish its mission. Leadership weaknesses, insufficient education and training for employees , and retention

  2. 76 FR 39315 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-030 Use of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... of Homeland Security/ALL--030 Use of the Terrorist Screening Database System of Records AGENCY... 1974 for the ``Department of Homeland Security/ALL--030 Use of the Terrorist Screening Database System... Screening Database (TSDB) System of Records.'' DHS is maintaining a mirror copy of the Department of...

  3. 76 FR 70638 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-15

    ... of Homeland Security/U.S. Citizenship and Immigration Services-015 Electronic Immigration System-2 Account and Case Management System of Records AGENCY: Privacy Office, DHS. ACTION: Final rule. SUMMARY... portions of an updated and reissued system of records titled, ``Department of Homeland Security/U.S...

  4. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    SciTech Connect

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  5. Status Summary of 3He and Neutron Detection Alternatives for Homeland Security

    SciTech Connect

    Kouzes, Richard T.; Ely, James H.

    2010-04-28

    This is a short summary whitepaper on results of our alternatives work: Neutron detection is an important aspect of interdiction of radiological threats for homeland security purposes since plutonium, a material used for nuclear weapons, is a significant source of fission neutrons [Kouzes 2005]. Because of the imminent shortage of 3He, which is used in the most commonly deployed neutron detectors, a replacement technology for neutron detection is required for most detection systems in the very near future [Kouzes 2009a]. For homeland security applications, neutron false alarms from a detector can result in significant impact. This puts a strong requirement on any neutron detection technology not to generate false neutron counts in the presence of a large gamma ray-only source [Kouzes et al. 2008].

  6. Hilbertian sine as an absolute measure of Bayesian inference in ISR, homeland security, medicine, and defense

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Wang, Wenjian; Hodelin, Juan; Forrester, Thomas; Romanov, Volodymyr; Kostrzewski, Andrew

    2016-05-01

    In this paper, Bayesian Binary Sensing (BBS) is discussed as an effective tool for Bayesian Inference (BI) evaluation in interdisciplinary areas such as ISR (and, C3I), Homeland Security, QC, medicine, defense, and many others. In particular, Hilbertian Sine (HS) as an absolute measure of BI, is introduced, while avoiding relativity of decision threshold identification, as in the case of traditional measures of BI, related to false positives and false negatives.

  7. Of Nasa and Neanderthals, Elephants and Machines: Metaphors and the Conceptualization of Homeland Security

    DTIC Science & Technology

    2013-12-01

    favor of the pursuit of knowledge. Charles Darwin , genius though he was, was not a sharp mathematician183 but had he been so, he would have realized...is crucial since, as Charles Darwin understood, selection as the instrument for evolution can only work if there are different characteristics from... Charles Darwin Can Teach Tom Ridge about Homeland Security,” Foreign Policy (September–October 2003): 69. 292. Johanson and Wong, Lucy’s Legacy, 248. 293

  8. Myth, Metaphor, and Imagination: Framing Homeland Security as Art and Archetype

    DTIC Science & Technology

    2013-03-01

    sculpture, and Nick Xhiku spent extra hours helping me construct the mold . I am grateful to the Department of Homeland Security and the Center for...condition.40 Examples include the smell of smoke as an indicator or fire; fever as an indicator of illness; rain clouds as signifiers of rain. These fixed...landscape to agrarian cultures that studied the cycles of the earth stayed put to plant and harvest a reliable food source. Cities developed, and

  9. Phase Contrast X-ray Imaging Signatures for Homeland Security Applications

    SciTech Connect

    Miller, Erin A.; White, Timothy A.; McDonald, Benjamin S.; Seifert, Allen; Flynn, Michael J.

    2011-06-13

    Gratings-based phase contrast imaging is a promising new radiographic technique providing three distinct contrast mechanisms, absorption, phase, and scatter, using a conventional x-ray tube source. We investigate the signatures available in these three contrast mechanisms with particular attention towards potential homeland security applications. We find that the scatter mode in particular is sensitive to textured materials, enabling lowered detection limits than absorption for materials such as powders. We investigate the length scales to which our imaging system is sensitive.

  10. Maritime Homeland Security and Defense: Who’s in Charge? A Current C2 Perspective

    DTIC Science & Technology

    2006-05-31

    and NATO allies * Data taken from the following two sources: Patrick Stillman and Gregory Giddens ...Control.” Newport Papers, no. 22. Newport, RI: Naval War College Press, 23 October 2001. Bertrup, John, Anthony Freedman, Timothy Roberts, and Gregory...Deepwater.” National Defense 86, no. 580 (2002): 16-17. Stillman, Patrick M. and Gregory Giddens . “Deepwater Will Provide Homeland Security.” U.S. Naval

  11. OneDHS: The Department of Homeland Security’s Organizational Culture

    DTIC Science & Technology

    2012-04-27

    Further, both have strength in using public awareness as a marketing process. Securing the homeland and or 23 preventing forest fires characterize...success stories. The first concerns New York City in the 1990s and the second highlights the Walt Disney Company and its chain of excellence. Both...difference that other actions were unable to produce. Walt Disney Company In contrast to a culture that has evolved over a number of years is a culture

  12. Unity of Command: An Answer to the Maritime Homeland Security Interagency Quagmire

    DTIC Science & Technology

    2008-10-31

    and a high-yield explosive in New London, Connecticut.37 The DHS Inspector General (IG) reported that although “exercise objectives were generally ...2. 2 Per 18 U.S. Code, Weapons of Mass Destruction generally include chemical, biological, radiological, nuclear and enhanced high explosives ...views and are not necessarily endorsed by the NWC or the Department of the Navy. 14. ABSTRACT Maritime Homeland Security (MHS) and Defense ( MHD ) of

  13. Homeland Security and Counterterrorism Research and Development: Funding, Organization, and Oversight

    DTIC Science & Technology

    2003-09-26

    agents, genomic sequencing, DNA-based diagnostics, and microfabrication technologies. CRS-3 Creation of a Department of Homeland Security and Other Laws... cybersecurity R&D. DHS estimated its FY2003 R&D funding at $761 million. FY2004 requested funding totaled $907 million, with $803 million for the S&T...systems and to deploy sensors to monitor the release of pathogens and agents), and information analysis (including tools and cybersecurity research

  14. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... biometric information; intelligence requirements, analysis, and reporting; information systems security... intelligence sources and methods to facilitate such protection and to support intelligence analysis and... Security Administration--011, Transportation Security Intelligence Service Operations Files Systems of...

  15. Cost of equity in homeland security resource allocation in the face of a strategic attacker.

    PubMed

    Shan, Xiaojun; Zhuang, Jun

    2013-06-01

    Hundreds of billions of dollars have been spent in homeland security since September 11, 2001. Many mathematical models have been developed to study strategic interactions between governments (defenders) and terrorists (attackers). However, few studies have considered the tradeoff between equity and efficiency in homeland security resource allocation. In this article, we fill this gap by developing a novel model in which a government allocates defensive resources among multiple potential targets, while reserving a portion of defensive resources (represented by the equity coefficient) for equal distribution (according to geographical areas, population, density, etc.). Such a way to model equity is one of many alternatives, but was directly inspired by homeland security resource allocation practice. The government is faced with a strategic terrorist (adaptive adversary) whose attack probabilities are endogenously determined in the model. We study the effect of the equity coefficient on the optimal defensive resource allocations and the corresponding expected loss. We find that the cost of equity (in terms of increased expected loss) increases convexly in the equity coefficient. Furthermore, such cost is lower when: (a) government uses per-valuation equity; (b) the cost-effectiveness coefficient of defense increases; and (c) the total defense budget increases. Our model, results, and insights could be used to assist policy making. © 2012 Society for Risk Analysis.

  16. 2 CFR 3000.137 - Who in the Department of Homeland Security may grant an exception to let an excluded person...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Who in the Department of Homeland Security... HOMELAND SECURITY NONPROCUREMENT DEBARMENT AND SUSPENSION General § 3000.137 Who in the Department of Homeland Security may grant an exception to let an excluded person participate in a covered transaction...

  17. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... national security, law enforcement, immigration, intelligence, or other functions consistent with the... other third parties who provide information; proposed penalty; investigators' analyses and work papers...- and security-related regulations and requirements; 3. Assess and distribute intelligence or law...

  18. A bill to establish a Chief Veterinary Officer in the Department of Homeland Security, and for other purposes.

    THOMAS, 111th Congress

    Sen. Akaka, Daniel K. [D-HI

    2010-04-27

    Senate - 04/27/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. A bill to establish a Chief Veterinary Officer in the Department of Homeland Security, and for other purposes.

    THOMAS, 111th Congress

    Sen. Akaka, Daniel K. [D-HI

    2010-04-27

    04/27/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Integrated homeland security system with passive thermal imaging and advanced video analytics

    NASA Astrophysics Data System (ADS)

    Francisco, Glen; Tillman, Jennifer; Hanna, Keith; Heubusch, Jeff; Ayers, Robert

    2007-04-01

    A complete detection, management, and control security system is absolutely essential to preempting criminal and terrorist assaults on key assets and critical infrastructure. According to Tom Ridge, former Secretary of the US Department of Homeland Security, "Voluntary efforts alone are not sufficient to provide the level of assurance Americans deserve and they must take steps to improve security." Further, it is expected that Congress will mandate private sector investment of over $20 billion in infrastructure protection between 2007 and 2015, which is incremental to funds currently being allocated to key sites by the department of Homeland Security. Nearly 500,000 individual sites have been identified by the US Department of Homeland Security as critical infrastructure sites that would suffer severe and extensive damage if a security breach should occur. In fact, one major breach in any of 7,000 critical infrastructure facilities threatens more than 10,000 people. And one major breach in any of 123 facilities-identified as "most critical" among the 500,000-threatens more than 1,000,000 people. Current visible, nightvision or near infrared imaging technology alone has limited foul-weather viewing capability, poor nighttime performance, and limited nighttime range. And many systems today yield excessive false alarms, are managed by fatigued operators, are unable to manage the voluminous data captured, or lack the ability to pinpoint where an intrusion occurred. In our 2006 paper, "Critical Infrastructure Security Confidence Through Automated Thermal Imaging", we showed how a highly effective security solution can be developed by integrating what are now available "next-generation technologies" which include: Thermal imaging for the highly effective detection of intruders in the dark of night and in challenging weather conditions at the sensor imaging level - we refer to this as the passive thermal sensor level detection building block Automated software detection

  1. Enabling private and public sector organizations as agents of homeland security

    NASA Astrophysics Data System (ADS)

    Glassco, David H. J.; Glassco, Jordan C.

    2006-05-01

    Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.

  2. Transition of advanced technology to military, homeland security, and law enforcement users

    NASA Astrophysics Data System (ADS)

    Jarrett, Stephen M.

    2004-09-01

    With the attack on the United States and the subsequent war on terror and the wars in Afghanistan and Iraq a need has been exposed for the transition of technology to all of our defenders both combat forces on the foreign battlefield and domestic forces here at home. The establishment of the Department of Homeland Security has also provided a focus on inserting technology to dramatically improve the capability of airport security forces, law enforcement, and all first responder networks. The drastic increase in the use of Special Forces in combat has also required new advanced technology capabilities at a much faster rate of development than the standard military procurement system. Technology developers must address the questions of interoperability, cost, commercialization, of how these groups will use the technology delivered and the adoption criteria of users in the deployment environment. The successful transition to the field must address the formation of complex concepts of operations in the user's adoption criteria. Prototype transition for two systems, a pocket infrared camera and an acoustic/seismic detector, will be highlighted in their effect on the wars in Iraq and Afghanistan and in the heightening of homeland security.

  3. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Transportation Worker Identification Credentialing and other Transportation Security Administration vetting... Assessment (STA) process associated with the TWIC and other TSA vetting programs. Eliminating the system of...

  4. Homeland security and virtual reality: building a Strategic Adaptive Response System (STARS).

    PubMed

    Swift, Christopher; Rosen, Joseph M; Boezer, Gordon; Lanier, Jaron; Henderson, Joseph V; Liu, Alan; Merrell, Ronald C; Nguyen, Sinh; Demas, Alex; Grigg, Elliot B; McKnight, Matthew F; Chang, Janelle; Koop, C Everett

    2005-01-01

    The advent of the Global War on Terrorism (GWOT) underscored the need to improve the U.S. disaster response paradigm. Existing systems involve numerous agencies spread across disparate functional and geographic jurisdictions. The current architecture remains vulnerable to sophisticated terrorist strikes. To address these vulnerabilities, we must continuously adapt and improve our Homeland Security architecture. Virtual Reality (VR) technologies will help model those changes and integrate technologies. This paper provides a broad overview of the strategic threats, together with a detailed examination of how specific VR technologies could be used to ensure successful disaster responses.

  5. The Department of Defense and Homeland Security relationship: Hurricane Katrina through Hurricane Irene.

    PubMed

    Weaver, John Michael

    2015-01-01

    This research explored federal intervention with the particular emphasis on examining how a collaborative relationship between Department of Defense (DOD) and Homeland Security (DHS) led to greater effectiveness between these two federal departments and their subordinates (United States Northern Command and Federal Emergency Management Agency, respectively) during the preparation and response phases of the disaster cycle regarding US continental-based hurricanes. Through the application of a two-phased, sequential mixed methods approach, this study determined how their relationship has led to longitudinal improvements in the years following Hurricane Katrina, focusing on hurricanes as the primary unit of analysis.

  6. The Role, Status and Command and Control of the National Guard in Homeland Security

    DTIC Science & Technology

    2003-04-07

    March 2003, 10. 47 Jeremy Feiler , “Senators Want National Guard Role in Homeland Security Defined,” Inside the Pentagon, 30 January 2003, 1. 48...2002). 60 Feiler , 1. 61 Tilton. 62 National Guard Association of the United States ngaus@ngaus.org, “NGAUS Weekly Update”, electronic mail message to...January 2003, 9. 71 MG (ret) Bruce Jacobs, “Lessons Lost?”, National Guard, March 2003, 31. 72 Ibid. 73 MG Gus Hargett, Chairman of the Board, NGAUS and

  7. Integrating public health and medical intelligence gathering into homeland security fusion centres.

    PubMed

    Lenart, Brienne; Albanese, Joseph; Halstead, William; Schlegelmilch, Jeffrey; Paturas, James

    Homeland security fusion centres serve to gather, analyse and share threat-related information among all levels of governments and law enforcement agencies. In order to function effectively, fusion centres must employ people with the necessary competencies to understand the nature of the threat facing a community, discriminate between important information and irrelevant or merely interesting facts and apply domain knowledge to interpret the results to obviate or reduce the existing danger. Public health and medical sector personnel routinely gather, analyse and relay health-related inform-ation, including health security risks, associated with the detection of suspicious biological or chemical agents within a community to law enforcement agencies. This paper provides a rationale for the integration of public health and medical personnel in fusion centres and describes their role in assisting law enforcement agencies, public health organisations and the medical sector to respond to natural or intentional threats against local communities, states or the nation as a whole.

  8. Mobile, portable lightweight wireless video recording solutions for homeland security, defense, and law enforcement applications

    NASA Astrophysics Data System (ADS)

    Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.

    2015-05-01

    It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.

  9. Impact of Homeland Security Alert level on calls to a law enforcement peer support hotline.

    PubMed

    Omer, Saad B; Barnett, Daniel J; Castellano, Cherie; Wierzba, Rachel K; Hiremath, Girish S; Balicer, Ran D; Everly, George S

    2007-01-01

    The Homeland Security Advisory System (HSAS) was established by the Department of Homeland Security to communicate the risk of a terrorist event. In order to explore the potential psychological impacts of HSAS we analyzed the effects of terror alerts on the law enforcement community. We used data from the New Jersey Cop 2 Cop crisis intervention hotline. Incidence Rate Ratios--interpreted as average relative increases in the daily number of calls to the Cop 2 Cop hotline during an increased alert period--were computed from Poisson models. The hotline received a total of 4,145 initial calls during the study period. The mean daily number of calls was higher during alert level elevation compared to prior 7 days (7.68 vs. 8.00). In the Poisson regression analysis, the Incidence Rate Ratios of number of calls received during elevated alert levels compared to the reference period of seven days preceding each change in alert were close to 1, with confidence intervals crossing 1 (i.e. not statistically significant) for all lag periods evaluated. This investigation, in the context of New Jersey law enforcement personnel, does not support the concern that elevating the alert status places undue stress upon alert recipients.

  10. High-Resolution Laser-Induced Breakdown Spectroscopy used in Homeland Security and Forensic Applications

    SciTech Connect

    Martin, Madhavi Z; Wullschleger, Stan D; Vass, Arpad Alexander; Martin, Rodger Carl; Grissino-Mayer, Henri

    2006-01-01

    The technique of laser-induced breakdown spectroscopy (LIBS) to detect elements for a variety of homeland security applications such as nuclear materials identification and inventory,and forensic applications has been demonstrated. For nuclear materials applications, we detected and profiled metals in coatings that were used to encapsulate nuclear fuel. Multivariate analysis has been successfully employed in the quantification of elements present in treated wood and engineered wood composites. These examples demonstrate that LIBS-based techniques are inherently well suited for diverse environmental applications related to homeland security. Three key advantages are evident: (1) small samples (mg) are sufficient; (2) samples can be analyzed by LIBS very rapidly, and (3) biological materials such as human and animal bones and wood can be analyzed with minimal sample preparation. For forensic applications they have used LIBS to determine differences in animal and human bones. They have also applied this technique in the determination of counterfeit and non-counterfeit currency. They recently applied LIBS in helping to solve a murder case.

  11. 78 FR 28761 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-16

    ... Investigations Forensic Laboratory System of Records AGENCY: Privacy Office, Department of Homeland Security... Forensic Laboratory System of Records'' and this proposed rulemaking. In this proposed rulemaking, the... Security Investigations Forensic Laboratory (HSI- FL) System of Records'' and this proposed rulemaking. In...

  12. 76 FR 59926 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    .... This system will improve customer service; increase efficiency for processing benefits; better identify... Exemptions; Department of Homeland Security/U.S. Citizenship and Immigration Services-015 Electronic... Security/U.S. Citizenship and Immigration Services-015 Electronic Immigration System-2 Account and...

  13. 76 FR 53918 - Privacy Act of 1974; Department of Homeland Security/Federal Emergency Management Agency-001...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-30

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/Federal Emergency Management Agency--001 National Emergency Family Registry and Locator System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy...

  14. 76 FR 24905 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-DHS/USCG-007...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security United States Coast Guard--DHS/USCG-007 Special Needs Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974, the...

  15. Identifying changing aviation threat environments within an adaptive Homeland Security Advisory System.

    PubMed

    Lee, Adrian J; Jacobson, Sheldon H

    2012-02-01

    A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information-based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions. © 2012 Society for Risk Analysis. All rights reserved.

  16. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... records containing the results from TSA's intelligence-driven risk- based analysis of Secure Flight... then review this information using intelligence-driven, risk-based analysis to determine whether... CFR Sec. 1560. \\1\\ 77 FR 69491 (Nov. 19, 2012). Under sec. 4012(a)(1)-(2) of the Intelligence Reform...

  17. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ..., intelligence, or other functions consistent with the routine uses set forth in this system of records notice... classified and unclassified governmental terrorist, law enforcement, immigration, or intelligence databases... analysis performed for security threat assessments and adjudications. (l) Other data as required by Form FD...

  18. The National Response Plan: a new framework for homeland security, public health, and bioterrorism response.

    PubMed

    Kamoie, Brian

    2005-01-01

    This Article provides a detailed overview of the new National Response Plan (NRP) with a focus on its applicability to bioterrorism and other public health emergencies. The Article highlights critical policy and legal issues left unresolved by the NRP, and offers recommendations for the resolution of those issues. The author concludes that, although the NRP is not perfect, it represents a major advance in domestic incident management and provides regular opportunities for review and revision as we learn how to best coordinate the national response to major incidents. A close working relationship between the Departments of Health and Human Services and Homeland Security should enable a unified response to bioterrorism and other public health emergencies in support of state and local efforts.

  19. A novel chaos-based UWB sensor for enhancing homeland security

    NASA Astrophysics Data System (ADS)

    Venkatasubramanian, Vijayaraghavan; Leung, Henry

    2005-05-01

    In this paper, we propose a novel chaos based ultra-wideband (UWB) sensor to enhance homeland security applications. The proposed chaos based modulation has a good resolution when used for wall penetrating applications. The receiver exploits the deterministic nature of chaos to cancel room reverberations avoiding complex synchronization procedure. Numerical electromagnetic (EM) simulations using finite difference time domain (FDTD) method are performed to illustrate the imaging performance of the proposed radar under real life surveillance situations with hidden and moving targets. The simulations are also employed to analyze the extent of penetrating ability of the proposed scheme for different structures. The effect of various structures and thickness on the detection performance are also commented upon.

  20. Improving the nuclear data base for non-proliferation and homeland security

    SciTech Connect

    Haight, Robert C; Bitteker, Leo J; Couture, Aaron J; Devlin, Matthew J; Fotiadis, Nikolaos; Gavron, Avigdor; Hill, Tony S; Laptev, Alexander B; Nelson, Ronald O; O'donnell, John M; Taddeucci, Terry N; Tovesson, Fredrik K; Ulmann, John L; Wender, Stephen A

    2009-01-01

    Many of the technical advances in non-proliferation and homeland security require calculations of transport of neutrons and gamma-rays through materials. The nuclear data base on which these calculations are made must be of high quality in order for the calculated responses to be credible. At the Los Alamos Neutron Science Center, three spallation neutron sources are being used to provide high-quality cross section and structure data with reactions induced by neutrons. Neutron transmission, neutron-induced fission and capture cross sections, neutron emission in fission, and gamma-ray production by neutrons are principal areas of research. Furthermore, these sources are also being used to validate calculations of the characterization and response of new detectors and detection techniques. Current research activities are summarized here.

  1. Impact of Establishing the Department of Homeland Security: Mission and Budget Analysis of the Department of Defense and Other Government Agencies

    DTIC Science & Technology

    2004-12-01

    1 A. PURPOSE .........................................................................................................1 B...INTRODUCTION A. PURPOSE The purpose of this thesis is to assess the effects the Department of Homeland Security (DHS) has had on the mission and...security and to develop a comprehensive plan that would provide for the most beneficial organization structures for supporting U.S. homeland security

  2. DHS Workshop -- Homeland Security: New Challenges for Decision Making Under Uncertainty

    SciTech Connect

    Wheeler, R; Edmunds, T; Howarth, S

    2004-02-20

    A workshop addressing the decision-making challenges confronted by the United States Department of Homeland Security (DHS) in the face of large uncertainties, complex value systems, and multiple stakeholders was held November 13-14, 2003, in Washington, D.C. Forty-six participants drawn from the DHS, other government agencies, universities, national laboratories, and the private sector attended the workshop. The goals were: (1) to develop a common understanding of the range of decisions DHS program elements must make; (2) to review selected examples of decision processes and approaches used by other organizations for similarly complex problems; and (3) to recommend steps DHS can take to ensure high quality decision making. The workshop brought together diverse perspectives on decision making in the context of complex risks. Participants included those who must make decisions affecting homeland security, those who have faced risky decisions in other domains, and those who have developed theoretical and practical approaches to high quality decision-making. The workshop was sponsored by the Science & Technology (S&T) Directorate, but was intended to address issues of concern to the three DHS operating directorates as well as S&T. The purpose of this breadth was to identify areas in which S&T capabilities and resources could be valuable to DHS as a whole. The workshop consisted of three main segments: (1) Presentations by managers from DHS Directorates, reflecting the diverse nature of decision making across DHS; (2) Presentations on four alternative approaches used to address problems in both government (counter-terrorism R&D investment; identification of critical capabilities in bioterrorism) and the private sector (corporate strategy development; terrorism insurance); and (3) Breakout groups chartered to identify barriers and propose actions to address them, in each of five decision classes: (1) Portfolio management; (2) Grant allocation; (3) Critical one

  3. Nanostructure based EO/IR sensor development for homeland security applications

    NASA Astrophysics Data System (ADS)

    Sood, Ashok K.; Welser, Roger E.; Sood, Adam W.; Puri, Yash R.; Manzur, Tariq; Dhar, Nibir K.; Polla, Dennis L.; Wang, Zhong L.; Wijewarnasuriya, Priyalal S.; Anwar, A. F. M.

    2011-06-01

    Next Generation EO/IR focal plane arrays using nanostructure materials are being developed for a variety of Defense and Homeland Security Sensor Applications. Several different nanomaterials are being evaluated for these applications. These include ZnO nanowires, GaN Nanowires and II-VI nanowires, which have demonstrated large signal to noise ratio as a wide band gap nanostructure material in the UV band. Similarly, the work is under way using Carbon Nanotubes (CNT) for a high speed detector and focal plane array as two-dimensional array as bolometer for IR bands of interest, which can be implemented for the sensors for homeland security applications. In this paper, we will discuss the sensor design and model predicting performance of an EO/IR focal plane array and Sensor that can cover the UV to IR bands of interest. The model can provide a robust means for comparing performance of the EO/IR FPA's and Sensors that can operate in the UV, Visible-NIR (0.4- 1.8μ), SWIR (2.0-2.5μ), MWIR (3-5μ), and LWIR bands (8-14μ). This model can be used as a tool for predicting performance of nanostructure arrays under development. We will also discuss our results on growth and characterization of ZnO nanowires and CNT's for the next generation sensor applications. We also present several approaches for integrated energy harvesting using nanostructure based solar cells and Nanogenerators that can be used to supplement the energy required for nanostructure based sensors.

  4. Neutron Generators Developed at LBNL for Homeland Security andImaging Applications

    SciTech Connect

    Reijonen, Jani

    2006-08-13

    The Plasma and Ion Source Technology Group at Lawrence Berkeley National Laboratory has developed various types of advanced D-D (neutron energy 2.5 MeV), D-T (14 MeV) and T-T (0-9 MeV) neutron generators for wide range of applications. These applications include medical (Boron Neutron Capture Therapy), homeland security (Prompt Gamma Activation Analysis, Fast Neutron Activation Analysis and Pulsed Fast Neutron Transmission Spectroscopy) and planetary exploration with a sub-surface material characterization on Mars. These neutron generators utilize RF induction discharge to ionize the deuterium/tritium gas. This discharge method provides high plasma density for high output current, high atomic species from molecular gases, long life operation and versatility for various discharge chamber geometries. Four main neutron generator developments are discussed here: high neutron output co-axial neutron generator for BNCT applications, point neutron generator for security applications, compact and sub-compact axial neutron generator for elemental analysis applications. Current status of the neutron generator development with experimental data will be presented.

  5. Homeland security monitoring sensors and early warning relay and diagnostic system

    NASA Astrophysics Data System (ADS)

    Varadan, Vijay; Ruffin, Paul B.; Brantley, Christina; Edwards, Eugene

    2010-04-01

    This paper addresses the development of a wireless sensor system array for the detection and identification of bioterrorism agents and hazardous vapors and other gases with a realistic goal of "stick and forget sensing" especially attractive to homeland security needs. New and improved sensors are needed for many security applications with fast, reliable and sensitive detection and identification. Some of the most important tools in today's national security are biological and chemical agents' detection and identification. These devices need to be small and fast so that they can easily detect and identify any traces of hazardous materials. Biosensors are analytical devices which use biological interactions to provide either qualitative or quantitative results. Due to its ability to manipulate and organize matter and structures from atomic up to molecular scales, the nanotechnology is widely viewed as the most significant technological frontier which has to be explored in many areas including physical, chemical, electrical and biological sciences. Design and successful development of devices of the size of few nm to couple of hundreds of nm, nanotechnology has been heralded as most powerful technology as ever seen before. This has lead to the development of better materials, highly sensitive sensing systems and wide verity of nano-devices. This sensor array is based on Multi-walled Carbon Nanotube (MWCNT) as sensing element, which is synthesized and chemically bonded with different polymers for sensing different biological agents and gases. An array of these sensing elements with integrated ChemFET is connected to a low power wireless system for the real-time detection and identification. We have successfully demonstrated the detection and identification of various gases and chemicals using wireless setup.

  6. Thinking Interestingly: The Use of Game Play to Enhance Learning and Facilitate Critical Thinking within a Homeland Security Curriculum

    ERIC Educational Resources Information Center

    Cozine, Keith

    2015-01-01

    Students of homeland security need to grasp a diverse body of knowledge and have a keen understanding of the variety of events and issues that impact how they can apply that knowledge. The goal of higher education should not just be about imparting knowledge but also about giving students tools and skill sets to "think interestingly" to…

  7. 78 FR 70313 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-25

    ... with the Privacy Act of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) U.S. Citizenship... Directorate (RAIO), Refugee Affairs Division (RAD) is responsible for interviewing refugee applicants and... be collected on anchor relatives, qualifying family members, derivatives, and Type C add-on...

  8. 75 FR 55290 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-031...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ... Exemptions; Department of Homeland Security/ALL-031 Information Sharing Environment Suspicious Activity... Sharing Environment Suspicious Activity Reporting Initiative System of Records'' and this proposed... establish a new DHS system of records titled, ``DHS/ALL-031 Information Sharing Environment (ISE) Suspicious...

  9. 77 FR 52633 - Public Safety and Homeland Security Bureau Seeks Comment on Post-Reconfiguration 800 MHz Band...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-30

    ... should follow the instructions provided on the Web site for submitting comments. Paper Filers: Parties... COMMISSION 47 CFR Part 90 Public Safety and Homeland Security Bureau Seeks Comment on Post- Reconfiguration...: Notice of proposed rulemaking. SUMMARY: This document seeks comment on post-reconfiguration 800 MHz band...

  10. APPLICATIONS OF CFD SIMULATIONS OF POLLUTANT TRANSPORT AND DISPERSION WITHIN AMBIENT URBAN BUILDING ENVIRONMENTS: INCLUDING HOMELAND SECURITY

    EPA Science Inventory

    There is presently much focus on Homeland Security and the need to understand how potential sources of toxic material are transported and dispersed in the urban environment. Material transport and dispersion within these urban centers is highly influenced by the buildings. Compu...

  11. 41 CFR 102-73.196 - What types of special purpose space may the Department of Homeland Security lease?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What types of special purpose space may the Department of Homeland Security lease? 102-73.196 Section 102-73.196 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 73-REAL ESTATE...

  12. 41 CFR 102-73.196 - What types of special purpose space may the Department of Homeland Security lease?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What types of special purpose space may the Department of Homeland Security lease? 102-73.196 Section 102-73.196 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 73-REAL ESTATE...

  13. Thinking Interestingly: The Use of Game Play to Enhance Learning and Facilitate Critical Thinking within a Homeland Security Curriculum

    ERIC Educational Resources Information Center

    Cozine, Keith

    2015-01-01

    Students of homeland security need to grasp a diverse body of knowledge and have a keen understanding of the variety of events and issues that impact how they can apply that knowledge. The goal of higher education should not just be about imparting knowledge but also about giving students tools and skill sets to "think interestingly" to…

  14. APPLICATIONS OF CFD SIMULATIONS OF POLLUTANT TRANSPORT AND DISPERSION WITHIN AMBIENT URBAN BUILDING ENVIRONMENTS: INCLUDING HOMELAND SECURITY

    EPA Science Inventory

    There is presently much focus on Homeland Security and the need to understand how potential sources of toxic material are transported and dispersed in the urban environment. Material transport and dispersion within these urban centers is highly influenced by the buildings. Compu...

  15. The Homeland Security Ecosystem: An Analysis of Hierarchical and Ecosystem Models and Their Influence on Decision Makers

    DTIC Science & Technology

    2012-12-01

    Leave blank) 2 . REPORT DATE December 2012 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE THE HOMELAND SECURITY...20. LIMITATION OF ABSTRACT UU NSN 7540–01–280–5500 Standard Form 298 (Rev. 2 –89) Prescribed by ANSI Std. 239–18 ii THIS PAGE INTENTIONALLY... 2 II. LITERATURE REVIEW ...........................................................................................5 A. INTRODUCTION

  16. A bill to establish a Chief Veterinary Officer in the Department of Homeland Security, and for other purposes.

    THOMAS, 111th Congress

    Sen. Akaka, Daniel K. [D-HI

    2010-04-27

    04/27/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (text of measure as introduced: CR S2709-2710) (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-01

    ... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security... the provisions of the Privacy Act, as amended, this notice announces a renewal of an existing computer.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law...

  18. REPORT ON THE HOMELAND SECURITY WORKSHOP ON TRANSPORT AND DISPOSAL OF WASTES FROM FACILITIES CONTAMINATED WITH CHEMICAL AND BIOLOGICAL AGENTS

    EPA Science Inventory

    This report summarizes discussions from the "Homeland Security Workshop on Transport and Disposal of Wastes From Facilities Contaminated With Chemical or Biological Agents." The workshop was held on May 28-30, 2003, in Cincinnati, Ohio, and its objectives were to:

    .Documen...

  19. 76 FR 10205 - Department of Homeland Security Implementation of OMB Guidance on Drug-Free Workplace Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-24

    ... unintended changes this action makes in DHS policies and procedures for drug-free workplaces. All comments or.... Adopting the OMB guidance in place of the common rule will not substantively change the drug-free workplace... Implementation of OMB Guidance on Drug-Free Workplace Requirements AGENCY: Department of Homeland Security (DHS...

  20. 76 FR 39245 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Coast...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ....S. Coast Guard--008 Courts Martial Case Files System of Records; Correction AGENCY: Privacy Office.../U.S. Coast Guard--008 Courts Martial Case Files System of Records'' from certain provisions of the... system of records titled, ``Department of Homeland Security/U.S. Coast Guard -008 Courts Martial Case...

  1. 75 FR 412 - Privacy Act of 1974; Department of Homeland Security U.S. Immigration and Customs Enforcement-001...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-05

    ...] Privacy Act of 1974; Department of Homeland Security U.S. Immigration and Customs Enforcement--001 Student... and Customs Enforcement is modifying an existing system of records titled Student and Exchange Visitor... generation Student and Exchange Visitor Information System application, called Student and Exchange...

  2. Toward an Integrated Executable Architecture and M&S Based Analysis for Counter Terrorism and Homeland Security

    DTIC Science & Technology

    2006-09-01

    construct. Executable Architecture, a Capability Management methodology, provides the means to conduct dynamic analysis of a system, and is emerging as a...homeland security scenario, and show that a civilian emergency management SE tool can be interfaced with a defense federation. Finally and perhaps most...Capability Definition, Engineering and Management Technology Demonstration Project (CapDEM TDP) [6]. Capability Engineering extends traditional

  3. 77 FR 38306 - GFIRST Conference Stakeholder Evaluation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-27

    ...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office of Cybersecurity and Communications (CS&C), National Cyber Security Division (NCSD), United States... SECURITY GFIRST Conference Stakeholder Evaluation AGENCY: National Protection and Programs Directorate, DHS...

  4. The air-kerma rate constant: application to air-kerma measurements for homeland security.

    PubMed

    Pibida, L; Minniti, R; Lucas, L; Seltzer, S M

    2008-02-01

    Air-kerma rate measurements from 57Co, 60Co, and 137Cs radioactive sources were performed. These measurements were motivated by the development of new sources at the National Institute of Standards and Technology (NIST) for radiological testing of equipment for homeland security applications. The testing of radiation detection equipment relies on knowing the values of the air-kerma rate for the radioactive sources at a fixed distance from the source. The air-kerma rate can be measured or alternatively estimated by using published values of the air-kerma rate constant. Although there are a large number of published values of the air-kerma rate constant for radionuclide sources based on theoretical calculations, strong disagreement is observed throughout the literature. Furthermore, most of the published values have no uncertainties assigned, and therefore their use for testing radiological equipment is limited. In this work we report experimentally-measured values of the air-kerma rate for three radionuclides with well defined source geometries and activities. The results are compared to estimates based on published values of the air-kerma rate constant. Such values are easily found in the literature from the last three decades and are used commonly by the scientific community.

  5. Compact Dielectric Wall Accelerator Development For Intensity Modulated Proton Therapy And Homeland Security Applications

    SciTech Connect

    Chen, Y -; Caporaso, G J; Guethlein, G; Sampayan, S; Akana, G; Anaya, R; Blackfield, D; Cook, E; Falabella, S; Gower, E; Harris, J; Hawkins, S; Hickman, B; Holmes, C; Horner, A; Nelson, S; Paul, A; Pearson, D; Poole, B; Richardson, R; Sanders, D; Stanley, J; Sullivan, J; Wang, L; Watson, J; Weir, J

    2009-06-17

    Compact dielectric wall (DWA) accelerator technology is being developed at the Lawrence Livermore National Laboratory. The DWA accelerator uses fast switched high voltage transmission lines to generate pulsed electric fields on the inside of a high gradient insulating (HGI) acceleration tube. Its high electric field gradients are achieved by the use of alternating insulators and conductors and short pulse times. The DWA concept can be applied to accelerate charge particle beams with any charge to mass ratio and energy. Based on the DWA system, a novel compact proton therapy accelerator is being developed. This proton therapy system will produce individual pulses that can be varied in intensity, energy and spot width. The system will be capable of being sited in a conventional linac vault and provide intensity modulated rotational therapy. The status of the developmental new technologies that make the compact system possible will be reviewed. These include, high gradient vacuum insulators, solid dielectric materials, SiC photoconductive switches and compact proton sources. Applications of the DWA accelerator to problems in homeland security will also be discussed.

  6. System-on-chip-centric unattended embedded sensors in homeland security and defense applications

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Forrester, Thomas; Degrood, Kevin; Shih, Min-Yi; Walter, Kevin; Lee, Kang; Gans, Eric; Esterkin, Vladimir

    2009-05-01

    System-on-chip (SoC) single-die electronic integrated circuit (IC) integration has recently been attracting a great deal of attention, due to its high modularity, universality, and relatively low fabrication cost. The SoC also has low power consumption and it is naturally suited to being a base for integration of embedded sensors. Such sensors can run unattended, and can be either commercial off-the-shelf (COTS) electronic, COTS microelectromechanical systems (MEMS), or optical-COTS or produced in house (i.e., at Physical Optics Corporation, POC). In the version with the simplest electronic packaging, they can be integrated with low-power wireless RF that can communicate with a central processing unit (CPU) integrated in-house and installed on the specific platform of interest. Such a platform can be a human body (for e-clothing), unmanned aerial vehicle (UAV), unmanned ground vehicle (UGV), or many others. In this paper we discuss SoC-centric embedded unattended sensors in Homeland Security and military applications, including specific application scenarios (or CONOPS). In one specific example, we analyze an embedded polarization optical sensor produced in house, including generalized Lambertian light-emitting diode (LED) sources and secondary nonimaging optics (NIO).

  7. The use of stimulated electron emission (SEE) in homeland security applications

    NASA Astrophysics Data System (ADS)

    Ing, H.; Andrews, H. R.; Facina, M.; Lee, W. T.; Niu, H. W.

    2012-06-01

    Certain insulating solids can store a fraction of the absorbed energy when irradiated by ionizing radiation. The stored energy can be released subsequently by heating or optical stimulation. As a result, light may be emitted through Thermoluminescence (TL) or Optically-Stimulated Luminescence (OSL) and electrons may be emitted through Thermally-Stimulated Electron Emission (TSEE) or Optically-Stimulated Electron Emission (OSEE). TL and OSL are widely used in current radiation dosimetry systems. However, despite considerable research effort during the early 1970s, SEE was not commonly adopted for dosimetry applications. One of the main reasons is that SEE is a surface phenomenon, while luminescence is a bulk phenomenon, making SEE more susceptible to humidity, absorption of gases, minor physical defects and handling, both before and after irradiation. Nevertheless, it has been recognized that SEE may be useful for homeland security applications in nuclear forensics, where dose accuracy is not the primary performance metric. In this research, we are investigating the use of SEE for nuclear forensic applications. Many common materials, both natural and man-made, exhibit the phenomenon, providing an opportunity to use the environment itself as an in-situ radiation detector. We have designed and constructed a unique prototype reader for conducting SEE measurements. We have demonstrated that the SEE measurements from a variety of materials are quantitatively reproducible and correlated to radiation exposure. Due to the broad applicability of SEE, significant additional studies are warranted to optimize this novel technique for nuclear forensic and other applications.

  8. Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery

    SciTech Connect

    Kolda, T; Brown, D; Corones, J; Critchlow, T; Eliassi-Rad, T; Getoor, L; Hendrickson, B; Kumar, V; Lambert, D; Matarazzo, C; McCurley, K; Merrill, M; Samatova, N; Speck, D; Srikant, R; Thomas, J; Wertheimer, M; Wong, P C

    2005-01-06

    The Department of Homeland Security (DHS) has vast amounts of data available, but its ultimate value cannot be realized without powerful technologies for knowledge discovery to enable better decision making by analysts. Past evidence has shown that terrorist activities leave detectable footprints, but these footprints generally have not been discovered until the opportunity for maximum benefit has passed. The challenge faced by the DHS is to discover the money transfers, border crossings, and other activities in advance of an attack and use that information to identify potential threats and vulnerabilities. The data to be analyzed by DHS comes from many sources ranging from news feeds, to raw sensors, to intelligence reports, and more. The amount of data is staggering; some estimates place the number of entities to be processed at 1015. The uses for the data are varied as well, including entity tracking over space and time, identifying complex and evolving relationships between entities, and identifying organization structure, to name a few. Because they are ideal for representing relationship and linkage information, semantic graphs have emerged as a key technology for fusing and organizing DHS data. A semantic graph organizes relational data by using nodes to represent entities and edges to connect related entities. Hidden relationships in the data are then uncovered by examining the structure and properties of the semantic graph.

  9. Accelerator mass spectrometry of Strontium-90 for homeland security, environmental monitoring, and human health

    SciTech Connect

    Tumey, S J; Brown, T A; Hamilton, T F; Hillegonds, D J

    2008-03-03

    Strontium-90 is one of the most hazardous materials managed by agencies charged with protecting the public from radiation. Traditional radiometric methods have been limited by low sample throughput and slow turnaround times. Mass spectrometry offers the advantage of shorter analysis times and the ability to measure samples immediately after processing, however conventional mass spectrometric techniques are susceptible to molecular isobaric interferences that limit their overall sensitivity. In contrast, accelerator mass spectrometry is insensitive to molecular interferences and we have therefore begun developing a method for determination of {sup 90}Sr by accelerator mass spectrometry. Despite a pervasive interference from {sup 90}Zr, our initial development has yielded an instrumental background of {approx} 10{sup 8} atoms (75 mBq) per sample. Further refinement of our system (e.g., redesign of our detector, use of alternative target materials) is expected to push the background below 10{sup 6} atoms, close to the theoretical limit for AMS. Once we have refined our system and developed suitable sample preparation protocols, we will utilize our capability in applications to homeland security, environmental monitoring, and human health.

  10. Sensing arrays based on integrated optics microresonators for homeland security applications

    NASA Astrophysics Data System (ADS)

    Klunder, Dion; Elders, Job; Burger, Gert-Jan; Amersfoort, Martin; Krioukov, Evgueni; Otto, Cees; Hoekstra, Hugo; Driessen, Alfred

    2004-03-01

    Integrated optics micoresonators (μ-resonators) are microstructures with dimensions typically in the order of tens of microns down to a few microns, whose response depends critically on optical wavelength and material properties. Recent experimental studies have shown that they are suitable as refractive index sensors, absorption sensors, and microresonator-assisted single and two-photon fluorescence. The absorption and fluorescence spectra are material-specific properties, that the devices can readily detect by using different excitation wavelengths. Therefore, the devices are suitable for non-specific agent detection. Due to their inherent small size and the ease of cascading several microresonators, they are suitable building blocks for a sensing array allowing sensing/detection of multiple quantities/agents on a single chip, by e.g., using different chemo-optical transduction layers on top of the microresonators. Such devices have a chip-area of only a few 100 μm2, making them suitable for sensing ultra-small analyte volumes (which is advantageous for bio-chemical sensing). In this contribution, sensing arrays based on integrated optics microresonators and their prospects for Homeland Security applications are discussed. Several device-concepts based on integrated optics microresonators will be treated. Their performance is analyzed using realistic parameters and experimental results of microresonator devices realized in silicon oxynitride (SiON) technology. The potential integration of theses devices with microelectronics, micro-mechanics and micro total analysis systems is discussed.

  11. Integration of sensing and computing in an intelligent decision support system for homeland security defense

    SciTech Connect

    Wu, Qishi; Zhu, Mengxia; Rao, Nageswara S

    2009-04-01

    We propose an intelligent decision support system based on sensor and computer networks that incorporates various component techniques for sensor deployment, data routing, distributed computing, and information fusion. The integrated system is deployed in a distributed environment composed of both wireless sensor networks for data collection and wired computer networks for data processing in support of homeland security defense. We present the system framework and formulate the analytical problems and develop approximate or exact solutions for the subtasks: (i) sensor deployment strategy based on a two-dimensional genetic algorithm to achieve maximum coverage with cost constraints; (ii) data routing scheme to achieve maximum signal strength with minimum path loss, high energy efficiency, and effective fault tolerance; (iii) network mapping method to assign computing modules to network nodes for high-performance distributed data processing; and (iv) binary decision fusion rule that derive threshold bounds to improve system hit rate and false alarm rate. These component solutions are implemented and evaluated through either experiments or simulations in various application scenarios. The extensive results demonstrate that these component solutions imbue the integrated system with the desirable and useful quality of intelligence in decision making.

  12. A Radiation Homeland Security Workshop Presented to the City of Berkeley Fire Department

    NASA Astrophysics Data System (ADS)

    Matis, Howard

    2005-04-01

    A radiation incident in a community, ranging from a transportation accident to a dirty bomb, is expected to be rare, but still can occur. First responders to such an incident must be prepared. City of Berkeley officials met with members of the Lawrence Berkeley National Laboratory staff and agreed that the laboratory participants would create material and teach it to all of their fire fighting staff. To design such a course, nuclear physicists, biologists and health physicists merged some of their existing teaching material together with previous homeland security efforts to produce a course that lasted one full day. The material was designed to help alleviate the myths and fear of radiation experienced by many first responders. It included basic nuclear physics information, biological effects, and methods that health physicists use to detect and handle radiation. The curriculum included several hands on activities which involved working directly with the meters the Berkeley Fire Department possessed. In addition, I will discuss some observations from teaching this course material plus some unusual problems that we encountered, such as suddenly the whole class responding to a fire.

  13. Homeland security application of the Army Soft Target Exploitation and Fusion (STEF) system

    NASA Astrophysics Data System (ADS)

    Antony, Richard T.; Karakowski, Joseph A.

    2010-04-01

    A fusion system that accommodates both text-based extracted information along with more conventional sensor-derived input has been developed and demonstrated in a terrorist attack scenario as part of the Empire Challenge (EC) 09 Exercise. Although the fusion system was developed to support Army military analysts, the system, based on a set of foundational fusion principles, has direct applicability to department of homeland security (DHS) & defense, law enforcement, and other applications. Several novel fusion technologies and applications were demonstrated in EC09. One such technology is location normalization that accommodates both fuzzy semantic expressions such as behind Library A, across the street from the market place, as well as traditional spatial representations. Additionally, the fusion system provides a range of fusion products not supported by traditional fusion algorithms. Many of these additional capabilities have direct applicability to DHS. A formal test of the fusion system was performed during the EC09 exercise. The system demonstrated that it was able to (1) automatically form tracks, (2) help analysts visualize behavior of individuals over time, (3) link key individuals based on both explicit message-based information as well as discovered (fusion-derived) implicit relationships, and (4) suggest possible individuals of interest based on their association with High Value Individuals (HVI) and user-defined key locations.

  14. Analyzing the homeland security of the U.S.-Mexico border.

    PubMed

    Wein, Lawrence M; Liu, Yifan; Motskin, Arik

    2009-05-01

    We develop a mathematical optimization model at the intersection of homeland security and immigration, that chooses various immigration enforcement decision variables to minimize the probability that a terrorist can successfully enter the United States across the U.S.-Mexico border. Included are a discrete choice model for the probability that a potential alien crosser will attempt to cross the U.S.-Mexico border in terms of the likelihood of success and the U.S. wage for illegal workers, a spatial model that calculates the apprehension probability as a function of the number of crossers, the number of border patrol agents, and the amount of surveillance technology on the border, a queueing model that determines the probability that an apprehended alien will be detained and removed as a function of the number of detention beds, and an equilibrium model for the illegal wage that balances the supply and demand for work and incorporates the impact of worksite enforcement. Our main result is that detention beds are the current system bottleneck (even after the large reduction in detention residence times recently achieved by expedited removal), and increases in border patrol staffing or surveillance technology would not provide any improvements without a large increase in detention capacity. Our model also predicts that surveillance technology is more cost effective than border patrol agents, which in turn are more cost effective than worksite inspectors, but these results are not robust due to the difficulty of predicting human behavior from existing data. Overall, the probability that a terrorist can successfully enter the United States is very high, and it would be extremely costly and difficult to significantly reduce it. We also investigate the alternative objective function of minimizing the flow of illegal aliens across the U.S.-Mexico border, and obtain qualitatively similar results.

  15. Advanced shortwave infrared and Raman hyperspectral sensors for homeland security and law enforcement operations

    NASA Astrophysics Data System (ADS)

    Klueva, Oksana; Nelson, Matthew P.; Gardner, Charles W.; Gomer, Nathaniel R.

    2015-05-01

    Proliferation of chemical and explosive threats as well as illicit drugs continues to be an escalating danger to civilian and military personnel. Conventional means of detecting and identifying hazardous materials often require the use of reagents and/or physical sampling, which is a time-consuming, costly and often dangerous process. Stand-off detection allows the operator to detect threat residues from a safer distance minimizing danger to people and equipment. Current fielded technologies for standoff detection of chemical and explosive threats are challenged by low area search rates, poor targeting efficiency, lack of sensitivity and specificity or use of costly and potentially unsafe equipment such as lasers. A demand exists for stand-off systems that are fast, safe, reliable and user-friendly. To address this need, ChemImage Sensor Systems™ (CISS) has developed reagent-less, non-contact, non-destructive sensors for the real-time detection of hazardous materials based on widefield shortwave infrared (SWIR) and Raman hyperspectral imaging (HSI). Hyperspectral imaging enables automated target detection displayed in the form of image making result analysis intuitive and user-friendly. Application of the CISS' SWIR-HSI and Raman sensing technologies to Homeland Security and Law Enforcement for standoff detection of homemade explosives and illicit drugs and their precursors in vehicle and personnel checkpoints is discussed. Sensing technologies include a portable, robot-mounted and standalone variants of the technology. Test data is shown that supports the use of SWIR and Raman HSI for explosive and drug screening at checkpoints as well as screening for explosives and drugs at suspected clandestine manufacturing facilities.

  16. Creating a health care agenda for the Department of Homeland Security.

    PubMed

    Noji, Eric K

    2003-11-01

    The challenge before us at DHS--to optimize use of our resources to create an effective health response to terrorist incidents--is formidable. After spending several weeks in Baghdad and seeing all the problems that arise in establishing a new government, I found myself thinking, "This is going to take years." Then, when I returned to the United States, Surgeon General Vice Adam. Richard Carmona, MD, MPH, almost immediately assigned me to the new Department of Homeland Security, adding that the problems it faced were probably worse than those in Baghdad. "That is impossible," I thought. "There's no way this could present a greater logistical, organizational, cultural, and administrative challenge than establishing a new government in a country with no democratic tradition in its 5,000-year history!" Within two days of my appointment to the new department, however, I recognized the accuracy of the surgeon general's statement. We will, however, work diligently toward our goals. During the next couple of years, a major DHS priority will be state and local preparedness, which includes rapid identification of epidemics, improved training, the establishment of liaisons with other first responders such as fire, rescue, law enforcement, and emergency medical services teams, and implementing state-of-the-art communication, disease alert, and reporting systems. Table 2 constitutes a checklist for bioterrorism preparedness, from a public health perspective. Local response and coordination with federal authorities and the issues inherent in these efforts are discussed in depth in the presentations that begin on the following page of this publication.

  17. 2007 Heartland Security Conference and Exhibition - Technology for Defense and Homeland Security Readiness

    DTIC Science & Technology

    2007-07-11

    Craft Lightweight, composite material with high-speed hull SAFECON – 90 second container screening device FAST M2 (Future Attribute Screening...COOPERATION – PARTICULARLY DIFFICULT IN A POST 9/11 WORLD S&T Policy Challenges Adopted from Prof. Neal Lane, Rice Univ. UNIVERSITY OF MINNESOTA...Immediate Assessment & Response to Hazardous Situations 7/13/2007 2007 Recon Robotics 2 Agenda • Introductions • The Recon Scout™ • Driving Need • Market

  18. Maritime NORAD: Setting a Course for Success in Joint, Interagency, and Bi-National Maritime Homeland Security and Defense

    DTIC Science & Technology

    2007-04-05

    and the U.S. every day. Anomalies in ordinary activities such as vessel escorts in the Strait of Juan de Fuca or lock inspections on the St...routes like the Strait of Juan de Fuca leading to Vancouver, British Columbia and Puget Sound in Washington. As Figure 3 illustrates, the large...Homeland Security Tom Ridge announced his resignation in late 2004, DHS was moving toward regionalization that would have provided unified, operational

  19. Rules And A Rubric Could Be Used To Assess The Openness Of A Homeland Security Enterprise Social Network

    DTIC Science & Technology

    2016-12-01

    responsibilities in producing and consuming contributions.117 Companies have been using social media and Web 2.0 tools to include blogs and wikis...RUBRIC COULD BE USED TO ASSESS THE OPENNESS OF A HOMELAND SECURITY ENTERPRISE SOCIAL NETWORK by Jeffrey Thomas Murray December 2016 Thesis Co...reporting burden for this collection of information is estimated to average 1 hour per response , including the time for reviewing instruction, searching

  20. Introducing the Future Now: Using Memetics and Popular Culture to Identify the Post-9/11 Homeland Security Zeitgeist

    DTIC Science & Technology

    2008-03-01

    Homeland Security can break in.153 • The Gluten -Free Bible: In our post-9/11 world, worse things than gluten can befall an American abroad. The...Press, 2007), 206. 153 Patricia Cornwell, Predator (New York: Berkeley Publishing Group, 2005), 70. 154 Jax Peters Lowell, The Gluten -Free Bible...scripts or projects under development for references to bombing, hijacking, terrorism, or other sensitive subjects that producers thought might be

  1. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    NASA Astrophysics Data System (ADS)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  2. 76 FR 5603 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-01

    ... Coordination and Planning--004 Publicly Available Social Media Monitoring and Situational Awareness Initiative... Media Monitoring and Situational Awareness Initiative System of Records.'' The Office of Operations... Social Media Monitoring and Situational Awareness (Initiative) to assist the Department of Homeland...

  3. Curriculum evaluation and revision in a nascent field: the utility of the retrospective pretest--posttest model in a homeland security program of study.

    PubMed

    Pelfrey, William V; Pelfrey, William V

    2009-02-01

    Although most academic disciplines evolve at a measured pace, the emerging field of homeland security must, for reasons of safety and security, evolve rapidly. The Department of Homeland Security sponsored the establishment of a graduate educational program for key officials holding homeland security roles. Because homeland security is a nascent field, the establishment of a program curriculum was forced to draw from a variety of disciplines. Curriculum evaluation was complicated by the rapid changes occurring in the emerging discipline, producing response shift bias, and interfering with the pre-post assessments. To compensate for the validity threat associated with response shift bias, a retrospective pretest-posttest evaluative methodology was used. Data indicate the program has evolved in a significant and orderly fashion and these data support the use of this innovative evaluation approach in the development of any discipline.

  4. A bill to authorize the Secretary of Homeland Security to waive certain provisions of the pre-September 11, 2001, fire grant program, and for other purposes.

    THOMAS, 111th Congress

    Sen. Dodd, Christopher J. [D-CT

    2009-05-14

    05/14/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. How Should Public Administration Education Curriculum Within Indiana Higher Education Institutions Evolve to Reflect the Complex Homeland Security Issues Faced by Future Public Sector Employees?

    DTIC Science & Technology

    2012-03-01

    1 A. PROBLEM STATEMENT .............................................................................1 B. RESEARCH ...5 B. SIGNIFICANCE OF RESEARCH ................................................................7 C. METHOD...designed to provide cutting-edge and innovative research and publications on homeland security issues and subjects, and in offering courses on

  6. A bill to authorize the Secretary of Homeland Security to waive certain provisions of the pre-September 11, 2001, fire grant program, and for other purposes.

    THOMAS, 111th Congress

    Sen. Dodd, Christopher J. [D-CT

    2009-05-14

    05/14/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. Department of Homeland Security national planning scenarios: a spectrum of imaging findings to educate the radiologists.

    PubMed

    Burch, Heather; Kitley, Charles A; Naeem, Mohammed

    2010-07-01

    Following the events of the September 11th attack, there has been an increasing concern about the possibility of a future attack on our homeland. In response, the United States Department of Homeland Defense has planned for a future attack by formulating multiple scenarios which may occur in the event of such a disaster. Radiology will play a key role in each of these scenarios, assisting with triage, diagnosis, and therapy of the large populations which potentially could be involved. This article describes some of these scenarios as well the response which will be expected of the radiology community in the event of such a disaster.

  8. Measuring Preparedness: Assessing the Impact of the Homeland Security Grant Program

    DTIC Science & Technology

    2009-03-01

    collaborative effort between the federal, state 121 Mark Gerencser, Reginald Van Lee, Fernando Napolitano, and...preparedness system. Mark Gerencser, Reginald Van Lee, Fernando Napolitano and Christopher Kelly recently released a book that could assist homeland...Gerencser, Mark, Reginald Van Lee, Fernando Napolitano, and Christopher Kelly. Megacommunities: How Leaders of Government, Business, and Non-profits

  9. HOMELAND SECURITY: Challenges and Strategies in Addressing Short- and Long-Term National Needs

    DTIC Science & Technology

    2007-11-02

    air travel has already prompted attention to chronic problems with airport security that we and others have been pointing to for years. Moreover, the...capital for certain areas such as intelligence, public health and airport security will also be necessary as well to foster and maintain the skill...Weaknesses in Airport Security and Options for Assigning Screening Responsibilities, (GAO-01-1165T, Sept. 21, 2001). Aviation Security: Terrorist Acts

  10. 2008 Stability, Security, Transition and Reconstruction Operations Conference

    DTIC Science & Technology

    2008-09-04

    Planning” · Kevin Staley , Deputy Director, Partner Nation Engagement · COL Donald Zimmer, USA, Chief, Security Cooperation Division...reconSTrucTion operaTionS conference ParticiPants include: u GEN Peter Schoomaker, USA (Ret), Former Chief of Staff, U.S. Army u Ambassador David ...Camber Corporation Panelists: u COL Donald Zimmer, USA, Chief, Security Cooperation Division, USAFRICOM u Ambassador David Greenlee u

  11. Combating Terrorism in the Philippines to Improve U.S. Homeland Security

    DTIC Science & Technology

    2010-12-01

    the twentieth century when colonial rule transferred from Spain to the United States at the conclusion of the Spanish American War. The Spanish ...Major High-Tech Systems,” 2. Moro is a multiethnic identity comprised of members of 13 distinct language groups whose homeland is in the Southern...centuries. For centuries, the Spanish failed to spread their colonial roots into Mindanao and farther south, despite repeated attempts to do so. The

  12. Role of DoD Unmanned Aerial Vehicles for Homeland Security

    DTIC Science & Technology

    2010-02-16

    22 illegal aliens, 3 vehicles, and 2300 pounds of marijuana . The DHS gained its initial experience with medium altitude UAVs and found them to be...3,000 hours, directly contributing to nearly 4,800 arrests and the seizure of over 22,000 pounds of marijuana in support of the Department of Homeland...technology for UAVs to locate and identify toxic substances while the Department of Energy announced that it will test UAVs to detect potential

  13. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    DTIC Science & Technology

    2016-03-01

    Based Security, vol. 144 (Paris: OECD Publishing, 2009), 11, http://www.oecd- ilibrary.org.libproxy.nps.edu/transport/terrorism-and-international...Terrorism and International Transport: Towards a Risk-Based Security, vol. 144. Paris: OECD Publishing, 2009. http://www.oecd

  14. Counterterrorism Enhancement and Department of Homeland Security Authorization Act of 2010

    THOMAS, 111th Congress

    Rep. King, Peter T. [R-NY-3

    2010-06-24

    07/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Counterterrorism Enhancement and Department of Homeland Security Authorization Act of 2010

    THOMAS, 111th Congress

    Rep. King, Peter T. [R-NY-3

    2010-06-24

    House - 07/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. Counterterrorism Enhancement and Department of Homeland Security Authorization Act of 2010

    THOMAS, 111th Congress

    Rep. King, Peter T. [R-NY-3

    2010-06-24

    07/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. Purposefully Manufactured Vulnerabilities in U.S. Government Technology Microchips: Risks and Homeland Security Implications

    DTIC Science & Technology

    2012-12-01

    for Rio Tinto executives being tried in China, to gain inside information on the trial defense strategy. 63. March 2010. Unknown hackers post the...users were adequately trained in information security techniques.35 There has been a recent trend in IT security to train end users in some basic...cybercrime cost victims $388 billion in time and money last year alone, hitting 431 million people in 24 countries.136 That number is rising

  18. Applying a Space-Based Security Recovery Scheme for Critical Homeland Security Cyberinfrastructure Utilizing the NASA Tracking and Data Relay (TDRS) Based Space Network

    NASA Technical Reports Server (NTRS)

    Shaw, Harry C.; McLaughlin, Brian; Stocklin, Frank; Fortin, Andre; Israel, David; Dissanayake, Asoka; Gilliand, Denise; LaFontaine, Richard; Broomandan, Richard; Hyunh, Nancy

    2015-01-01

    Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels that have not been compromised would be an important countermeasure to compromise of our critical network infrastructure. This paper describes a concept of operations by which the NASA Tracking and Data Relay (TDRS) constellation of spacecraft in conjunction with the White Sands Complex (WSC) Ground Station host a security recovery system for re-establishing secure network communications in the event of a national or regional cyberattack. Users would perform security and network restoral functions via a Broadcast Satellite Service (BSS) from the TDRS constellation. The BSS enrollment only requires that each network location have a receive antenna and satellite receiver. This would be no more complex than setting up a DIRECTTV-like receiver at each network location with separate network connectivity. A GEO BSS would allow a mass re-enrollment of network nodes (up to nationwide) simultaneously depending upon downlink characteristics. This paper details the spectrum requirements, link budget, notional assets and communications requirements for the scheme. It describes the architecture of such a system and the manner in which it leverages off of the existing secure infrastructure which is already in place and managed by the NASAGSFC Space Network Project.

  19. Homeland security and the non-federal healthcare sector: evaluation of your incident command system (ICS).

    PubMed

    Blair, James D

    2005-01-01

    Healthcare and other private sector industries have lagged behind federal agencies in fulfilling their security readiness mission, according to the author. A comprehensive and timely resource is now available, he reports, to help healthcare officials in improving emergency response and preparedness.

  20. 76 FR 60387 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-29

    ... suspicious activities, and individuals charged with the analysis and appropriate handling of suspicious..., as amended; the Intelligence Reform and Terrorism Prevention Act of 2004, as amended; the National... know the information to carry out national security, law enforcement, immigration, intelligence, or...

  1. 7 CFR 2.95 - Director, Office of Homeland Security and Emergency Coordination.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... to support the development and expansion of advanced training programs in agricultural biosecurity... development of mitigation strategies. (iii) Provide guidance to USDA agencies and the Food and Agricultural Sector in matters of security through use of assessments and development of mitigation strategies....

  2. 7 CFR 2.95 - Director, Office of Homeland Security and Emergency Coordination.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... to support the development and expansion of advanced training programs in agricultural biosecurity... development of mitigation strategies. (iii) Provide guidance to USDA agencies and the Food and Agricultural Sector in matters of security through use of assessments and development of mitigation strategies....

  3. National Summit on Campus Public Safety. Strategies for Colleges and Universities in a Homeland Security Environment

    ERIC Educational Resources Information Center

    US Department of Justice, 2005

    2005-01-01

    The aftermath of September 11, 2001 prompted the reexamination of the nation's defenses and vulnerabilities in light of new realities. Every sector of society, particularly those who protect the well being of communities, required change. Safety and security operations on the nation's college and university campuses are no exception. The nation's…

  4. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-27

    ...-security, knowledge management and how best to leverage related technologies funded by other Federal agencies and by the private sector. It also advises the Under Secretary on policies, management processes.... ACTION: Committee management; notice of Federal Advisory Committee meeting. SUMMARY: On September...

  5. 78 FR 25282 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-008...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-30

    ..., 6511 America Boulevard, Hyattsville, MD 20782; FEMA VA-NPSC, 430 Market Street, Winchester, VA 22603... economic or property interests, harm to an individual, or harm to the security or integrity of this system... database are temporary records that are destroyed when no longer needed for analysis purposes, per NARA...

  6. 76 FR 9034 - Privacy Act of 1974; Department of Homeland Security United States Citizenship and Immigration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-16

    ... compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the... implemented by the USCIS Verification Division and operated in collaboration with the Social Security... his identity, and subsequently providing work authorization information based in part on information...

  7. Compliance Issues and Homeland Security with New Federal Regulations for Higher Education Institutions

    ERIC Educational Resources Information Center

    Valcik, Nicolas A.

    2010-01-01

    Research advancements into different fields of study have increased the risks for accidents, criminal acts, or a potential breach of national security, and the types of hazardous materials (HAZMAT) stored and used at universities and colleges are under new scrutiny. Before, a chemistry laboratory might only have basic substances such as sulfur,…

  8. Homeland Security Department: FY2011 President’s Request for Appropriations

    DTIC Science & Technology

    2010-04-15

    program, the National Biosurveillance Integration System (NBIS), and the department’s occupational health and safety programs.87 Dr. Alexander G. Garza... Biosurveillance Integration Center; and the Rapidly Deployable Chemical Detection System.88 Issues for Congress BioWatch: Effectiveness and Deployment...20 23 Systems Acquisition 20 61 Radiation Portal Monitoring Program - 8 Securing the Cities 20 - Human Portable Radiation Detection

  9. 7 CFR 2.95 - Director, Office of Homeland Security and Emergency Coordination.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... to support the development and expansion of advanced training programs in agricultural biosecurity... development of mitigation strategies. (iii) Provide guidance to USDA agencies and the Food and Agricultural Sector in matters of security through use of assessments and development of mitigation strategies....

  10. Going Beyond the Water’s Edge: Improving Congressional Oversight for the Department of Homeland Security

    DTIC Science & Technology

    2013-03-01

    SAFE Safety and Accountability for Every SFI Secure Freight Initiative SSCI Senate Select Committee on Intelligence TSA Transportation...Oversight of foreign intelligence falls predominately within the realm of the Senate Select Committee on Intelligence ( SSCI ) and the House Permanent...Congress, Congressional Research Service, Congressional Oversight of Intelligence, 1–2. 41 the foreign realm, the SSCI and HPSCI share oversight

  11. Compliance Issues and Homeland Security with New Federal Regulations for Higher Education Institutions

    ERIC Educational Resources Information Center

    Valcik, Nicolas A.

    2010-01-01

    Research advancements into different fields of study have increased the risks for accidents, criminal acts, or a potential breach of national security, and the types of hazardous materials (HAZMAT) stored and used at universities and colleges are under new scrutiny. Before, a chemistry laboratory might only have basic substances such as sulfur,…

  12. Homeland Security and Combating Terrorism Research and Development: Funding, Organization, and Oversight

    DTIC Science & Technology

    2004-03-15

    Energy’s (DOE) counterterrorism R&D included work on security, materials, detection of toxic agents, genomic sequencing, DNA-based diagnostics, and...Threat & vulnerability assessment (TVTA) (Critical Infrastructure Protection) ( Cybersecurity ) 36 - 100 102 [6] [18]) Conventional missionslSupport to DHS

  13. Homeland Security and Counterterrorism Research and Development: Funding, Organization, and Oversight

    DTIC Science & Technology

    2003-04-19

    DARPA). The Department of Energy’s (DOE) counterterrorism R&D includes work on security, materials, detection of toxic agents, genomic sequencing...information analysis (including information analysis tools and research in cybersecurity ). It is unclear how DHS will set priorities for its support

  14. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    NASA Astrophysics Data System (ADS)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.

  15. 2010 Homeland Security Symposium and Exhibition Held in Arlington, Virginia on September 28-29, 2010

    DTIC Science & Technology

    2010-09-29

    Animal Disease A dynamic disaster environment Got Security? More Public/Private Up-Front Interaction “Recommendation: That the President direct the...movement of materials We provide hope and help around the world. Earthquake in China © Matthew Marek , Red Cross © Matthew Marek , Red Cross © Matthew... Marek , Red Cross Phases of a Disaster • Rescue • Response • Recovery • Rebuilding Phases of a Disaster • Rescue • Response • Recovery • Rebuilding The

  16. Anthrax Vaccine as a Component of the Strategic National Stockpile: A Dilemma for Homeland Security

    DTIC Science & Technology

    2009-12-01

    Gephardt, 2001). Even state involvement resulted in the Connecticut Attorney General, Richard Blumenthal, investigating the program. The state’s top...Convention and President Richard Nixon’s 1969 decree to renounce first use and limit research to defensive measures (Biological and Toxin Weapons...period culminated with a presidential directive in 1969 by Richard Nixon to stem BW escalation. The president’s National Security Decision Memorandum

  17. In Support of the Common Defense: A Homeland Defense and Security Journal. Volume 2

    DTIC Science & Technology

    2013-06-01

    ones that can be undertaken lightly. Much like war-fighting they demand thoughtful planning processes , informed leadership, force structure, supplies...commitments to domestic civil security missions in the development of the Chemical, Biological , Radiological and Nuclear and High Explosive Yield (CBRNE...have taken form across both interagency and intergovernmental partnerships. DoD’s commitment to its support role in the interagency process has been

  18. 1918 Flu Pandemic: Implications for Homeland Security in the New Millennium

    DTIC Science & Technology

    2007-05-09

    of the early findings revealed that essentially all flu viruses in circulation today represent genetic offspring of the1918 virus , but it seems clear...each year and that allows it to cross species is called reassortment.49 Reassortment occurs when two different viruses , say a human virus and a bird...the nation’s health and security. This paper reviews the 1918 pandemic, explores concerns about the avian influenza virus H5N1, and considers

  19. Homeland Security and Counterterrorism Research and Development: Funding, Organization, and Oversight

    DTIC Science & Technology

    2003-07-21

    The Department of Energy’s (DOE) counterterrorism R&D includes work on security, materials, detection of toxic agents, genomic sequencing, DNA-based...private and government computers. The House Science Committee held a hearing on May 14, 2003 on cybersecurity R&D. DHS estimated FY2003 R&D funding...monitor the release of pathogens and agents), and information analysis (including tools and cybersecurity research). It is unclear how DHS will set

  20. Assessing Grant Allocation Methods for Federal Homeland Security Urban Area Assistance Funding

    DTIC Science & Technology

    2015-12-01

    51 Catherine Dale, Nina M. Serafino, and Pat Towell , A Unified National Security Budget? Issues for Congress (CRS Report No. R42997...Washington, DC: Congressional Research Service, 2013), 1, https:// www.fas.org/sgp/crs/natsec/R42997.pdf. 52 Dale, Serafino, and Towell , A Unified...59 Timothy Brain, Police Funding (England & Wales) 2011–2012 (Police Briefing Paper , No. 1) (Cardiff, Wales: Universities’ Police Science

  1. Defining the Role and Responsibility of the Fire Service Within Homeland Security

    DTIC Science & Technology

    2010-03-01

    also be made to improve our resilience to a wide range of emergencies, including the possibility of terrorist attack and the results of climate change ...and civil society institutions. Some of these issues have high global public profiles, such as climate change , cyber security, preparing for pandemics...This affords the manager the capacity to plan for alternative operating environments and to react to change is enhanced (Fahey & Randall, 1998

  2. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... Security Administration--DHS/TSA-021 TSA Pre TM Application Program System of Records AGENCY: Department of... Administration--DHS/TSA-021 TSA Pre TM Application Program System of Records.'' This system of records allows the... titled, ``DHS/TSA-021 TSA Pre TM Application Program System of Records.'' TSA is establishing this...

  3. Homeland Security, Medical, Pharmaceutical and Non-destructive Testing Applications of Terahertz Radiation

    NASA Astrophysics Data System (ADS)

    Kemp, Michael

    2005-03-01

    The terahertz region of the electromagnetic spectrum (300GHz-10THz) spans the region between radio and light. Recent advances in terahertz source, detector and systems technology are enabling new applications across a number of fields, based on both terahertz imaging and spectroscopy. This paper reviews our recent work on the development of practical systems and applications in security screening for the detection of explosives and non-metallic weapons; in medical imaging for cancer detection; as well as applications in non-destructive testing and the pharmaceutical industry.

  4. Extra-light gamma-ray imager for safeguards and homeland security

    SciTech Connect

    Ivanov, Oleg P.; Semin, Ilya A.; Potapov, Victor N.; Stepanov, Vyacheslav E.

    2015-07-01

    Gamma-ray imaging is the most important way to identify unknown gamma-ray emitting objects in decommissioning, security, overcoming accidents. Over the past two decades a system for producing of gamma images in these conditions became more or less portable devices. But in recent years these systems have become the hand-held devices. This is very important, especially in emergency situations, and measurements for safety reasons. We describe the first integrated hand-held instrument for emergency and security applications. The device is based on the coded aperture image formation, position sensitive gamma-ray (X-ray) detector Medipix2 (detectors produces by X-ray Imaging Europe) and tablet computer. The development was aimed at creating a very low weight system with high angular resolution. We present some sample gamma-ray images by camera. Main estimated parameters of the system are the following. The field of view video channel ∼ 490 deg. The field of view gamma channel ∼ 300 deg. The sensitivity of the system with a hexagonal mask for the source of Cs-137 (Eg = 662 keV), is in units of dose D ∼ 100 mR. This option is less then order of magnitude worse than for the heavy, non-hand-held systems (e.g., gamma-camera Cartogam, by Canberra.) The angular resolution of the gamma channel for the sources of Cs-137 (Eg = 662 keV) is about 1.20 deg. (authors)

  5. Proposed New Accelerator Design for Homeland Security X-Ray Applications

    SciTech Connect

    Clayton, James; Shedlock, Daniel; Langeveld, Willem G.J.; Bharadwaj, Vinod; Nosochkov, Yuri

    2015-08-07

    In the security and inspection market, there is a push towards highly mobile, reduced-dose active interrogation scanning and imaging systems to allow operation in urban environments. To achieve these goals, the accelerator system design needs to be smaller than existing systems. A smaller radiation exclusion zone may be accomplished through better beam collimation and an integrated, x-ray-source/detector-array assembly to allow feedback and control of an intensity-modulated x-ray source. A shaped low-Z target in the x-ray source can be used to generate a more forward peaked x-ray beam. Electron-beam steering can then be applied to direct the forward-peaked x rays toward areas in the cargo with high attenuation. This paper presents an exploratory study to identify components and upgrades that would be required to meet the desired specifications, as well as the best technical approach to design and build a prototype.

  6. Proposed new accelerator design for homeland security x-ray applications

    SciTech Connect

    Clayton, James; Shedlock, Daniel; Langeveld, Willem G.J.; Bharadwaj, Vinod; Nosochkov, Yuri

    2015-01-01

    Two goals for security scanning of cargo and freight are the ability to determine the type of material that is being imaged, and to do so at low radiation dose. One commonly used technique to determine the effective Z of the cargo is dual-energy imaging, i.e. imaging with different x-ray energy spectra. Another technique uses the fact that the transmitted x-ray spectrum itself also depends on the effective Z. Spectroscopy is difficult because the energy of individual x rays needs to be measured in a very high count-rate environment. Typical accelerators for security applications offer large but short bursts of x-rays, suitable for current-mode integrated imaging. In order to perform x-ray spectroscopy, a new accelerator design is desired that has the following features: 1) increased duty factor in order to spread out the arrival of x-rays at the detector array over time; 2) x-ray intensity modulation from one delivered pulse to the next by adjusting the accelerator electron beam instantaneous current so as to deliver adequate signal without saturating the spectroscopic detector; and 3) the capability to direct the (forward peaked) x-ray intensity towards high-attenuation areas in the cargo (“fan-beam-steering”). Current sources are capable of 0.1% duty factor, although usually they are operated at significantly lower duty factors (~0.04%), but duty factors in the range 0.4-1.0% are desired. The higher duty factor can be accomplished, e.g., by moving from 300 pulses per second (pps) to 1000 pps and/or increasing the pulse duration from a typical 4 μs to 10 μs. This paper describes initial R&D to examine cost effective modifications that could be performed on a typical accelerator for these purposes, as well as R&D for fan-beam steering.

  7. 76 FR 67755 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-02

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security U.S. Customs and... published routine uses or statutory basis for disclosure under 5 U.S.C. 552a(b). For the accounting of these... outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: A. To the Department of Justice...

  8. I-WASTE: EPA’s Suite of Homeland Security Decision Support Tools for the Waste and Disaster Debris Management and Disposal

    EPA Science Inventory

    In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major di...

  9. I-WASTE: EPA’s Suite of Homeland Security Decision Support Tools for the Waste and Disaster Debris Management and Disposal

    EPA Science Inventory

    In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major di...

  10. To amend the Homeland Security Act of 2002 to permit use of certain grant funds for training conducted in conjunction with a national laboratory or research facility.

    THOMAS, 112th Congress

    Rep. Lungren, Daniel E. [R-CA-3

    2012-05-18

    06/29/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  11. To amend the Homeland Security Act of 2002 to permit use of certain grant funds for training conducted in conjunction with a national laboratory or research facility.

    THOMAS, 112th Congress

    Rep. Lungren, Daniel E. [R-CA-3

    2012-05-18

    Senate - 06/29/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  12. To amend the Homeland Security Act of 2002 to permit use of certain grant funds for training conducted in conjunction with a national laboratory or research facility.

    THOMAS, 112th Congress

    Rep. Lungren, Daniel E. [R-CA-3

    2012-05-18

    06/29/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  13. Emergency Management: Status of School Districts' Planning and Preparedness. Testimony before the Committee on Homeland Security, House of Representatives. GAO-07-821T

    ERIC Educational Resources Information Center

    Ashby, Cornelia M.

    2007-01-01

    In this testimony before the House Committee on Homeland Security, the Director of the U.S. Government Accountability Office (GAO) discusses the status of school districts' planning and preparedness for emergencies. According to the testimony, federal and state governments support emergency management in school districts with a range of resources…

  14. Transforming the U.S. Immigration System After 9/11: The Impact of Organizational Change and Collaboration in the Context of Homeland Security

    DTIC Science & Technology

    2008-12-01

    FUNCTIONAL LINES..........23 C. APPLYING ORGANIZATIONAL CHANGE THEORY TO MORE EFFECTIVELY ORGANIZE HOMELAND SECURITY STRUCTURES...USCIS Personnel Who were Hired Pre-2003 and Post- 2003: Comparing Their Perceptions on the Role of Leadership in Making Adjudicative Decisions...plays an important role in formulating how I make decisions and use my discretion in making adjudicative decisions on immigration petitions and

  15. Proposed new accelerator design for homeland security x-ray applications

    DOE PAGES

    Clayton, James; Shedlock, Daniel; Langeveld, Willem G.J.; ...

    2015-01-01

    Two goals for security scanning of cargo and freight are the ability to determine the type of material that is being imaged, and to do so at low radiation dose. One commonly used technique to determine the effective Z of the cargo is dual-energy imaging, i.e. imaging with different x-ray energy spectra. Another technique uses the fact that the transmitted x-ray spectrum itself also depends on the effective Z. Spectroscopy is difficult because the energy of individual x rays needs to be measured in a very high count-rate environment. Typical accelerators for security applications offer large but short bursts ofmore » x-rays, suitable for current-mode integrated imaging. In order to perform x-ray spectroscopy, a new accelerator design is desired that has the following features: 1) increased duty factor in order to spread out the arrival of x-rays at the detector array over time; 2) x-ray intensity modulation from one delivered pulse to the next by adjusting the accelerator electron beam instantaneous current so as to deliver adequate signal without saturating the spectroscopic detector; and 3) the capability to direct the (forward peaked) x-ray intensity towards high-attenuation areas in the cargo (“fan-beam-steering”). Current sources are capable of 0.1% duty factor, although usually they are operated at significantly lower duty factors (~0.04%), but duty factors in the range 0.4-1.0% are desired. The higher duty factor can be accomplished, e.g., by moving from 300 pulses per second (pps) to 1000 pps and/or increasing the pulse duration from a typical 4 μs to 10 μs. This paper describes initial R&D to examine cost effective modifications that could be performed on a typical accelerator for these purposes, as well as R&D for fan-beam steering.« less

  16. Compact, rugged, and intuitive thermal imaging cameras for homeland security and law enforcement applications

    NASA Astrophysics Data System (ADS)

    Hanson, Charles M.

    2005-05-01

    Low cost, small size, low power uncooled thermal imaging sensors have completely changed the way the world views commercial law enforcement and military applications. Key applications include security, medical, automotive, power generation monitoring, manufacturing and process control, aerospace application, defense, environmental and resource monitoring, maintenance monitoring and night vision. Commercial applications also include law enforcement and military special operations. Each application drives a unique set of requirements that include similar fundamental infrared technologies. Recently, in the uncooled infrared camera and microbolometer detector areas, major strides have been made in the design and manufacture of personal military and law enforcement sensors. L-3 Communications Infrared Products (L-3 IP) is producing a family of new products based on the amorphous silicon microbolometer with low cost, low power, high volume, wafer-level vacuum packaged silicon focal plane array technologies. These bolometer systems contain no choppers or thermoelectric coolers, require no manual calibration, and use readily available commercial off-the-shelf components. One such successful product is the Thermal-Eye X100xp. Extensive market needs analysis for these small hand held sensors has been validated by the quick acceptability into the Law Enforcement and Military Segments. As well as this product has already been received, L-3 IP has developed a strategic roadmap to improve and enhance the features and function of this product to include upgrades such as the new 30-Hz, 30-μm pitch detector. This paper describes advances in bolometric focal plane arrays, optical and circuit card technologies while providing a glimpse into the future of micro hand held sensor growth. Also, technical barriers are addressed in light of constraints, lessons learned and boundary conditions. One conclusion is that the Thermal Eye Silicon Bolometer technology simultaneously drives weight

  17. 2008 Homeland Security S and T Stakeholders Conference West volume 2 Monday

    DTIC Science & Technology

    2008-01-16

    Applied Physics Laboratory Johns Hopkins University (confirmed) S&T Track 3 Breakout 10 IED 101 LAPD Bomb Squad S&T Track 4 Breakout 11 Katrina...from surfaces; - First, need to know physical and chemical properties of the threat of interest … particle size, stickiness, binding forces, vapor...per collection and pressure to be applied, etc. . -Enviromental effects; dry vs. wet surface (vs. type of sample swipe), clean vs. dirty surfaces

  18. The impact of geographic information systems on emergency management decision making at the U.S. Department of Homeland Security

    NASA Astrophysics Data System (ADS)

    King, Steven Gray

    Geographic information systems (GIS) reveal relationships and patterns from large quantities of diverse data in the form of maps and reports. The United States spends billions of dollars to use GIS to improve decisions made during responses to natural disasters and terrorist attacks, but precisely how GIS improves or impairs decision making is not known. This research examined how GIS affect decision making during natural disasters, and how GIS can be more effectively used to improve decision making for emergency management. Using a qualitative case study methodology, this research examined decision making at the U.S. Department of Homeland Security (DHS) during a large full-scale disaster exercise. This study indicates that GIS provided decision makers at DHS with an outstanding context for information that would otherwise be challenging to understand, especially through the integration of multiple data sources and dynamic three-dimensional interactive maps. Decision making was hampered by outdated information, a reliance on predictive models based on hypothetical data rather than actual event data, and a lack of understanding of the capabilities of GIS beyond cartography. Geospatial analysts, emergency managers, and other decision makers who use GIS should take specific steps to improve decision making based on GIS for disaster response and emergency management.

  19. Homeland Security Presidential Directives

    EPA Pesticide Factsheets

    Three of these directives directly affect EPA's role in the national emergency response system: HSPD-5 Management of Domestic Incidents; HSPD-7 Critical Infrastructure Identification, Prioritization, and Protection; and HSPD-8 National Preparedness.

  20. Sampling and mass spectrometry approaches for the detection of drugs and foreign contaminants in breath for homeland security applications

    SciTech Connect

    Martin, Audrey Noreen

    2009-01-01

    Homeland security relies heavily on analytical chemistry to identify suspicious materials and persons. Traditionally this role has focused on attribution, determining the type and origin of an explosive, for example. But as technology advances, analytical chemistry can and will play an important role in the prevention and preemption of terrorist attacks. More sensitive and selective detection techniques can allow suspicious materials and persons to be identified even before a final destructive product is made. The work presented herein focuses on the use of commercial and novel detection techniques for application to the prevention of terrorist activities. Although drugs are not commonly thought of when discussing terrorism, narcoterrorism has become a significant threat in the 21st century. The role of the drug trade in the funding of terrorist groups is prevalent; thus, reducing the trafficking of illegal drugs can play a role in the prevention of terrorism by cutting off much needed funding. To do so, sensitive, specific, and robust analytical equipment is needed to quickly identify a suspected drug sample no matter what matrix it is in. Single Particle Aerosol Mass Spectrometry (SPAMS) is a novel technique that has previously been applied to biological and chemical detection. The current work applies SPAMS to drug analysis, identifying the active ingredients in single component, multi-component, and multi-tablet drug samples in a relatively non-destructive manner. In order to do so, a sampling apparatus was created to allow particle generation from drug tablets with on-line introduction to the SPAMS instrument. Rules trees were developed to automate the identification of drug samples on a single particle basis. A novel analytical scheme was also developed to identify suspect individuals based on chemical signatures in human breath. Human breath was sampled using an RTube{trademark} and the trace volatile organic compounds (VOCs) were preconcentrated using solid

  1. Development of an Autonomous Lidar Instrument for Use on a UAV Platform in Support of Homeland Security

    NASA Technical Reports Server (NTRS)

    McGill, Matthew; Famiglietti, Joe

    2005-01-01

    Researchers at NASA's Goddard Space Flight Center have developed an autonomous aerosol backscatter lidar instrument for use on the high-altitude ER-2 aircraft (for more information please visit http://cpl.gsfc.nasa.gov). Work is currently underway to transfer this instrument to a UAV platform such as Global Hawk. While the NASA applications are Earth science and satellite validation, there is clearly a Homeland Security application for such an instrument. One novel concept is to have a fleet of UAVs stationed around the country, each UAV having a payload including a lidar instrument. In the event of attack, the appropriate UAV(s) could be launched for purposes of, e.g., plume detection and tracking that are critical for decision support. While the existing lidar instrument is not directly capable of biological species discrimination, it is capable of plume tracking and thus can demonstrate to DHS the capabilities and utility of such instruments. Using NASA funding we will have an instrument ready to fly on Global Hawk by end of 2005. We would like to find partners, either within private industry or within DHS who would be willing to contribute aircraft access and flight hours for a demonstration flight. Longer-term partnerships to develop more advanced and more capable types of lidar instruments are also desirable. In this presentation we will detail the existing ER-2 lidar instrument and show measurement results, show the progress made on adapting to the Global Hawk platform, present concepts for DHS uses of such instruments, and openly pursue partnership opportunities.

  2. Development of an Autonomous Lidar Instrument for Use on a UAV Platform in Support of Homeland Security

    NASA Technical Reports Server (NTRS)

    McGill, Matthew; Famiglietti, Joe

    2005-01-01

    Researchers at NASA's Goddard Space Flight Center have developed an autonomous aerosol backscatter lidar instrument for use on the high-altitude ER-2 aircraft (for more information please visit http://cpl.gsfc.nasa.gov). Work is currently underway to transfer this instrument to a UAV platform such as Global Hawk. While the NASA applications are Earth science and satellite validation, there is clearly a Homeland Security application for such an instrument. One novel concept is to have a fleet of UAVs stationed around the country, each UAV having a payload including a lidar instrument. In the event of attack, the appropriate UAV(s) could be launched for purposes of, e.g., plume detection and tracking that are critical for decision support. While the existing lidar instrument is not directly capable of biological species discrimination, it is capable of plume tracking and thus can demonstrate to DHS the capabilities and utility of such instruments. Using NASA funding we will have an instrument ready to fly on Global Hawk by end of 2005. We would like to find partners, either within private industry or within DHS who would be willing to contribute aircraft access and flight hours for a demonstration flight. Longer-term partnerships to develop more advanced and more capable types of lidar instruments are also desirable. In this presentation we will detail the existing ER-2 lidar instrument and show measurement results, show the progress made on adapting to the Global Hawk platform, present concepts for DHS uses of such instruments, and openly pursue partnership opportunities.

  3. Using resources of public health centers for education and professional societies to incorporate homeland security topics into public teacher continuing education.

    PubMed

    McCarthy, Margaret E

    2003-08-01

    The Department of Education, the Association of Schools of Public Health, and national professional societies dedicated to teaching and dissemination of information for health and education in the public sector can form a clearinghouse on information and manpower on Homeland Security by affiliation with Centers for Public Health Preparedness (CPHP). The state licensed or regional societies can contribute further information and guidelines. In the HPS the Science Teacher Workshop (STW) and Public Education (PEC) Committees can assist a CPHP on radiation issues.

  4. Who’s on First: Unraveling the Complexity of the United States’ Food and Agricultural Regulatory System in the Realm of Homeland Security

    DTIC Science & Technology

    2009-12-01

    We have continued 129 down the same path for more than 100 years. It is time for a paradigm shift to recreate the mold of food and agricultural...UNRAVELING THE COMPLEXITY OF THE UNITED STATES’ FOOD AND AGRICULTURAL REGULATORY SYSTEM IN THE REALM OF HOMELAND SECURITY by Gary Wayne Elliott...December 2009 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Who’s on First: Unraveling the Complexity of the United States’ Food

  5. Using DOD ISR Capabilities in Support of Homeland Security and Defense; Policy Challenges and Considerations for Effective Incident Awareness and Assessment

    DTIC Science & Technology

    2011-03-01

    CONOPS) that gives a brief overview of active duty and National Guard capabilities and processes for responding to homeland security contingencies...fire and the worst oil pollution disaster in history (James, 2010). More than 205 million gallons of raw crude oil are estimated to have gushed into...pertain to the employment of DoD airborne assets for DSCA missions. The DSCA Air Support Handbook provides an overview of the full spectrum of DoD

  6. Theory to Practice: How Developing a K-12 Curriculum in Emergency Preparedness, Life Safety, or Homeland Security Can Lead to Resiliency

    DTIC Science & Technology

    2012-09-01

    230 million people affected by floods, winds, ice storms, earthquakes, drought, tsunami, and volcanic eruptions every year. (CRED, 2008) These are...Wave • Hurricane • Landslides • Mud Flows • Tornado • Tsunami • Volcanic Eruption Additionally, those areas involving human hazards would include...preparedness, homeland security, or disaster risk reduction could be a potential solution to develop a resilient America by starting with our young school aged

  7. Wireless digital-ultrasonic sensors for proximity ID, access control, firearm control, and C3I in homeland security and law enforcement applications

    NASA Astrophysics Data System (ADS)

    Forcier, Bob

    2003-09-01

    This paper describes a new patent-pending digital-ultrasonic sensor network technology, which provides a "security protection sphere" around the authorized user(s) and the infrastructure system or system(s) to achieve C3I in Homeland Security and Law Enforcement Applications. If the system device, such as a firearm, a secure computer, PDA, or vehicle is misplaced, stolen or removed from the security protective sphere, an alarm is activated. A digital-ultrasonic sensor/tag utilizes the system"s physical structure to form a 2 to 20 Meter programmable protection sphere around the device and the authorized user. In addition, the system allows only authorized users to utilize the system, thereby creating personalized weapons, secure vehicle access or secure computer hardware. If an unauthorized individual accesses the system device, the system becomes inoperative and an alarm is activated. As the command and control, the authorized individual is provided a secure wristwatch/PDA. Access control is provided by "touch" and is controlled through the wristwatch/PDA/smartcard with a unique digital-ultrasonic coding and matching protocol that provides a very high level of security for each wireless sensor.

  8. A bill to direct the Comptroller General of the United States to conduct a study on the use of Civil Air Patrol personnel and resources to support homeland security missions, and for other purposes.

    THOMAS, 111th Congress

    Sen. Harkin, Tom [D-IA

    2009-03-25

    03/25/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. A bill to direct the Comptroller General of the United States to conduct a study on the use of Civil Air Patrol personnel and resources to support homeland security missions, and for other purposes.

    THOMAS, 111th Congress

    Sen. Harkin, Tom [D-IA

    2009-03-25

    Senate - 03/25/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. A bill to direct the Comptroller General of the United States to conduct a study on the use of Civil Air Patrol personnel and resources to support homeland security missions, and for other purposes.

    THOMAS, 111th Congress

    Sen. Harkin, Tom [D-IA

    2009-03-25

    03/25/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Homeland Security Interagency Support. (Joint Center for Lessons Learned Quarterly Bulletin. Volume 4, Issue 2, March 2002)

    DTIC Science & Technology

    2002-03-01

    U.S. Capitol, the White House, and nuclear power facilities. In the United States and Europe, Disney amusement parks are likely targets. In Britain, the...appropriate when such attacks will involve small bands of individuals engaged in criminal acts within our homeland instead of stereotyped conventional

  12. 75 FR 5614 - Privacy Act of 1974; Department of Homeland Security/ALL-025 Law Enforcement Authority in Support...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-03

    ... Security often overlap with other security-related activities. Accordingly, data within the categories of... carry out national security, law enforcement, immigration, intelligence, or other functions consistent... marks such as tattoos, scars, etc; Height and weight; Eye and hair color; Biometric data; ] Home address...

  13. 75 FR 79947 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-031...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-21

    ... Initiative System of Records is to create a database of physical security threats and would not include the... meet the ISE-SAR Functional Standard Version 1.5 are not limited to physical security threats. Further...-sharing of security threats between the public and private sector. As partners with law enforcement, we...

  14. An update on the OpenOrbiter I Mission and its paradigm's benefits for the defense, homeland security and intelligence communities

    NASA Astrophysics Data System (ADS)

    Straub, Jeremy

    2017-05-01

    The OpenOrbiter I spacecraft is the culmination of significant work on reducing the cost levels of a CubeSat-class spacecraft. By redesigning the spacecraft from the ground up, down to the component level, to use readily available electronic and physical components, the cost of CubeSat construction has been significantly reduced. This paper provides an overview of the OpenOrbiter I mission, to date. It then focuses on the benefits that can be provided by the lower-cost, low-risk spacecraft. The paper discusses the prospective utility of this mission paradigm for the defense, homeland security and intelligence communities.

  15. The role of the Department of Homeland Security, Science and Technology Directorate in the development of vaccines and diagnostics for Transboundary Animal Diseases.

    PubMed

    Colby, M; Coats, M; Brake, D; Fine, J

    2013-01-01

    The development of countermeasures to support an effective response to Transboundary Animal Diseases (TAD) poses a challenge on a global scale and necessitates the coordinated involvement of scientists from government, industry and academia, as well as regulatory entities. The Agricultural Defense Branch under the Chemical and Biological Defense Division (CBD) of the Department of Homeland Security (DHS), Science and Technology Directorate (S&T) supports this important mission within the United States. This article provides an overview of the Agricultural Defense Branch's vaccine and diagnostic TAD project.

  16. Directing the Secretary of Homeland Security to transmit to the House of Representatives all information in the possession of the Department of Homeland Security relating to the immigration status of any detainees and foreign persons suspected of terrorism.

    THOMAS, 111th Congress

    Rep. Rogers, Mike J. [R-MI-8

    2009-06-19

    07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. Directing the Secretary of Homeland Security to transmit to the House of Representatives all information in the possession of the Department of Homeland Security relating to the immigration status of any detainees and foreign persons suspected of terrorism.

    THOMAS, 111th Congress

    Rep. Rogers, Mike J. [R-MI-8

    2009-06-19

    House - 07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. Directing the Secretary of Homeland Security to transmit to the House of Representatives all information in the possession of the Department of Homeland Security relating to the immigration status of any detainees and foreign persons suspected of terrorism.

    THOMAS, 111th Congress

    Rep. Rogers, Mike J. [R-MI-8

    2009-06-19

    07/23/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. 78 FR 15889 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-13

    ... Partnership Against Terrorism (C-TPAT) System, System of Records AGENCY: Privacy Office, DHS. ACTION: Notice... Security/U.S. Customs and Border Protection, DHS/CBP-018--Customs--Trade Partnership Against Terrorism (C... United States from acts of terrorism by improving security while facilitating the flow of compliant...

  20. U.S. national security through global technical engagement presentation to composite group A : homeland and international operations.

    SciTech Connect

    Abeyta, Henry J.

    2010-05-01

    This talk will discuss Sandia's Global Security Program focused on reducing proliferation and terrorism threats to U.S. national security through global technical engagement. Elements include nuclear and radiological risks, biological and chemical risks, and multi-threat risk reduction. Also, recent work addressing the need to better integrate nonproliferation, arms control, counterterrorism, and nuclear deterrent objectives will be discussed.

  1. 76 FR 49497 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-001 Criminal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-10

    ... updates to this system of records do not impact the nature of the exemptions claimed. This updated system..., including, but not limited to, name, date of birth, Social Security number, telephone number, home address... destruction of U.S. Savings Bonds or checks; photographic reproductions of obligations and other securities of...

  2. 75 FR 81371 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-28

    ... Intelligence and Analysis (I&A) and/or the federal intelligence and law enforcement community members that are... proceedings thereunder; national security and intelligence activities; and protection of the President of the...

  3. 76 FR 60385 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-29

    ... Background Functions) is used to assist USCIS personnel in verifying the data submitted by the Applicant or..., inquiries, and proceedings thereunder; and national security and intelligence activities. The DHS/USCIS-016...

  4. Development of a Decision Support Tool to Inform Resource Allocation for Critical Infrastructure Protection in Homeland Security

    DTIC Science & Technology

    2008-06-01

    would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.” – The... health , emergency services, defense industrial base, banking and finance, chemicals and hazardous materials, and postal and shipping. A network is...links might represent water pipes or aqueducts . Figure 1 An example network 4 Threat, t, is the probability that an attack will be attempted

  5. Cyberspace as a Theater of Conflict: Federal Law, National Strategy and the Departments of Defense and Homeland Security

    DTIC Science & Technology

    2007-06-01

    Control ...................................................................... 91 Conference Attendance ...Eisenhower. His experiences during World War II gave him great insight into the issues of bringing together the capabilities of ground, air and naval...of State (DoS). (No page number) 9 Chapter 6 codifies the concept of COCOMs in great detail, spelling out that the commands exist to perform

  6. The Balloon Effect and Mexican Homeland Security: What it Means to be the Weakest Link in the Americas’ Security Chain

    DTIC Science & Technology

    2011-12-01

    as a threat to Mexican society (Presidencia de la Republica Mexicana, 2007b), but also in the United States, where Department of Homeland Secretary...fight among them as they compete for places to perform their activities (Presidencia de la Republica Mexicana, 2011). These fights are causing...Calderón’s administration developed high-impact operations against transnational, organized crime (Presidencia de 6 la Republica Mexicana, 2007

  7. 75 FR 5609 - Privacy Act of 1974; Department of Homeland Security/ALL-024 Facility and Perimeter Access...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-03

    ... management systems often overlap with other security-related activities. Accordingly, data within each of the... engaged in collecting law enforcement intelligence, whether civil or criminal, or charged with... collection of law enforcement intelligence, but only when the disclosure is appropriate to the proper...

  8. 76 FR 70735 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-15

    ... compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the... Date of Birth Place of Birth Country of Citizenship Gender Social Security Number, if applicable Alien... in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital media...

  9. 76 FR 81787 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-030 Use of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    .../ALL-030 Use of the Terrorist Screening Database System of Records AGENCY: Privacy Office, DHS. ACTION... Security/ALL-030 Use of the Terrorist Screening Database System of Records'' from certain provisions of the...-030 Use of the Terrorist Screening Database System of Records'' from one or more provisions of...

  10. 76 FR 60070 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    ... news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel..., address, organization, e-mail, phone number, relation, paid/unpaid). Signature (electronic or scanned..., debts, encumbrances, etc.). Social Security Number (SSN), if applicable. Supporting documentation...

  11. Telecommunications Policy Research Conference. Computer and Communications Security Section. Papers.

    ERIC Educational Resources Information Center

    Telecommunications Policy Research Conference, Inc., Washington, DC.

    In his paper, "European Needs and Attitudes towards Information Security," Richard I. Polis notes that the needs for security in computer systems, telecommunications, and media are rather uniform throughout Western Europe, and are seen as being significantly different from the needs in the United States. Recognition of these needs is,…

  12. STIDP: A US Department of Homeland Security program for countering explosives attacks at large public events and mass transit facilities

    SciTech Connect

    Knudson, Christa K.; Kemp, Michael C.; Lombardo, Nicholas J.

    2009-03-07

    The Department of Homeland Security’s Standoff Technology Integration and Demonstration Program is designed to accelerate the development and integration of technologies, concepts of operations, and training to prevent explosives attacks at large public events and mass transit facilities. The program will address threats posed by suicide bombers, vehicle-borne improvised explosive devices, and leave-behind bombs. The program is focused on developing and testing explosives countermeasure architectures using commercial off-the-shelf and near-commercial standoff and remotely operated detection technologies in prototypic operational environments. An important part of the program is the integration of multiple technologies and systems to protect against a wider range of threats, improve countermeasure performance, increase the distance from the venue at which screening is conducted, and reduce staffing requirements. The program will routinely conduct tests in public venues involving successively more advanced technology, higher levels of system integration, and more complex scenarios. This paper describes the initial field test of an integrated countermeasure system that included infrared, millimeter-wave, and video analytics technologies for detecting person-borne improvised explosive devices at a public arena. The test results are being used to develop a concept for the next generation of integrated countermeasures, to refine technical and operational requirements for architectures and technologies, and engage industry and academia in solution development.

  13. Proceedings of the international conference on security documents for the 21st century

    SciTech Connect

    Burnett, M.N.; Sexton, N.A.; Goodman, C.A.; Johnson, C.K.; McNaull, R.M.; Graminski, E.L.; Seidel, M.J.

    1987-01-01

    The papers in this volume give conservative projections on future requirements from the users of security documents. Printers of security documents give requirements for advanced technologies. Design requirements for ink technology, counterfeit detection, and optical features in security documents are given. Costs of the new technologies are discussed. One thing that can be seen from this volume, according to the moderator of the conference, is the widespread desire to use some sort of optical device in future security documents. Thirty analytics were prepared for the sections of this report. (JDH)

  14. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    DTIC Science & Technology

    2011-12-01

    December 2011 Thesis Advisor: Sam Clovis , Jr. Second Reader: Lauren Fernandez THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form...Approved by: Sam Clovis , Jr. Thesis Advisor Lauren Fernandez Second Reader Daniel Moran Chair, Department of National Security Affairs...continued education, and former Fire Commissioner Horace “Bud” Felton; a Navy man who encouraged me to apply to the program. Sam Clovis and Lauren

  15. Human health risk assessment database, "the NHSRC toxicity value database": supporting the risk assessment process at US EPA's National Homeland Security Research Center.

    PubMed

    Moudgal, Chandrika J; Garrahan, Kevin; Brady-Roberts, Eletha; Gavrelis, Naida; Arbogast, Michelle; Dun, Sarah

    2008-11-15

    The toxicity value database of the United States Environmental Protection Agency's (EPA) National Homeland Security Research Center has been in development since 2004. The toxicity value database includes a compilation of agent property, toxicity, dose-response, and health effects data for 96 agents: 84 chemical and radiological agents and 12 biotoxins. The database is populated with multiple toxicity benchmark values and agent property information from secondary sources, with web links to the secondary sources, where available. A selected set of primary literature citations and associated dose-response data are also included. The toxicity value database offers a powerful means to quickly and efficiently gather pertinent toxicity and dose-response data for a number of agents that are of concern to the nation's security. This database, in conjunction with other tools, will play an important role in understanding human health risks, and will provide a means for risk assessors and managers to make quick and informed decisions on the potential health risks and determine appropriate responses (e.g., cleanup) to agent release. A final, stand alone MS ACESSS working version of the toxicity value database was completed in November, 2007.

  16. Human health risk assessment database, 'the NHSRC toxicity value database': Supporting the risk assessment process at US EPA's National Homeland Security Research Center

    SciTech Connect

    Moudgal, Chandrika J.

    2008-11-15

    The toxicity value database of the United States Environmental Protection Agency's (EPA) National Homeland Security Research Center has been in development since 2004. The toxicity value database includes a compilation of agent property, toxicity, dose-response, and health effects data for 96 agents: 84 chemical and radiological agents and 12 biotoxins. The database is populated with multiple toxicity benchmark values and agent property information from secondary sources, with web links to the secondary sources, where available. A selected set of primary literature citations and associated dose-response data are also included. The toxicity value database offers a powerful means to quickly and efficiently gather pertinent toxicity and dose-response data for a number of agents that are of concern to the nation's security. This database, in conjunction with other tools, will play an important role in understanding human health risks, and will provide a means for risk assessors and managers to make quick and informed decisions on the potential health risks and determine appropriate responses (e.g., cleanup) to agent release. A final, stand alone MS ACESSS working version of the toxicity value database was completed in November, 2007.

  17. 5 CFR 9701.518 - Duty to bargain, confer, and consult.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.518 Duty to bargain, confer... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Duty to bargain, confer, and consult. 9701.518 Section 9701.518 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  18. To direct the Comptroller General of the United States to conduct a study on the use of Civil Air Patrol personnel and resources to support homeland security missions, and for other purposes.

    THOMAS, 111th Congress

    Rep. Dent, Charles W. [R-PA-15

    2009-02-25

    05/13/2009 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  19. To direct the Comptroller General of the United States to conduct a study on the use of Civil Air Patrol personnel and resources to support homeland security missions, and for other purposes.

    THOMAS, 111th Congress

    Rep. Dent, Charles W. [R-PA-15

    2009-02-25

    Senate - 05/13/2009 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  20. To authorize the Secretary of Homeland Security to make grants to encourage community safety by incorporating disaster mitigation and emergency preparedness into comprehensive land use planning and urban development, and for other purposes.

    THOMAS, 113th Congress

    Rep. Blumenauer, Earl [D-OR-3

    2017-09-18

    09/18/2017 Referred to the Committee on Homeland Security, and in addition to the Committee on Transportation and Infrastructure, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the... (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. To direct the Comptroller General of the United States to conduct a study on the use of Civil Air Patrol personnel and resources to support homeland security missions, and for other purposes.

    THOMAS, 111th Congress

    Rep. Dent, Charles W. [R-PA-15

    2009-02-25

    05/13/2009 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  2. The Level of Europium-154 Contaminating Samarium-153-EDTMP Activates the Radiation Alarm System at the US Homeland Security Checkpoints.

    PubMed

    Najeeb Al Hallak, Mohammed; McCurdy, Matt; Zouain, Nicolas; Hayes, Justin

    2009-08-28

    (153)Sm-EDTMP is a radiopharmaceutical composed of EDTMP (ethylenediamine-tetramethylenephosphonate) and Samarium-153 [1]. (153)Sm-EDTMP has an affinity for skeletal tissue and concentrates in areas with increased bone turnover; thus, it is successfully used in relieving pain related to diffuse bone metastases [1]. The manufacturing process of (153)Sm-EDTMP leads to contamination with (154)Eu (Europium-154) [2]. A previous study only alluded to the retention of (154)Eu in the bones after receiving treatment with (153)Sm-EDTMP [2]. Activation of the alarm at security checkpoints after (153)Sm-EDTMP therapy has not been previously reported. Two out of 15 patients who received (153)Sm-EDTMP at Roger Maris Cancer Center (Fargo, N. Dak., USA) activated the radiation activity sensors while passing through checkpoints; one at a US airport and the other while crossing the American-Canadian border. We assume that the (154)Eu which remained in the patients' bones activated the sensors. METHODS: In order to investigate this hypothesis, we obtained the consent from 3 of our 15 patients who received (153)Sm-EDTMP within the previous 4 months to 2 years, including the patient who had activated the radiation alarm at the airport. The patients were scanned with a handheld detector and a gamma camera for energies from 511 keV to 1.3 MeV. RESULTS: All three patients exhibited identical spectral images, and further analysis showed that the observed spectra are the result of (154)Eu emissions. CONCLUSION: Depending on the detection thresholds and windows used by local and federal authorities, the remaining activity of (154)Eu retained in patients who received (153)Sm-EDTMP could be sufficient enough to increase the count rates above background levels and activate the sensors. At Roger Maris Cancer Center, patients are now informed of the potential consequences of (153)Sm-EDTMP therapy prior to initiating treatment. In addition, patients treated with (153)Sm-EDTMP at Roger Maris Cancer

  3. Selected Papers Presented at MODSIM World 2011 Conference and Expo

    NASA Technical Reports Server (NTRS)

    Pinelli, Thomas E. (Compiler); Bullock, Leanna S. (Compiler)

    2012-01-01

    Selected papers from MODSIM World 2011 Conference & Expo are contained in this NASA Conference Publication (CP). MODSIM World 2011 was held in Virginia Beach, Virginia, October 11-14, 2011. The theme of the 2011 conference & expo was "Overcoming Critical Global Challenges with Modeling & Simulation". The conference program consisted of five technical tracks - Defense, Homeland Security & First Responders; Education; Health & Medicine; The Human Dimension; and Serious Games & Virtual Worlds.

  4. Secure quantum signatures: a practical quantum technology (Conference Presentation)

    NASA Astrophysics Data System (ADS)

    Andersson, Erika

    2016-10-01

    Modern cryptography encompasses much more than encryption of secret messages. Signature schemes are widely used to guarantee that messages cannot be forged or tampered with, for example in e-mail, software updates and electronic commerce. Messages are also transferrable, which distinguishes digital signatures from message authentication. Transferability means that messages can be forwarded; in other words, that a sender is unlikely to be able to make one recipient accept a message which is subsequently rejected by another recipient if the message is forwarded. Similar to public-key encryption, the security of commonly used signature schemes relies on the assumed computational difficulty of problems such as finding discrete logarithms or factoring large primes. With quantum computers, such assumptions would no longer be valid. Partly for this reason, it is desirable to develop signature schemes with unconditional or information-theoretic security. Quantum signature schemes are one possible solution. Similar to quantum key distribution (QKD), their unconditional security relies only on the laws of quantum mechanics. Quantum signatures can be realized with the same system components as QKD, but are so far less investigated. This talk aims to provide an introduction to quantum signatures and to review theoretical and experimental progress so far.

  5. STIDP: A U.S. Department of Homeland Security program for countering explosives attacks at large public events and mass transit facilities

    NASA Astrophysics Data System (ADS)

    Knudson, Christa K.; Kemp, Michael C.; Lombardo, Nicholas J.

    2009-05-01

    The U.S. Department of Homeland Security's Standoff Technology Integration and Demonstration Program is designed to accelerate the development and integration of technologies, concepts of operations, and training to defeat explosives attacks at large public events and mass transit facilities. The program will address threats posed by suicide bombers, vehicle-borne improvised explosive devices, and leave-behind bombs. The program is focused on developing and testing explosives countermeasure architectures using commercial off-the-shelf and near-commercial standoff and remotely operated detection technologies in prototypic operational environments. An important part of the program is the integration of multiple technologies and systems to protect against a wider range of threats, improve countermeasure performance, increase the distance from the venue at which screening is conducted, and reduce staffing requirements. The program will routinely conduct tests in public venues involving successively more advanced technology, higher levels of system integration, and more complex scenarios. This paper describes the initial field test of an integrated countermeasure system that included infrared, millimeter-wave, and video analytics technologies for detecting person-borne improvised explosive devices at a public arena. The test results are being used to develop a concept for the next generation of integrated countermeasures, to refine technical and operational requirements for architectures and technologies, and engage industry and academia in solution development.

  6. Homeland Security Grant Review Act

    THOMAS, 111th Congress

    Rep. Carney, Christopher P. [D-PA-10

    2010-06-22

    06/28/2010 Referred to the Subcommittee on Emergency Communications, Preparedness, and Response. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. Environmental Issues in Homeland Security

    DTIC Science & Technology

    2007-11-02

    nation’s forests could be severe. “Water erosion is the main culprit...whole hillsides virtually turning to liquid and gushing down slope, wiping out...HSPD-5 Management of Domestic Incidents, February 28, 2003, Washington, D.C.: The White House, February 2003. 90 Ibid. 91 “ Overview , The National Oil...26 January 2003. 92 Ibid. 93 Elizabeth H. Howze, ”Agency for Toxic Substances and Disease Registry Overview ,” handout “About ATSDR,” Atlanta, Center

  8. Biosensor Systems for Homeland Security

    SciTech Connect

    Bruckner-Lea, Cindy J.

    2004-05-30

    The detection of biological agents is important to minimize the effects of pathogens that can harm people, livestock, or plants. In addition to pathogens distributed by man, there is a need to detect natural outbreaks. Recent outbreaks of SARS, mad cow disease, pathogenic E. coli and Salmonella, as well as the discovery of letters filled with anthrax spores have highlighted the need for biosensor systems to aid in prevention, early warning, response, and recovery. Rapid detection can be used to prevent exposure; and detection on a longer timescale can be used to minimize exposure, define treatment, and determine whether contaminated areas are clean enough for reuse. The common types of biological agents of concern include bacteria, spores, and viruses (Figure 1). From a chemist’s point of view, pathogens are essentially complex packages of chemicals that are assembled into organized packages with somewhat predictable physical characteristics such as size and shape. Pathogen detection methods can be divided into three general approaches: selective detection methods for specific identification such as nucleic acid analysis and structural recognition, semi-selective methods for broad-spectrum detection (e.g. physical properties, metabolites, lipids), and function-based methods (e.g. effect of the pathogen on organisms, tissues, or cells). The requirements for biodetection systems depend upon the application. While detect to warn sensors may require rapid detection on the order one minute, detection times of many minutes or hours may be suitable for determining appropriate treatments or for forensic analysis. Of course ideal sensor systems will meet the needs of many applications, and will be sensitive, selective, rapid, and simultaneously detect all agents of concern. They will also be reliable with essentially no false negatives or false positives, small, easy to use, and low cost with minimal consumables.

  9. Homeland Security Grant Review Act

    THOMAS, 111th Congress

    Rep. Carney, Christopher P. [D-PA-10

    2010-06-22

    06/28/2010 Referred to the Subcommittee on Emergency Communications, Preparedness, and Response. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. The Department of Homeland Security

    DTIC Science & Technology

    2002-06-01

    estate industry , homebuilding associations, citizens, and others to create model communities in high-risk areas. The Department would have...that have a reduced chance of being impacted by disasters. It would bring together private industry, the insurance sector, mortgage lenders, the real

  11. Homeland Security Grant Review Act

    THOMAS, 111th Congress

    Rep. Carney, Christopher P. [D-PA-10

    2010-06-22

    House - 06/28/2010 Referred to the Subcommittee on Emergency Communications, Preparedness, and Response. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. National Strategy for Homeland Security

    DTIC Science & Technology

    2007-10-01

    United States through the Student and Exchange Visitor Information System ( SEVIS ) and have appropriate follow-up where there may be violations...Visitor Information System ( SEVIS ) is an internet-based system that is improving America’s ability to track and monitor foreign students and

  13. Army Forces for Homeland Security

    DTIC Science & Technology

    2004-01-01

    Overview,” slide presentation at the RAND Corporation, Arlington, Va., June 19, 2002. Feiler , Jeremy, “National Guard Association: Governors Should...Challenge,” Carlisle, Pa.: Strategic Studies Institute, U.S. Army War College, 2001. Pirnie, Bruce R., and Corazon M. Francisco, Assessing Requirements for

  14. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  15. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Astrophysics Data System (ADS)

    1985-07-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  16. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  17. Accessing endoscopic images for remote conference and diagnosis using WWW server with a secure socket layer.

    PubMed

    Hashiba, M; Matsuto, T; Arai, F; Yamakawa, T; Akazawa, K

    2000-12-01

    Out of 137 hospitals in Niigata prefecture, 13 are connected to the Internet. The number of private clinics using the Internet has also increased. It is thought that an endoscopic information exchange over the Internet connection is useful for the cooperation between hospitals, clinics and organizations in related fields. A conventional World Wide Web (WWW) server of endoscopic images has been built around a compressed JPEG (Joint Panel Expert Group) format, for remote conferences and diagnoses. It has been made secure using a proxy server, a firewall server and a Secure Socket Layer (SSL). It is easy to access the server and view these endoscopic images using the usual homepage browsing method. Ordinarily, gastroenterologists would diagnose lesions with endoscopy in most cases. It is suggested that this conventional WWW server will be effective for remote conferences in some cases, even consultation will be possible.

  18. Improved Meteorological Input for Atmospheric Release Decision support Systems and an Integrated LES Modeling System for Atmospheric Dispersion of Toxic Agents: Homeland Security Applications

    SciTech Connect

    Arnold, E; Simpson, M; Larsen, S; Gash, J; Aluzzi, F; Lundquist, J; Sugiyama, G

    2010-04-26

    When hazardous material is accidently or intentionally released into the atmosphere, emergency response organizations look to decision support systems (DSSs) to translate contaminant information provided by atmospheric models into effective decisions to protect the public and emergency responders and to mitigate subsequent consequences. The Department of Homeland Security (DHS)-led Interagency Modeling and Atmospheric Assessment Center (IMAAC) is one of the primary DSSs utilized by emergency management organizations. IMAAC is responsible for providing 'a single piont for the coordination and dissemination of Federal dispersion modeling and hazard prediction products that represent the Federal position' during actual or potential incidents under the National Response Plan. The Department of Energy's (DOE) National Atmospheric Release Advisory Center (NARAC), locatec at the Lawrence Livermore National Laboratory (LLNL), serves as the primary operations center of the IMAAC. A key component of atmospheric release decision support systems is meteorological information - models and data of winds, turbulence, and other atmospheric boundary-layer parameters. The accuracy of contaminant predictions is strongly dependent on the quality of this information. Therefore, the effectiveness of DSSs can be enhanced by improving the meteorological options available to drive atmospheric transport and fate models. The overall goal of this project was to develop and evaluate new meteorological modeling capabilities for DSSs based on the use of NASA Earth-science data sets in order to enhance the atmospheric-hazard information provided to emergency managers and responders. The final report describes the LLNL contributions to this multi-institutional effort. LLNL developed an approach to utilize NCAR meteorological predictions using NASA MODIS data for the New York City (NYC) region and demonstrated the potential impact of the use of different data sources and data parameterizations on

  19. Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.

    SciTech Connect

    Koker, Denise; Micheau, Jill M.

    2006-07-01

    This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

  20. An input-output procedure for calculating economy-wide economic impacts in supply chains using homeland security consequence analysis tools.

    SciTech Connect

    Smith, Braeton J.; Vugrin, Eric D.; Loose, Verne W.; Warren, Drake E.; Vargas, Vanessa N.

    2010-10-01

    Sandia National Laboratories has developed several models to analyze potential consequences of homeland security incidents. Two of these models (the National Infrastructure Simulation and Analysis Center Agent-Based Laboratory for Economics, N-ABLE{trademark}, and Loki) simulate detailed facility- and product-level consequences of simulated disruptions to supply chains. Disruptions in supply chains are likely to reduce production of some commodities, which may reduce economic activity across many other types of supply chains throughout the national economy. The detailed nature of Sandia's models means that simulations are limited to specific supply chains in which detailed facility-level data has been collected, but policymakers are often concerned with the national-level economic impacts of supply-chain disruptions. A preliminary input-output methodology has been developed to estimate national-level economic impacts based upon the results of supply-chain-level simulations. This methodology overcomes two primary challenges. First, the methodology must be relatively simple to integrate successfully with existing models; it must be easily understood, easily applied to the supply-chain models without user intervention, and run quickly. The second challenge is more fundamental: the methodology must account for both upstream and downstream impacts that result from supply-chain disruptions. Input-output modeling typically estimates only upstream impacts, but shortages resulting from disruptions in many supply chains (for example, energy, communications, and chemicals) are likely to have large downstream impacts. In overcoming these challenges, the input-output methodology makes strong assumptions about technology and substitution. This paper concludes by applying the methodology to chemical supply chains.