77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-17
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...
78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-08
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...
Joint Logistics Commanders Guide for the Management of Multinational Program,
1981-07-01
purchase of the A-300 Airbus and the 1977 record-breaking export performance of the French and UK aerospace industries of around $5 billion and $2 billion...DIS. They are the Defense Industrial Security Clearance Office ( DISCO ), the Defense Industrial Security Institute (DISI), and the Office of Industrial...Security International (ISI). Defense Industrial Security Clearance Office ( DISCO ) The Defense Industrial Security Program (DISP) establishes pro
77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-11
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...
75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...
76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-07
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...
76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-01
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... must be submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 11...
76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-13
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...
75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-09
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-08
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...
78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-25
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 8, 2013. ISOO...
78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-25
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, July 12, 2013. ISOO will...
Code of Federal Regulations, 2010 CFR
2010-01-01
... establish an industrial security program for the purpose of safeguarding classified information under the... Agent for the National Industrial Security Program. Commission means the Nuclear Regulatory Commission... designated by the Executive Director for Operations, is eligible for a security clearance for access to...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson; Mark Schanfein; Trond Bjornard
2011-07-01
Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is tomore » provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.« less
32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating Manual (NISPOM) [201(a)]. 2004.20 Section 2004.20 National Defense Other Regulations Relating to National... that surface from industry, Executive Branch departments and agencies, or the NISPPAC. When consensus...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-27
... the provisions of the Department of Defense National Industrial Security Program Operating Manual, an... Department of Defense National Industrial Security Program Operating Manual (unless such requirements are in..., Arms Control and International Security, Department of State. [FR Doc. 2010-21450 Filed 8-26-10; 8:45...
Two Stage Sibling Cycle Compressor/Expander.
1994-02-01
documents, follow the procedures in DoD 5200.22-M, Industrial Security Manual, Section 11-19 or DoD 5200.1 -R, Information Security Program Regulation...procedures in DoD 5200.22-M, Industrial Security Manual, Section 11-19 or DoD 5200.1-R, Information Security Program Regulation, Chapter IX. For...Spae Piston rotation periodically connects channels from expansion/ compresion ces to ports P1Port B2 Heat Exchangers B Piston moves Ports Process Al
77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-01
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National... Information Security Oversight Office no later than Friday, March 16, 2012. The Information Security Oversight... FURTHER INFORMATION CONTACT: David O. Best, Senior Program Analyst, The Information Security Oversight...
15 CFR 700.20 - Use of priority ratings.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Industrial Priorities for Energy Programs § 700.20 Use of... maintenance of energy facilities. ...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-29
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment Request; Competitive Enhancement Needs Assessment Survey Program AGENCY: Bureau of Industry and Security... their abilities to meet defense program needs. The information collected from voluntary surveys will be...
32 CFR Appendix A to Part 806 - References
Code of Federal Regulations, 2010 CFR
2010-07-01
..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...
32 CFR Appendix A to Part 806 - References
Code of Federal Regulations, 2014 CFR
2014-07-01
..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...
32 CFR Appendix A to Part 806 - References
Code of Federal Regulations, 2012 CFR
2012-07-01
..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...
Clark, R; Filinson, R
1991-01-01
This study examines the determinants of spending on social security programs. We draw predictions from industrialism and dependency theories for the explanation of social security programs. The explanations are tested with data on seventy-five nations, representative of core, semipheripheral and peripheral nations. Industrialization variables such as the percentage of older adults and economic productivity have strong effects in models involving all nations, as does multinational corporate (MNC) penetration in extraction, particularly when region is controlled; such penetration is negatively associated with spending on social security. We then look at industrialism and dependency effects for peripheral and non-core nations alone. The effects of all industrialization variables, except economic productivity, appear insignificant for peripheral nations, while the effects of region and multinational corporate penetration in extractive and agricultural industries appears significant. Models involving all non-core nations (peripheral and semi-peripheral) look more like models for all nations than for peripheral nations alone.
49 CFR 8.31 - Industrial security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... regulation is DOD 5220.22-M, National Industrial Security Program Operating Manual. This regulation is effective within the Department of Transportation, which functions as a User Agency as prescribed in the...
Programs That Support Safety and Security for the Transit Industry
DOT National Transportation Integrated Search
2001-03-01
FTA's Office of Safety and Security (Office) directly supports the U.S. Department of Transportation's safety goals through a series of programs designed to maintain continuous improvement in the safety and security of our nation's transit systems. T...
33 CFR 101.125 - Approved Alternative Security Programs.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 106 of this subchapter, as applicable: (a) American Gaming Association Alternative Security Program..., and Towboats and Barges, dated September 24, 2003. (c) Passenger Vessel Association Industry Standards...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., January 6, 1993 (58 FR 3479, January 8, 1993), entitled “National Industrial Security Program” (NISP... National Industrial Security Program Operating Manual (NISPOM) incorporates the requirements of these... Central Intelligence, is responsible for issuance and maintenance of this Manual. The following DOD...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-03
... Information Collection Activity Under OMB Review: Pipeline Corporate Security Review AGENCY: Transportation.... Information Collection Requirement Title: Pipeline Corporate Security Review (PCSR). Type of Request... current industry security practices through its Pipeline Corporate Security Review (PCSR) program. The...
Metrics for the National SCADA Test Bed Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.
2008-12-05
The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.
77 FR 29616 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-18
.... DCIO 01 System name: Defense Industrial Base (DIB) Cyber Security/Information Assurance Records. System location: Director, Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program, 1235 South Clark Street, Suite 1500, Arlington, VA 22202. DoD Cyber Crime Center, 911 Elkridge Landing...
75 FR 1566 - National Industrial Security Program Directive No. 1
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-12
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part...: Information Security Oversight Office, NARA. ACTION: Proposed rule; correction. SUMMARY: This document... Management System (FDMS) number to the proposed rule for Information Security Oversight Office (ISOO...
Industrial Technologies Program - A Clean, Secure Energy Future via Industrial Energy Efficiency
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
The Industrial Technologies Program (ITP) leads the national effort to save energy and reduce greenhouse gas emissions in the largest energy-using sector of the U.S. economy. ITP drives energy efficiency improvements and carbon dioxide reductions throughout the manufacturing supply chain, helping develop and deploy innovative technologies that transform the way industry uses energy.
Cyber security evaluation of II&C technologies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, Ken
The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) tomore » address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.« less
48 CFR 2804.470 - Contractor Personnel Security Program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Contractor Personnel Security Program. 2804.470 Section 2804.470 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 2804.470 Contractor...
ERIC Educational Resources Information Center
Clark, Roger; Filinson, Rachel
1991-01-01
Examined determinants of spending on social security programs, using data from 75 nations representative of core, semiperipheral, and peripheral nations. Industrialization variables had strong effects in models involving all nations, as did multinational corporate penetration in extraction, particularly when region was controlled; such penetration…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-22
... Information Collection Activity Under OMB Review: Highway Corporate Security Review (CSR) AGENCY... in the highway and motor carrier industry by way of its Highway Corporate Security Review Program... comments. Information Collection Requirement Title: Corporate Security Review (CSR). Type of Request...
22 CFR 127.5 - Authority of the Defense Security Service.
Code of Federal Regulations, 2010 CFR
2010-04-01
... ensure compliance with the Department of Defense National Industrial Security Program Operating Manual... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authority of the Defense Security Service. 127... VIOLATIONS AND PENALTIES § 127.5 Authority of the Defense Security Service. In the case of exports involving...
22 CFR 125.3 - Exports of classified technical data and classified defense articles.
Code of Federal Regulations, 2010 CFR
2010-04-01
... in the Department of Defense National Industrial Security Program Operating Manual (unless such.... It should also list the facility security clearance code of all U.S. parties on the license and include the Defense Security Service cognizant security office of the party responsible for packaging the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-07
... Information Collection Activity Under OMB Review: Highway Corporate Security Review AGENCY: Transportation... industry by way of its Highway Corporate Security Review (CSR) Program, which encompasses site visits and... Title: Highway Corporate Security Review. Type of Request: Extension of a currently approved collection...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-26
... From OMB of One Current Public Collection of Information: Pipeline Corporate Security Review Program... current security practices in the pipeline industry by way of TSA's Pipeline Corporate Security Review... Collection Requirement The TSA Pipeline Security Branch is responsible for conducting Pipeline Corporate...
78 FR 21116 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-09
...-0472. Needs and Uses: Executive Order 12829, ``National Industrial Security Program (NISP)'' Section...; Comment Request AGENCY: Defense Security Service, DoD. ACTION: Notice. In compliance with Section 3506(c)(2)(A) of the Paperwork Reduction Act of 1995, the Defense Security Service (DSS) announces the...
48 CFR 52.204-2 - Security Requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Agreement (DD Form 441), including the National Industrial Security Program Operating Manual (DOD 5220.22-M... architect-engineer contract, add the following paragraph (e) to the basic clause: (e) The Contractor shall...
78 FR 44100 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-23
...: Executive Order 12829, ``National Industrial Security Program (NISP)'' Section 202(a) stipulates that the... implementation of the NISP. Department of Defense Directive 5105.42, ``Defense Security Service,'' dated August 3...
32 CFR 2004.11 - Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)].
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Implementation and Oversight § 2004.11 Agency...
Software To Secure Distributed Propulsion Simulations
NASA Technical Reports Server (NTRS)
Blaser, Tammy M.
2003-01-01
Distributed-object computing systems are presented with many security threats, including network eavesdropping, message tampering, and communications middleware masquerading. NASA Glenn Research Center, and its industry partners, has taken an active role in mitigating the security threats associated with developing and operating their proprietary aerospace propulsion simulations. In particular, they are developing a collaborative Common Object Request Broker Architecture (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines
75 FR 17305 - National Industrial Security Program Directive No. 1
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-06
... Top Secret; Communications Security, except classified keys used for data transfer; Restricted Data... clearance under an SSA to Top Secret unless an approved NID covering the prospective Top Secret access has...
NASA Technical Reports Server (NTRS)
Barr, B. G.
1986-01-01
A technology transfer program utilizing graduate students in mechanical engineering at the University of Kansas was initiated in early 1981. The objective of the program was to encourage industrial innovation in the Midwest through improved industry/university cooperation and the utilization of NASA technology. A related and important aspect of the program was the improvement of graduate engineering education through the involvement of students in the identification and accomplishment of technological objectives in cooperation with scientists at NASA centers and engineers in industry. The pilot NASA/University Industrial Innovation Program was an outstanding success based on its ability to: attract top graduate students; secure industry support; and stimulate industry/university cooperation leading to enhanced university capability and utilization of advanced technology by industry.
28 CFR 17.46 - Access by persons outside the Executive Branch.
Code of Federal Regulations, 2010 CFR
2010-07-01
... subject to the National Industrial Security Program require access to classified information originated by... Branch. 17.46 Section 17.46 Judicial Administration DEPARTMENT OF JUSTICE CLASSIFIED NATIONAL SECURITY... propriety of such action, in the interest of the national security, and must approve the release. Prior to...
48 CFR 904.404 - Solicitation provision and contract clause.
Code of Federal Regulations, 2013 CFR
2013-10-01
... provision and contract clause. (d) The security clauses to be used in DOE contracts are found at 952.204. They are: (1) Security, 952.204-2. This clause is required in contracts and subcontracts, the... materials or the provision of protective services. DOE utilizes the National Industrial Security Program but...
48 CFR 904.404 - Solicitation provision and contract clause.
Code of Federal Regulations, 2011 CFR
2011-10-01
... provision and contract clause. (d) The security clauses to be used in DOE contracts are found at 952.204. They are: (1) Security, 952.204-2. This clause is required in contracts and subcontracts, the... materials or the provision of protective services. DOE utilizes the National Industrial Security Program but...
48 CFR 904.404 - Solicitation provision and contract clause.
Code of Federal Regulations, 2014 CFR
2014-10-01
... provision and contract clause. (d) The security clauses to be used in DOE contracts are found at 952.204. They are: (1) Security, 952.204-2. This clause is required in contracts and subcontracts, the... materials or the provision of protective services. DOE utilizes the National Industrial Security Program but...
48 CFR 904.404 - Solicitation provision and contract clause.
Code of Federal Regulations, 2012 CFR
2012-10-01
... provision and contract clause. (d) The security clauses to be used in DOE contracts are found at 952.204. They are: (1) Security, 952.204-2. This clause is required in contracts and subcontracts, the... materials or the provision of protective services. DOE utilizes the National Industrial Security Program but...
75 FR 5994 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-05
... and OMB Number: Voice of Industry Survey; OMB Control Number 0704-TBD. Type of Request: New. Number of... Security Program (NISP)'' Section 202(a) stipulates that the Secretary of Defense shall serve as the... Security Agency (CSA), designated by the NISPOM, is responsible for determining the frequency of Security...
76 FR 81909 - Notice of Request for Extension of a Currently Approved Information Collection
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-29
..., financial feasibility determinations and loan security determinations as required by the Con Act. Estimate... Industry Loan Program. DATES: Comments on this notice must be received by February 27, 2012 to be assured... for TDD users. SUPPLEMENTARY INFORMATION: Title: Business and Industry Loan Program. OMB Number: 0570...
2011 Defense Industrial Base Critical Infrastructure Protection Conference (DIBCIP)
2011-08-25
Office of the Program Manager, Information Sharing Environment u Mr. Vince Jarvie , Vice President, Corporate Security, L-3 Communications...National Defense University IRM College and in 2008 he obtained the Certified Information System Security Professional certificate. MR. VINCE JARVIE ...Vice President, Corporate Security, L-3 Communciations Corporation Mr. Vincent (Vince) Jarvie is the Vice President, Corporate Security for L-3
A Tool for Rating the Resilience of Critical Infrastructures in Extreme Fires
2014-05-01
provide a tool for NRC to help the Canadian industry to develop extreme fire protection materials and technologies for critical infrastructures. Future...supported by the Canadian Safety and Security Program (CSSP) which is led by Defence Research and Development Canada’s Centre for Security Science, in...in oil refinery and chemical industry facilities. The only available standard in North America that addresses the transportation infrastructure is
Security basics for long-term care facilities.
Green, Martin
2015-01-01
The need for Long-Term Care (LTC) facilities is growing, the author reports, and along with it the need for programs to address the major security concerns of such facilities. In this article he explains how to apply the IAHSS Healthcare Security Industry Guidelines and the Design Guidelines to achieve a safer LTC facility.
Cyber Security Testing and Training Programs for Industrial Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Daniel Noyes
2012-03-01
Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less
A Policy and Program for Invigorating Science and Technology for National Security
2014-04-01
technical support – academia competes against industry often appearing as cheap labour but then without generating commercially viable or sustainable...have new technology approved too bureaucratic keeping SME’s out of the market DSTO provide greater transparency of S&T goals to enable industry to...national security S&T. In endeavouring to meet the Government’s desire to reduce red tape and cognisant of the tight financial environment, consideration
Challenges of the Global Century: Report of the Project on Globalization and National Security
2001-01-01
military and civilian leaders for service at the highest levels of national defense and security. The major components of NDU include the Industrial ...academic programs. In addition, it produces Joint Force Quarterly, a professional military journal published for the Chairman of the Joint Chiefs of...shocks become contagious. In these circumstances, it can both arouse anger at industrial democracies and facili- tate the growth of international crime
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-08
... established pursuant to the policies duly authorized under the National Industrial Security Program. The proxy... Influence (FOCI) in order to maintain the Facility Security Clearance held by MOX Services. No physical... Facility Security Clearance, is in accordance with the provisions of the AEA of 1954, as amended. The...
Code of Federal Regulations, 2010 CFR
2010-04-01
... Defense Trade Controls to the Defense Security Service of the Department of Defense in accordance with the provisions of the Department of Defense National Industrial Security Program Operating Manual (unless such... a copy of the license to the applicant for the applicant's information. The Defense Security Service...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-26
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68468; File No. SR-FINRA-2012-055] Self...-Element Continuing Education Program To Qualify To Engage in a Security Futures Business December 19, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'')\\1\\ and Rule 19b-4 thereunder...
ERIC Educational Resources Information Center
Grant, Robert Luther
2017-01-01
Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…
Protecting water and wastewater infrastructure from cyber attacks
NASA Astrophysics Data System (ADS)
Panguluri, Srinivas; Phillips, William; Cusimano, John
2011-12-01
Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.
Walk the Talk: Progress in Building a Supply Chain Security Culture
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hund, Gretchen
Pacific Northwest National Laboratory (PNNL) has engaged industry to “go beyond compliance” for over a decade in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices to understand their business and to build awareness around best practices to ensure security of goods, technology,more » and information along their supply chains. From conducting this work, PNNL identified indicators that a company can adopt as part of its commitment to nonproliferation ideals with a focus on supply chain security.« less
Code of Federal Regulations, 2014 CFR
2014-07-01
... DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... a recurring basis, and to the greatest extent possible, cyber security information relating to... Office is the overall point of contact for the program. The DoD Cyber Crime Center's DoD-DIB...
Code of Federal Regulations, 2012 CFR
2012-07-01
... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... a recurring basis, and to the greatest extent possible, cyber security information relating to... Office is the overall point of contact for the program. The DoD Cyber Crime Center's DoD-DIB...
Code of Federal Regulations, 2013 CFR
2013-07-01
... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... a recurring basis, and to the greatest extent possible, cyber security information relating to... Office is the overall point of contact for the program. The DoD Cyber Crime Center's DoD-DIB...
Recovering Radioactive Materials with OSRP team
None
2017-12-09
The National Nuclear Security Administration sponsors a program, executed by Los Alamos National Laboratory, to recover radioisotopes used by industry and academia and no longer needed. Called the "Offsite Source Recovery Program (OSRP), it has recovered
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-22
... Trader Continuing Education Program (S501) is a computer-based education program developed by many of the... Continuing Education Program, which is developed and maintained by the Securities Industry Regulatory Council... change will authorize the Exchange to administer different CE programs to differently registered...
Software-Based Visual Loan Calculator For Banking Industry
NASA Astrophysics Data System (ADS)
Isizoh, A. N.; Anazia, A. E.; Okide, S. O. 3; Onyeyili, T. I.; Okwaraoka, C. A. P.
2012-03-01
industry is very necessary in modern day banking system using many design techniques for security reasons. This paper thus presents the software-based design and implementation of a Visual Loan calculator for banking industry using Visual Basic .Net (VB.Net). The fundamental approach to this is to develop a Graphical User Interface (GUI) using VB.Net operating tools, and then developing a working program which calculates the interest of any loan obtained. The VB.Net programming was done, implemented and the software proved satisfactory.
Tractor Trailer Driver's Training Programs. Performance Report.
ERIC Educational Resources Information Center
New Hampshire Vocational Technical Coll., Nashua.
This document describes a project to develop a 320-hour tractor trailer driver training program and a 20-hour commercial driver licensing upgrade training program. Of 34 graduates from the training program, 28 secured employment in the trucking industry. From August 1989 to June 1990, 725 students were trained in the upgrade training program with…
Compatibility of Army Systems with Anthropometric Characteristics of Female Soldiers
1997-09-01
M, Industrial Security Manual, Section 11-19 or DoD 5200.1-R, Information Security Program Regulation, Chapter IX. For Unclassified/ Limited ...of female soldiers. Participation was limited to female soldiers whose height did not exceed 5’ 5", the 5th percentile value of male soldiers’ height...CLASSIFICATION tffcMSSIFIED 18. SECURITY CLASSIFICATION uffdLÄS^FIED 19. SECURITY CLASSIFICATION ST*—FIED 20. LIMITATION OF ABSTRACT SAR
Army Industrial Fund Rate Stabilization Program.
1986-11-01
orders. Most cost reimbursable orders fall outside of the four exclusions authorized by the revised DA policy on fixed rate orders. Of the cost reimbur ... reimbursable programs. , . 20 DISTRIBUTION/AVAILABILITY OF ABSTRArT 21 ABSTRACT SECURITY CLASSIFICATION M UNCLASSIFIED/UNLIMITED 0 SAME AS RPT - DTIC USERS...customers who reimburse the fund. Industrial funds are intended to be self-sustaining. Department of Defense (DOD) policy as enumerated in DOD
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Purpose. 155.1 Section 155.1 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY CLEARANCE PROGRAM § 155.1 Purpose. This part updates policy, responsibilities, and procedures of the Defense...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Purpose. 155.1 Section 155.1 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY CLEARANCE PROGRAM § 155.1 Purpose. This part updates policy, responsibilities, and procedures of the Defense...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Purpose. 155.1 Section 155.1 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY CLEARANCE PROGRAM § 155.1 Purpose. This part updates policy, responsibilities, and procedures of the Defense...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Purpose. 155.1 Section 155.1 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY CLEARANCE PROGRAM § 155.1 Purpose. This part updates policy, responsibilities, and procedures of the Defense...
32 CFR 2001.90 - Agency annual reporting requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 6 2014-07-01 2014-07-01 false Agency annual reporting requirements. 2001.90 Section 2001.90 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY... Defense, acting as the executive agent for the National Industrial Security Program under E.O.12829, as...
32 CFR 2001.90 - Agency annual reporting requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Agency annual reporting requirements. 2001.90 Section 2001.90 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY... Defense, acting as the executive agent for the National Industrial Security Program under E.O.12829, as...
32 CFR 2001.90 - Agency annual reporting requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 6 2012-07-01 2012-07-01 false Agency annual reporting requirements. 2001.90 Section 2001.90 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY... Defense, acting as the executive agent for the National Industrial Security Program under E.O.12829, as...
32 CFR 2001.90 - Agency annual reporting requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Agency annual reporting requirements. 2001.90 Section 2001.90 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY... Defense, acting as the executive agent for the National Industrial Security Program under E.O.12829, as...
32 CFR 2001.90 - Agency annual reporting requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Agency annual reporting requirements. 2001.90 Section 2001.90 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY... Defense, acting as the executive agent for the National Industrial Security Program under E.O.12829, as...
OPSAID Initial Design and Testing Report.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hurd, Steven A.; Stamp, Jason Edwin; Chavez, Adrian R.
2007-11-01
Process Control System (PCS) security is critical to our national security. Yet, there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy's Office of Electricity Delivery and Reliability, aims to address this issue through developing and testing an open source architecture for PCS security. Sandia National Laboratories, along with a team of PCS vendors and owners, have developed and tested this PCS security architecture. This report describes their progress to date.2 AcknowledgementsThe authors acknowledgemore » and thank their colleagues for their assistance with the OPSAID project.Sandia National Laboratories: Alex Berry, Charles Perine, Regis Cassidy, Bryan Richardson, Laurence PhillipsTeumim Technical, LLC: Dave TeumimIn addition, the authors are greatly indebted to the invaluable help of the members of the OPSAID Core Team. Their assistance has been critical to the success and industry acceptance of the OPSAID project.Schweitzer Engineering Laboratory: Rhett Smith, Ryan Bradetich, Dennis GammelTelTone: Ori Artman Entergy: Dave Norton, Leonard Chamberlin, Mark AllenThe authors would like to acknowledge that the work that produced the results presented in this paper was funded by the U.S. Department of Energy/Office of Electricity Delivery and Energy Reliability (DOE/OE) as part of the National SCADA Test Bed (NSTB) Program. Executive SummaryProcess control systems (PCS) are very important for critical infrastructure and manufacturing operations, yet cyber security technology in PCS is generally poor. The OPSAID (Open PCS (Process Control System) Security Architecture for Interoperable Design) program is intended to address these security shortcomings by accelerating the availability and deployment of comprehensive security technology for PCS, both for existing PCS and inherently secure PCS in the future. All activities are closely linked to industry outreach and advisory efforts.Generally speaking, the OPSAID project is focused on providing comprehensive security functionality to PCS that communicate using IP. This is done through creating an interoperable PCS security architecture and developing a reference implementation, which is tested extensively for performance and reliability.This report first provides background on the PCS security problem and OPSAID, followed by goals and objectives of the project. The report also includes an overview of the results, including the OPSAID architecture and testing activities, along with results from industry outreach activities. Conclusion and recommendation sections follow. Finally, a series of appendices provide more detailed information regarding architecture and testing activities.Summarizing the project results, the OPSAID architecture was defined, which includes modular security functionality and corresponding component modules. The reference implementation, which includes the collection of component modules, was tested extensively and proved to provide more than acceptable performance in a variety of test scenarios. The primary challenge in implementation and testing was correcting initial configuration errors.OPSAID industry outreach efforts were very successful. A small group of industry partners were extensively involved in both the design and testing of OPSAID. Conference presentations resulted in creating a larger group of potential industry partners.Based upon experience implementing and testing OPSAID, as well as through collecting industry feedback, the OPSAID project has done well and is well received. Recommendations for future work include further development of advanced functionality, refinement of interoperability guidance, additional laboratory and field testing, and industry outreach that includes PCS owner education. 4 5 --This page intentionally left blank --« less
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Policy. 155.4 Section 155.4 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY CLEARANCE PROGRAM § 155.4 Policy. It is DoD policy that: (a) All proceedings provided for by this part shall...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Policy. 155.4 Section 155.4 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY CLEARANCE PROGRAM § 155.4 Policy. It is DoD policy that: (a) All proceedings provided for by this part shall...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Policy. 155.4 Section 155.4 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY CLEARANCE PROGRAM § 155.4 Policy. It is DoD policy that: (a) All proceedings provided for by this part shall...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Policy. 155.4 Section 155.4 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY CLEARANCE PROGRAM § 155.4 Policy. It is DoD policy that: (a) All proceedings provided for by this part shall...
32 CFR 2004.12 - Reviews by ISOO [102(b)(4)].
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Reviews by ISOO [102(b)(4)]. 2004.12 Section 2004.12 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1...
Creation of security engineering programs by the Southwest Surety Institute
NASA Astrophysics Data System (ADS)
Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn
1998-12-01
The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.
49 CFR 1.23 - Spheres of primary responsibility.
Code of Federal Regulations, 2010 CFR
2010-10-01
... and technology, commercial space transportation, intelligence and security, and public affairs. (b... technology cooperation; international visitors' programs; economic regulation of the airline industry; and... any negotiated rulemaking relating to, or having an impact on, projects, programs, or funding...
49 CFR 1.23 - Spheres of primary responsibility.
Code of Federal Regulations, 2011 CFR
2011-10-01
... and technology, commercial space transportation, intelligence and security, and public affairs. (b... technology cooperation; international visitors' programs; economic regulation of the airline industry; and... any negotiated rulemaking relating to, or having an impact on, projects, programs, or funding...
Food safety regulations in Australia and New Zealand Food Standards.
Ghosh, Dilip
2014-08-01
Citizens of Australia and New Zealand recognise that food security is a major global issue. Food security also affects Australia and New Zealand's status as premier food exporting nations and the health and wellbeing of the Australasian population. Australia is uniquely positioned to help build a resilient food value chain and support programs aimed at addressing existing and emerging food security challenges. The Australian food governance system is fragmented and less transparent, being largely in the hands of government and semi-governmental regulatory authorities. The high level of consumer trust in Australian food governance suggests that this may be habitual and taken for granted, arising from a lack of negative experiences of food safety. In New Zealand the Ministry of Primary Industries regulates food safety issues. To improve trade and food safety, New Zealand and Australia work together through Food Standards Australia New Zealand (FSANZ) and other co-operative agreements. Although the potential risks to the food supply are dynamic and constantly changing, the demand, requirement and supply for providing safe food remains firm. The Australasian food industry will need to continually develop its system that supports the food safety program with the help of scientific investigations that underpin the assurance of what is and is not safe. The incorporation of a comprehensive and validated food safety program is one of the total quality management systems that will ensure that all areas of potential problems are being addressed by industry. © 2014 Society of Chemical Industry.
77 FR 12622 - Records Schedules; Availability and Request for Comments
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-01
... chemical weapons convention program records and protocol program records. 3. Department of Defense, Defense... disposition process is available on request. Schedules Pending 1. Department of the Army, Agency-wide (N1-AU... programs, housing, recreation, and travel. 2. Department of Commerce, Bureau of Industry and Security, (N1...
Maquiladoras and National Security: Design Theory as a Guide
2011-10-25
created in 1964 when the Mexican government established the Border Industrialization Program. Previously, under the Bracero program , large numbers...valve” for the Mexican economy in terms of unemployment. Previously, under the Bracero program , Mexican laborers were allowed temporary entry into...the United States to pursue seasonal labor opportunities. A guest worker program, perhaps modeled after the Bracero program that was discontinued in
Recovering Radioactive Materials with ORSP Team
LANL
2017-12-09
The National Nuclear Security Administration sponsors a program, executed by Los Alamos National Laboratory, to recover radioisotopes used by industry and academia and no longer needed. Called the "Offsite Source Recovery Program (OSRP), it has recovered more than 16,000 orphan sources as of 2008.
Li, Yuxuan; Zhang, Weifeng; Ma, Lin; Huang, Gaoqiang; Oenema, Oene; Zhang, Fusuo; Dou, Zhengxia
2013-07-01
China has made remarkable strides in recent decades to grow enough food to feed 20% of the world's population with only 9% of the world's arable land. Meanwhile, the nation is experiencing exacerbated air and water pollution problems. Agricultural growth and the pollution aggravation are closely linked with policies affecting fertilizer production and use. Essentially nonexistent in 1950, China's fertilizer industry is now a robust conglomerate producing fertilizers in amounts that not only meet domestic demand but also contribute to international trade. The industry's growth stemmed from a series of policy progressions, featuring (i) a total control system with state ownership and central planning (1949-1984), (ii) a dual system of central planning and market adjustment (1985-1997), (iii) a market-driven system with government-mandated price caps (1998-2009), and (iv) a complete market-oriented system (since 2009). In conjunction with the policy changes were massive subsidy programs totaling more than $18 billion in 2010. The support policies and subsidies helped grow the industry and safeguard an adequate supply of fertilizers at affordable costs to farmers, but the artificially low-priced fertilizers also contributed to a nationwide trend of fertilizer overuse, leading to nutrient pollution. China needs innovative policies and programs to address food security and sustainability challenges. In this study, we review and analyze policies and programs related to China's fertilizer production and use in a 60-yr span (1950-2010) and discuss its impact on the development of the industry, food security, and pressing environmental issues. Finally, our study analyzes long-term trends in fertilizer use in China and offers some key viewpoints to stimulate debates among all stakeholders. Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America, Inc.
Food Security and Women's Access to Natural Resources workshop; a brief report.
1997-01-01
This article describes the workshop on Food Security and Women's Access to Natural Resources, held in January 1997 in Mumbai, India. The workshop was organized jointly by the Tata Institute of Social Sciences and the Indian Association of Women's Studies. The aim was to examine the food security situation in Maharashtra and Gujarat states in the west, the initiative to build alternative institutions, legal changes augmenting industrialization, and how traditional rights to common property resources can be legalized and how the poor can have access to new resources. The workshop organizers were unable to obtain experts on some topics. Core discussion centered on changes in industrialization, natural resources, gender and food security; access to natural resources and poverty alleviation programs; initiatives to create food security; and laws related to access to land and water. Discussions revealed the alienation of small and marginal farmers, landless laborers, and artisans from their livelihoods and survival strategies for these disenfranchised groups. The design of drought eradication and water conservation programs did not permit women and men working at construction sites to have access to the program assets. Case studies revealed situations in which women won the right of access to community water and then negotiated for land in lease. The women used landowners to negotiate credit and access development program assets, but normal channels of the National Bank of Agricultural Research and Development could have provided these benefits. Participants discussed how governments can be held accountable and how public funds could be used to revamp poverty alleviation and asset creation programs. All agreed that macrolevel development should give priority to agricultural development and legal constraints or problems. Five follow-up activities are identified.
Protecting proprietary rights - A potential Shuttle user's view
NASA Technical Reports Server (NTRS)
Day, J. B.
1977-01-01
Maintaining a high degree of industrial security in the multiple-payload Shuttle environment poses a number of problems for NASA. As a part of Battelle-Columbus' support of NASA's User Development Program, this paper presents a potential user's perspective on this situation. The need for security, the nature of the problem, and precedents for NASA security measures are discussed. Eleven policy guidelines representing desirable features from a potential user's viewpoint are presented for NASA consideration.
76 FR 17992 - Information Reporting Program Advisory Committee (IRPAC); Nominations
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-31
... and other IRS leadership to provide recommendations on a wide range of information reporting... universities, securities, payroll, financial institutions and other industries. DATES: Written nominations must...
2011-10-01
partners of the CRTI and PSTP programs in applying and receiving positive status under the SAFTEY Act is a valuable service that DRDC-CSS can supply...Canadian industry partners of the CRTI/PSTP program into successfully applying for designation under the USA SAFETY Act, and preferably to be added...to the Department of Homeland Security Approved Product List (APL). This will enable Canadian companies to access these markets with the outputs of
78 FR 53736 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-30
...: Title, Associated Form and OMB Number: Defense Industrial Base Cyber Security/Information Assurance (DIB... program administration and management purposes. Affected Public: Business or other for-Profit; Not-for...
Fostering Minerals Workforce Skills of Tomorrow through Education and Training Partnerships
NASA Astrophysics Data System (ADS)
Lind, Gavin
The Minerals Council of Australia (MCA), through its Minerals Tertiary Education Council (MTEC), builds capacity in higher education in the core disciplines of mining engineering, metallurgy and minerals geoscience. Over the past fourteen years, this all-of-industry approach in securing the long-term supply of these critical skills (which remain a chronic skills shortage for the Australian minerals industry) through nationally collaborative programs across sixteen Australian universities delivers spectacular and sustainable results for the industry. These unique, world-first programs are built on a healthy platform of dedicated industry funding and in-kind support and forms part of the MCA's broader uninterrupted, sustainable education and training pathway to increase workforce participation, workforce diversity and workforce skills, regardless of the business cycle in the industry. This paper will highlight the origins, iterations and current successful programs of MTEC, including its future vision, and presents a mechanism for industry and academia to collaborate to address future professional skills needs in the minerals industry globally.
32 CFR 806.28 - Records with special disclosure procedures.
Code of Federal Regulations, 2013 CFR
2013-07-01
....28 Section 806.28 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION AIR FORCE FREEDOM OF INFORMATION ACT PROGRAM § 806.28 Records with special disclosure procedures..., Industrial Security Program Management. (e) AFI 36-2603, Air Force Board for Correction of Military Records...
32 CFR 806.28 - Records with special disclosure procedures.
Code of Federal Regulations, 2011 CFR
2011-07-01
....28 Section 806.28 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION AIR FORCE FREEDOM OF INFORMATION ACT PROGRAM § 806.28 Records with special disclosure procedures..., Industrial Security Program Management. (e) AFI 36-2603, Air Force Board for Correction of Military Records...
32 CFR 806.28 - Records with special disclosure procedures.
Code of Federal Regulations, 2010 CFR
2010-07-01
....28 Section 806.28 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION AIR FORCE FREEDOM OF INFORMATION ACT PROGRAM § 806.28 Records with special disclosure procedures..., Industrial Security Program Management. (e) AFI 36-2603, Air Force Board for Correction of Military Records...
15 CFR 752.11 - Internal Control Programs.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Internal Control Programs. 752.11 Section 752.11 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS SPECIAL COMPREHENSIVE LICENSE § 752.11 Internal Control...
ERIC Educational Resources Information Center
Jackson, Terrence R.; Draugalis, JoLaine R.
2000-01-01
A survey of all 41 U.S. schools and colleges of pharmacy offering social/administrative sciences graduate programs found a substantial increase in the number of programs and participants, and expected completions. Fellows were most apt to secure an industry post upon program completion; PhD graduates were most apt to accept a position with the…
Advanced Simulation and Computing Business Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rummel, E.
To maintain a credible nuclear weapons program, the National Nuclear Security Administration’s (NNSA’s) Office of Defense Programs (DP) needs to make certain that the capabilities, tools, and expert staff are in place and are able to deliver validated assessments. This requires a complete and robust simulation environment backed by an experimental program to test ASC Program models. This ASC Business Plan document encapsulates a complex set of elements, each of which is essential to the success of the simulation component of the Nuclear Security Enterprise. The ASC Business Plan addresses the hiring, mentoring, and retaining of programmatic technical staff responsiblemore » for building the simulation tools of the nuclear security complex. The ASC Business Plan describes how the ASC Program engages with industry partners—partners upon whom the ASC Program relies on for today’s and tomorrow’s high performance architectures. Each piece in this chain is essential to assure policymakers, who must make decisions based on the results of simulations, that they are receiving all the actionable information they need.« less
Cyber Security and Resilient Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson
2009-07-01
The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments tomore » date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.« less
U.S. Social Security at 75 years: an international perspective.
Hoskins, Dalmer D
2010-01-01
Is the historical development of the Old-Age, Survivors, and Disability Insurance (OASDI) program unique or similar to the development of social security programs in other industrialized countries? The U.S. Social Security program was adopted some 40 to 50 years after those of most Western European nations. The United States thus had the opportunity to choose from a number of models and clearly chose to follow the classic social insurance path of such countries as Austria, France, and Germany, which in 1935 already had considerable experience administering earnings-related, employer/worker-financed old-age pension programs. Although based on the traditional social insurance model, OASDI evolved in certain unique ways, including the rejection over the course of succeeding decades of any reliance on general revenue financing, the importance attached to long-range (75-year) actuarial projections, and the relative generosity of benefits for survivors and dependents.
CVISN model deployment initiative summary evaluation plan
DOT National Transportation Integrated Search
1998-10-01
The Federal Highway Administration (FHWA) participated in an international research program organized by the Canadian Council of Motor Transport Administrators (CCMTA) to evaluate cargo securement regulations and industry practice. As a result of thi...
32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].
Code of Federal Regulations, 2011 CFR
2011-07-01
... phases of the contracting process. (b) As a general rule, procedures for safeguarding classified information by contractors and recommendations for changes shall be addressed through the NISPOM coordination...
48 CFR 225.870-8 - Industrial security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...
48 CFR 225.870-8 - Industrial security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...
48 CFR 225.870-8 - Industrial security.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...
48 CFR 225.870-8 - Industrial security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...
48 CFR 225.870-8 - Industrial security.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...
CORBASec Used to Secure Distributed Aerospace Propulsion Simulations
NASA Technical Reports Server (NTRS)
Blaser, Tammy M.
2003-01-01
The NASA Glenn Research Center and its industry partners are developing a Common Object Request Broker (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines. It was developed by Glenn and is being managed by the NASA Ames Research Center as the lead center reporting directly to NASA Headquarters' Aerospace Technology Enterprise. Glenn is an active domain member of the Object Management Group: an open membership, not-for-profit consortium that produces and manages computer industry specifications (i.e., CORBA) for interoperable enterprise applications. When NPSS is deployed, it will assemble a distributed aerospace propulsion simulation scenario from proprietary analytical CORBA servers and execute them with security afforded by the CORBASec implementation. The NPSS CORBASec test bed was initially developed with the TPBroker Security Service product (Hitachi Computer Products (America), Inc., Waltham, MA) using the Object Request Broker (ORB), which is based on the TPBroker Basic Object Adaptor, and using NPSS software across different firewall products. The test bed has been migrated to the Portable Object Adaptor architecture using the Hitachi Security Service product based on the VisiBroker 4.x ORB (Borland, Scotts Valley, CA) and on the Orbix 2000 ORB (Dublin, Ireland, with U.S. headquarters in Waltham, MA). Glenn, GE Aircraft Engines, and Pratt & Whitney Aircraft are the initial industry partners contributing to the NPSS CORBASec test bed. The test bed uses Security SecurID (RSA Security Inc., Bedford, MA) two-factor token-based authentication together with Hitachi Security Service digital-certificate-based authentication to validate the various NPSS users. The test bed is expected to demonstrate NPSS CORBASec-specific policy functionality, confirm adequate performance, and validate the required Internet configuration in a distributed collaborative aerospace propulsion environment.
Old age income security in Canada.
Willard, J W
1965-10-09
The position of older people in modern industrial society is markedly removed from the early industrial norm of continued participation in gainful employment until the end of life. Acceptance of a retirement age some 13 years before the end of average male life expectancy has brought with it serious social problems. At the same time, however, an increasingly productive economy has provided both the willingness and ability to complement the retirement provisions of individual initiative with public programs of old age income maintenance. This public support began in Canada with the voluntary approach embodied in the government annuities plan. A program of "public assistance" followed. These were succeeded, first, by the "universal payment" under the Old Age Security Act and, more recently, by the social insurance approach of the Canada Pension Plan. Along with improved public support, the role of occupational pension plans and of individually initiated retirement provisions continues to be substantial. Current interest in, and in some cases legislation on, such problems as vesting and solvency are leading to improvements in private pension programs.
2003-01-01
Unclassified 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Hart, Sandra G ; Drury , Colin G ; Hancock, Peter A ; Szalma, James...interventions, thereby improving threat inspection and, ultimately, homeland security. n For more information please contact: Colin G. Drury , Ph.D. University...at Buffalo, SUNY Department of Industrial Engineering 342 Bell Hell Hall Buffalo, NY 14260 A Unified Model of Security Inspection Colin G. Drury
20 CFR 404.1408 - Compensation to be treated as wages.
Code of Federal Regulations, 2010 CFR
2010-04-01
... DISABILITY INSURANCE (1950- ) Interrelationship of Old-Age, Survivors and Disability Insurance Program With... industry are considered to be employment as defined in section 210 of the Social Security Act (see § 404...
Social Security and Social Welfare Indicators
ERIC Educational Resources Information Center
Merriam, Ida C.
1978-01-01
Examines the resources devoted by the United States to public social welfare programs. Compares these expenditures with those by other industrial nations and notes possible future trends. For journal availability, see SO 506 144. (Author/DB)
75 FR 67711 - International Energy Agency Meetings
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-03
... DEPARTMENT OF ENERGY International Energy Agency Meetings AGENCY: Department of Energy. ACTION: Notice of meetings. SUMMARY: The Industry Advisory Board (IAB) to the International Energy Agency (IEA... Security Programs, Department of Energy, 1000 [[Page 67712
Capital Requirements for the Air Transport Industry
NASA Technical Reports Server (NTRS)
James, G. W.
1972-01-01
In recent years the U.S. scheduled airline industry has been involved in the largest re-equipment program that involves the addition of hundreds of new aircraft to the airline fleet. The costs associated with the purchase of this new equipment, along with the other costs involving such matters as the environment and security, are presenting the carriers with significant financial challenges.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson; Mark Schanfein; Trond Bjornard
2011-07-01
Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's abilitymore » to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hund, Gretchen
For the past decade, a team at the Pacific Northwest National Laboratory (PNNL) has engaged industry to “go beyond compliance” in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices in order to understand their business and to build awareness around best practicesmore » to ensure security of goods and information along their supply chains. As a result, PNNL has identified seven indicators that a company can adopt as part of their commitment to nonproliferation ideals.« less
17 CFR 229.801 - Securities Act industry guides.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...
17 CFR 229.801 - Securities Act industry guides.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...
17 CFR 229.801 - Securities Act industry guides.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...
17 CFR 229.801 - Securities Act industry guides.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...
Development of a security vulnerability assessment process for the RAMCAP chemical sector.
Moore, David A; Fuller, Brad; Hazzan, Michael; Jones, J William
2007-04-11
The Department of Homeland Security (DHS), Directorate of Information Analysis & Infrastructure Protection (IAIP), Protective Services Division (PSD), contracted the American Society of Mechanical Engineers Innovative Technologies Institute, LLC (ASME ITI, LLC) to develop guidance on Risk Analysis and Management for Critical Asset Protection (RAMCAP). AcuTech Consulting Group (AcuTech) has been contracted by ASME ITI, LLC, to provide assistance by facilitating the development of sector-specific guidance on vulnerability analysis and management for critical asset protection for the chemical manufacturing, petroleum refining, and liquefied natural gas (LNG) sectors. This activity involves two key tasks for these three sectors: Development of a screening to supplement DHS understanding of the assets that are important to protect against terrorist attack and to prioritize the activities. Development of a standard security vulnerability analysis (SVA) framework for the analysis of consequences, vulnerabilities, and threats. This project involves the cooperative effort of numerous leading industrial companies, industry trade associations, professional societies, and security and safety consultants representative of those sectors. Since RAMCAP is a voluntary program for ongoing risk management for homeland security, sector coordinating councils are being asked to assist in communicating the goals of the program and in encouraging participation. The RAMCAP project will have a profound and positive impact on all sectors as it is fully developed, rolled-out and implemented. It will help define the facilities and operations of national and regional interest for the threat of terrorism, define standardized methods for analyzing consequences, vulnerabilities, and threats, and describe best security practices of the industry. This paper will describe the results of the security vulnerability analysis process that was developed and field tested for the chemical manufacturing sector. This method was developed through the cooperation of the many organizations and the individuals involved from the chemical sector RAMCAP development activities. The RAMCAP SVA method is intended to provide a common basis for making vulnerability assessments and risk-based decisions for homeland security. Mr. Moore serves as the coordinator for the chemical manufacturing, petroleum refining, and LNG sectors for the RAMCAP project and Dr. Jones is the chief technology officer for ASME-ITI, LLC for RAMCAP.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burger, J.R.
Loss control, both as a phrase and a concept, isn't used very widely in the U.S. coal industry although a U.S. manufacturer has cut accidents 71% and increased productivity 40% using the system. Safety is a part of the loss control concept, but it goes beyond traditional accident and illness prevention to become management control of anything that can result in loss or property damage. This includes what ILCI calls incidents, that is, ''any undesired or unwanted event that could (or does) degrade the efficiency of the business operation.'' These incidents could be accidents, quality or production problems, or evenmore » security breaches (such as thefts). So while safety is always a basic element-loss control also includes absenteeism control, security, fire prevention and industrial hygiene, since they're all interrelated disciplines for reducing loss. A baseline evaluation is followed by recommendations and guidance in self-sustaining corrective measures. This program would cost about $3,500 the first year. Possibly this approach is not used in the U.S. because miners feel that with all the legislation and regulation of the industry no further program is needed.« less
49 CFR 8.31 - Industrial security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 1 2011-10-01 2011-10-01 false Industrial security. 8.31 Section 8.31.../ACCESS Access to Information § 8.31 Industrial security. (a) Background. The National Industrial Security... classified pursuant to Executive Order 12356 of April 2, 1982, National Security Information, or its...
49 CFR 8.31 - Industrial security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 1 2012-10-01 2012-10-01 false Industrial security. 8.31 Section 8.31.../ACCESS Access to Information § 8.31 Industrial security. (a) Background. The National Industrial Security... classified pursuant to Executive Order 12356 of April 2, 1982, National Security Information, or its...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-23
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70228; File No. 4-663] Program for Allocation of Regulatory Responsibilities Pursuant to Rule 17d-2; Order Approving and Declaring Effective a Plan..., Inc. and the Topaz Exchange, LLC August 19, 2013. On July 2, 2013, the Financial Industry Regulatory...
NASA Technical Reports Server (NTRS)
Lytle, John
2001-01-01
This report provides an overview presentation of the 2000 NPSS (Numerical Propulsion System Simulation) Review and Planning Meeting. Topics include: 1) a background of the program; 2) 1999 Industry Feedback; 3) FY00 Status, including resource distribution and major accomplishments; 4) FY01 Major Milestones; and 5) Future direction for the program. Specifically, simulation environment/production software and NPSS CORBA Security Development are discussed.
Rural War Production Training Program. Final Report. Bulletin, 1946, No. 11
ERIC Educational Resources Information Center
US Office of Education, Federal Security Agency, 1946
1946-01-01
The Rural War Production Training Program was inaugurated at the beginning of the war primarily to provide training in elementary skills to farm youth not needed on farms, sufficient to enable them to secure employment in defense industries. Needs changed, however, and the production of food crops throughout the Nation adequate to feed ourselves,…
I-WASTE: EPA's Suite of Homeland Security Decision Support ...
In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major disasters, and other emergencies. A significant component of responding to and recovering from wide-area or isolated events, whether natural, accidental, or intentional, is the management of waste resulting from the incident itself or from activities cleaning up after the incident. To facilitate the proper management of incident-derived waste, EPA developed the Incident Waste Assessment and Tonnage Estimator (I-WASTE). I-WASTE was developed by the U.S. EPA’s Homeland Security Research Program in partnership with EPA program and regional offices, other U.S. government agencies, industry, and state and local emergency response programs. Presenting the disaster waste tool at the ORD Tools Café held in EPA Region 7th on Dec 9th.
The Iran Nuclear Crisis: An Update
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sagan, Scott
2007-05-07
Will Iran develop nuclear weapons capabilities and what effects would such capabilities have on international peace and security? Despite two recent U.N. Security Council resolutions sanctioning Iran for its nuclear activities, the government in Tehran continues to press ahead with efforts to expand its uranium enrichment program to industrial scale. But both the Tehran regime and the Iranian people remain divided on the nuclear question, creating opportunities for a negotiated settlement. It is essential for US security that the Iranian program be contained, for nuclear weapons in Iran would increase risks of regional instability, terrorist use, and further proliferation. Themore » U.S. and its negotiating partners have already missed a number of potential opportunities for a diplomatic breakthrough, but the right mix of incentives designed to address the reasons driving Iran’s nuclear program could still succeed in producing an acceptable outcome.« less
78 FR 36542 - International Energy Agency Meetings
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-18
... DEPARTMENT OF ENERGY International Energy Agency Meetings AGENCY: Department of Energy. ACTION: Notice of meetings. SUMMARY: The Industry Advisory Board (IAB) to the International Energy Agency (IEA.... Clark, Assistant General Counsel for International and National Security Programs, Department of Energy...
NASA Astrophysics Data System (ADS)
Apriyanti, Dwi; Nugrahanto, Aris Ida; Shrestha, Sanjaya
2018-02-01
Energy consumption in the industrial sector in Indonesia is increasing as a result of population and economic growth. The government is aware of this and seeks the answer to improve industrial competitiveness and increase energy security through energy efficiency programs. Some industries have implemented energy efficiency programs as ad-hoc, but have not applied systematically, so the results are not optimal. Through the cooperation of the Ministry of Energy and Mineral Resources (ESDM) with the United Nations Industrial Development Organization (UNIDO), there has been training and mentoring activities for industry on Energy Management System (EnMS) based on SNI ISO 50001. Based on the results of identification through survey conducted to 226 industry that has attended the training and 64 industries that have been trained and received assistance, obtained data that 45% of industries have fully adopted EnMS SNI ISO 50001, 17% industry has adopted a part of EnMS SNI ISO 50001 and 38% industry does not adopt EnMS SNI ISO 50001 altogether.
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)
2003-01-01
The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote access from outside of NASA centers. A SAFE enabled IPG can enable IPG capabilities to be available to NASA mission design teams across different NASA center and partner company firewalls. This paper will first discuss some of the potential security issues for IPG to work across NASA center firewalls. We will then present the SAFE federated security model. Finally we will present the concept of the architecture of a SAFE enabled IPG and how it can benefit NASA mission development.
Air Markets Program Data (AMPD)
The Air Markets Program Data tool allows users to search EPA data to answer scientific, general, policy, and regulatory questions about industry emissions. Air Markets Program Data (AMPD) is a web-based application that allows users easy access to both current and historical data collected as part of EPA's emissions trading programs. This site allows you to create and view reports and to download emissions data for further analysis. AMPD provides a query tool so users can create custom queries of industry source emissions data, allowance data, compliance data, and facility attributes. In addition, AMPD provides interactive maps, charts, reports, and pre-packaged datasets. AMPD does not require any additional software, plug-ins, or security controls and can be accessed using a standard web browser.
76 FR 69714 - International Energy Agency Meetings
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-09
... DEPARTMENT OF ENERGY International Energy Agency Meetings AGENCY: Department of Energy. ACTION: Notice of Meetings. SUMMARY: The Industry Advisory Board (IAB) to the International Energy Agency (IEA... Security Programs, Department of Energy, 1000 Independence Avenue SW., Washington, DC 20585, (202) 586-3417...
76 FR 14003 - International Energy Agency Meetings
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-15
... DEPARTMENT OF ENERGY International Energy Agency Meetings AGENCY: Department of Energy. ACTION: Notice of meetings. SUMMARY: The Industry Advisory Board (IAB) to the International Energy Agency (IEA... National Security Programs, Department of Energy, 1000 Independence Avenue, SW., Washington, DC 20585, 202...
75 FR 12532 - International Energy Agency Meetings
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-16
... DEPARTMENT OF ENERGY International Energy Agency Meetings AGENCY: Department of Energy. ACTION: Notice of meetings. SUMMARY: The Industry Advisory Board (IAB) to the International Energy Agency (IEA...: Diana D. Clark, Assistant General for International and National Security Programs, Department of Energy...
Old Age Income Security in Canada
Willard, J. W.
1965-01-01
The position of older people in modern industrial society is markedly removed from the early industrial norm of continued participation in gainful employment until the end of life. Acceptance of a retirement age some 13 years before the end of average male life expectancy has brought with it serious social problems. At the same time, however, an increasingly productive economy has provided both the willingness and ability to complement the retirement provisions of individual initiative with public programs of old age income maintenance. This public support began in Canada with the voluntary approach embodied in the government annuities plan. A program of “public assistance” followed. These were succeeded, first, by the “universal payment” under the Old Age Security Act and, more recently, by the social insurance approach of the Canada Pension Plan. Along with improved public support, the role of occupational pension plans and of individually initiated retirement provisions continues to be substantial. Current interest in, and in some cases legislation on, such problems as vesting and solvency are leading to improvements in private pension programs. PMID:5828720
15 CFR 700.72 - Compulsory process.
Code of Federal Regulations, 2010 CFR
2010-01-01
... OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS..., in the judgment of the Director of the Office of Strategic Industries and Economic Security, U.S. Department of Commerce, in consultation with the Chief Counsel for Industry and Security, U.S. Department of...
Use of IPsec by Manned Space Missions
NASA Technical Reports Server (NTRS)
Pajevski, Michael J.
2009-01-01
NASA's Constellation Program is developing its next generation manned space systems for missions to the International Space Station (ISS) and the Moon. The Program is embarking on a path towards standards based Internet Protocol (IP) networking for space systems communication. The IP based communications will be paired with industry standard security mechanisms such as Internet Protocol Security (IPsec) to ensure the integrity of information exchanges and prevent unauthorized release of sensitive information in-transit. IPsec has been tested in simulations on the ground and on at least one Earth orbiting satellite, but the technology is still unproven in manned space mission situations and significant obstacles remain.
15 CFR 700.80 - Adjustments or exceptions.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS... exceptions. (a) A person may submit a request to the Office of Strategic Industries and Economic Security, U... interim relief is granted in writing by the Office of Strategic Industries and Economic Security. (d) A...
2000-10-01
As a result of hospital budget-cutting, the healthcare industry is losing many of its best security directors and managers, some experts warn. This loss is extending to the reduction of security officer complements, partially due to an "overdependence" on technology. And it's not only personnel who are being cut, but training programs as well. In this report, we'll give details on the current trend, its dangers to patient protection, and what changes can be made to operate more effectively in the current economic environment.
78 FR 63232 - President's National Security Telecommunications Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-23
... Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. ACTION: Committee... Telecommunications Advisory Committee (NSTAC) will meet on Wednesday, November 20, 2013. The meeting will be open to... preparedness (NS/EP) telecommunications policy. During the meeting, the Industrial Internet Subcommittee Co...
17 CFR 229.801 - Securities Act industry guides.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Securities Act industry guides... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry... claims and claim adjustment expenses of property-casualty insurance underwriters. (g) Guide 7...
48 CFR 225.872-7 - Industrial security for qualifying countries.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Industrial security for... Agreements and Coordination 225.872-7 Industrial security for qualifying countries. The required procedures... qualifying country sources are in the DoD Industrial Security Regulation DoD 5220.22-R (implemented for the...
2006-12-01
of providing nuclear power. Once you have the nuclear weapons, they require a delivery system resulting in a missile program. It is afforded higher...out that some domestic advancements may be made in certain sectors, such as nuclear bombs and missiles, because resources may be spent on narrowly...capital, fighter, aviation, nuclear weapons, missiles 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION
Securing insurance protection against fraud and abuse liability.
Callison, S
1999-07-01
Healthcare organizations concerned about corporate compliance need to review securing appropriate insurance coverage as part of their corporate compliance program. Provider organizations often mistakenly expect that their directors and officers liability (D&O), malpractice, or standard errors and omissions (E&O) insurance policies will cover the cost of Medicare fraud and abuse fines. The insurance industry has developed a specific billing E&O insurance product to cover providers that run afoul of government fraud and abuse statutes.
ERIC Educational Resources Information Center
Hinojosa, Trisha; Miller, Shazia; Swanlund, Andrew; Hallberg, Kelly; Brown, Megan; O'Brien, Brenna
2010-01-01
The Stock Market Game[TM] is an educational program supported by the Securities Industry and Financial Markets Association (SIFMA) Foundation for Investor Education. The program is designed to teach students the importance of saving and investing by building their financial literacy skills. The primary focus of the study was to measure the impact…
Industrial Technologies Program - Manufacturing Workforce for a Clean Energy Economy (Green Jobs)
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2010-05-01
Making the transition to a clean energy economy will strengthen our energy security, improve the environment, and create jobs. In 2009, Congress passed a stimulus package to help jump-start all sectors of the U.S. economy and accelerate this transition.
78 FR 64287 - Voluntary Intermodal Sealift Agreement Open Season
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-28
... program. Participants operating vessels in international trade may receive top tier consideration in the... clearance process with DSS. Participants must have a FCL and security clearances at a minimum of SECRET.../intermodal service and resource requirements against industry commitments. JPAG meetings are often SECRET...
75 FR 10529 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-08
... Securities Law Practitioners, Securities Law Professors and Securities Industry Participants. The..., Securities Law Professors and Securities Industry Participants. The total estimated reporting burden of the...
1983-05-01
THE ARMED FORCES AREA 6 WORK UNIT NUMBERS -. FORT LESLEY J. MC NAIR WASHINGTON, DC 20319 11. CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE "Vt...yearly dollar volume and lead directly to cost- effective .- national security. Such business generates research funding that can have important military...Mbreover, there is no central focus for these policies and no foru to discuss their effect on national security and international catetiiveness. The
Industrial Sites - An Approach to Closure
None
2018-01-16
The Environmental Management (EM) Program at the Nevada Site Office was created by the U.S. Department of Energy (DOE) to address the environmental legacy of contamination resulting from more than 50 years of nuclear weapons research, production and testing. The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NSO) is responsible for remediating portions of the Nevada National Security Site (formerly the Nevada Test Site) and the Tonopah Test Range, which is within the Nevada Test and Training Range.
2011-06-01
Remote sensing from space provides critical data for many commercial space applications. Due to global market demand, it has undergone tremendous...commercial space imaging capability in the future, remote sensing policy makers, systems engineers, and industry analysts must be aware of the implications to United States National Security....available dissemination and accessibility. The analysis results, together with the findings from a review of commercial programs, initiatives, and remote
Plastics & Composites Technology Needs Assessment.
ERIC Educational Resources Information Center
Oakland Community Coll., Farmington, MI. Office of Institutional Planning and Analysis.
In 1991, a study was conducted by Oakland Community College (OCC) to evaluate the need for a proposed plastics and composites technology program for design engineers. General information was obtained through a literature search, from the Society of the Plastics Industry, Inc., the Michigan Employment Security Commission, and interviews with…
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
DOE-EERE's Bioenergy Technologies Office (BETO) works to accelerate the development of a sustainable, cost-competitive, advanced biofuel industry that can strengthen U.S. energy security, environmental quality, and economic vitality, through research, development, and demonstration projects in partnership with industry, academia, and national laboratory partners. BETO’s Advanced Algal Systems Program (also called the Algae Program) has a long-term applied research and development (R&D) strategy to increase the yields and lower the costs of algal biofuels. The team works with partners to develop new technologies, to integrate technologies at commercially relevant scales, and to conduct crosscutting analyses to better understand the potential andmore » challenges of the algal biofuels industry. Research has indicated that this industry is capable of producing billions of gallons of renewable diesel, gasoline, and jet fuels annually. R&D activities are integrated with BETO’s longstanding effort to accelerate the commercialization of lignocellulosic biofuels.« less
Instrumentation, Control, and Intelligent Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2005-09-01
Abundant and affordable energy is required for U.S. economic stability and national security. Advanced nuclear power plants offer the best near-term potential to generate abundant, affordable, and sustainable electricity and hydrogen without appreciable generation of greenhouse gases. To that end, Idaho National Laboratory (INL) has been charged with leading the revitalization of nuclear power in the U.S. The INL vision is to become the preeminent nuclear energy laboratory with synergistic, world-class, multi-program capabilities and partnerships by 2015. The vision focuses on four essential destinations: (1) Be the preeminent internationally-recognized nuclear energy research, development, and demonstration laboratory; (2) Be a majormore » center for national security technology development and demonstration; (3) Be a multi-program national laboratory with world-class capabilities; (4) Foster academic, industry, government, and international collaborations to produce the needed investment, programs, and expertise. Crucial to that effort is the inclusion of research in advanced instrumentation, control, and intelligent systems (ICIS) for use in current and advanced power and energy security systems to enable increased performance, reliability, security, and safety. For nuclear energy plants, ICIS will extend the lifetime of power plant systems, increase performance and power output, and ensure reliable operation within the system's safety margin; for national security applications, ICIS will enable increased protection of our nation's critical infrastructure. In general, ICIS will cost-effectively increase performance for all energy security systems.« less
NASA Technical Reports Server (NTRS)
Iannicca, Dennis C.; Ishac, Joseph A.; Shalkhauser, Kurt A.
2015-01-01
NASA Glenn Research Center (GRC), in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the Federal Aviation Administration (FAA) and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the GRC prototype CNPC architecture as a demonstration platform. The proposed security controls were integrated into the GRC flight test system aboard our S-3B Viking surrogate aircraft and several network tests were conducted during a flight on November 15th, 2014 to determine whether the controls were working properly within the flight environment. The flight test was also the first to integrate Robust Header Compression (ROHC) as a means of reducing the additional overhead introduced by the security controls and Mobile IPv6. The effort demonstrated the complete end-to-end secure CNPC link in a relevant flight environment.
Department of Defense Chemical and Biological Defense Program. Annual Report to Congress
2008-05-01
defense system acquisition costs through collaboration in the areas of development, production , and support, and to enhance interoperability with...security area leverages S&T efforts of the other product areas. Where unmet requirements are identified and where S&T is required to meet cost ...Defense Program Inventory Requirements The industrial base, which has scaled down since the end of the Cold War, has stabilized. Ongoing military
NASA wiring for space applications program
NASA Technical Reports Server (NTRS)
Schulze, Norman
1995-01-01
An overview of the NASA Wiring for Space Applications Program and its relationship to NASA's space technology enterprise is given in viewgraph format. The mission of the space technology enterprise is to pioneer, with industry, the development and use of space technology to secure national economic competitiveness, promote industrial growth, and to support space missions. The objectives of the NASA Wiring for Space Applications Program is to improve the safety, performance, and reliability of wiring systems for space applications and to develop improved wiring technologies for NASA flight programs and commercial applications. Wiring system failures in space and commercial applications have shown the need for arc track resistant wiring constructions. A matrix of tests performed versus wiring constructions is presented. Preliminary data indicate the performance of the Tensolite and Filotex hybrid constructions are the best of the various candidates.
Automotive Stirling engine Market and Industrial Readiness Program (MIRP), phase 1
NASA Astrophysics Data System (ADS)
1982-05-01
A program, begun in 1978, has the goal of transferring Stirling engine technology from United Stirling of Sweden to the US and, then, following design, fabrication, and prototype testing, to secure US manufacturers for the engine. The ultimate objective is the large-scale commercial use of the Automotive Stirling Engine (ASE) by the year 2000. The fist phase of the Market and Industrial Readiness Program for the ASE was concerned with defining the market, product, economic and technical factors necessary to be addressed to assure a reasonable chance of ultimate commercial acceptance. Program results for this first phase are reported and discussed. These results pertain to licensing strategy development, economic analysis, market factors, product planning, market growth, cost studies, and engine performance as measured by fuel economy using conventional fuels and by vehicle speed and acceleration characteristics.
Sharing Ideas: Tough Times Encourage Colleges to Collaborate
ERIC Educational Resources Information Center
Fain, Paul; Blumenstyk, Goldie; Sander, Libby
2009-01-01
Tough times are encouraging colleges to share resources in a variety of areas, including campus security, research, and degree programs. Despite its veneer of cooperation, higher education is a competitive industry, where resource sharing is eyed warily. But the recession is chipping away at that reluctance, and institutions are pursuing…
32 CFR 2004.11 - Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)].
Code of Federal Regulations, 2014 CFR
2014-07-01
..., or Guidelines [102(b)(3)]. 2004.11 Section 2004.11 National Defense Other Regulations Relating to... NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Implementation and Oversight § 2004.11 Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)]. (a) Reviews and Updates. All implementing...
32 CFR 2004.11 - Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)].
Code of Federal Regulations, 2012 CFR
2012-07-01
..., or Guidelines [102(b)(3)]. 2004.11 Section 2004.11 National Defense Other Regulations Relating to... NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Implementation and Oversight § 2004.11 Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)]. (a) Reviews and Updates. All implementing...
32 CFR 2004.11 - Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)].
Code of Federal Regulations, 2013 CFR
2013-07-01
..., or Guidelines [102(b)(3)]. 2004.11 Section 2004.11 National Defense Other Regulations Relating to... NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Implementation and Oversight § 2004.11 Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)]. (a) Reviews and Updates. All implementing...
32 CFR 2004.11 - Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)].
Code of Federal Regulations, 2011 CFR
2011-07-01
..., or Guidelines [102(b)(3)]. 2004.11 Section 2004.11 National Defense Other Regulations Relating to... NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Implementation and Oversight § 2004.11 Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)]. (a) Reviews and Updates. All implementing...
The Industrial Base and National Security: A New Strategy
1993-04-01
addresses this issue in her article entitled, " Managing Innovation on the Factory Floor": Manufacturing managers often buy the most advanced...Incentives Program." Government Contract Number MDA903-85-C-0139 Final Report, 1986. 31 11. Tyre, Marcie J. " Managing Innovation On The Factory Floor
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-20
... American Stock Exchange LLC, BATS Exchange, Inc., BATS Y-Exchange, Inc., Chicago Board Options Exchange, Incorporated, Chicago Stock Exchange, Inc., EDGA Exchange, Inc., EDGX Exchange, Inc., Financial Industry Regulatory Authority, Inc., International Securities Exchange, LLC, The NASDAQ Stock Market LLC, National...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-22
... American Stock Exchange LLC, BATS Exchange, Inc., Chicago Board Options Exchange, Incorporated, Chicago Stock Exchange, Inc., EDGA Exchange, Inc., EDGX Exchange, Inc., Financial Industry Regulatory Authority, Inc., International Securities Exchange, LLC, The NASDAQ Stock Market LLC, National Stock Exchange...
15 CFR 705.10 - Report of an investigation and recommendation.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.10 Report of an..., will be available for public inspection and copying in the Bureau of Industry and Security Freedom of...
Accelerator-driven Medical Sterilization to Replace Co-60 Sources
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kroc, Thomas K.; Thangaraj, Jayakar C.T.; Penning, Richard T.
This report documents the results of a study prepared at the request of the Office of Radiological Security of the National Nuclear Security Administration (NNSA), as part of the Domestic Protect and Reduce mission by the Illinois Accelerator Research Center (IARC) of Fermi National Accelerator Laboratory. The study included a literature survey of over 80 relevant documents and articles including industry standards, regulatory documents, technical papers, a court case, previous task force reports and industry white papers. The team also conducted interviews or had conversations with over 40 individuals representing over a dozen organizations over the course of its 10-monthmore » program. This report summarizes our findings, addresses the specific questions posed to us by NNSA, and concludes with a list of actionable recommendations.« less
17 CFR 229.802 - Exchange Act industry guides.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...
17 CFR 229.802 - Exchange Act industry guides.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...
17 CFR 229.802 - Exchange Act industry guides.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...
17 CFR 229.802 - Exchange Act industry guides.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...
17 CFR 229.802 - Exchange Act industry guides.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...
33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.
Code of Federal Regulations, 2010 CFR
2010-07-01
... stores and industrial supplies. (a) General. The OCS facility owner or operator must ensure that security...). These additional security measures may include: (1) Intensifying inspection of the stores or industrial... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for delivery of...
Coast Guard Deepwater Acquisition Programs: Background, Oversight Issues, and Options for Congress
2009-10-23
NUMBER 5e . TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Congressional Research Service,The Library of...role to Integrated Coast Guard Systems (ICGS)—an industry team led by Lockheed Martin and Northrop Grumman Ship Systems ( NGSS ). ICGS was awarded an...icebreaker sustainment is not a Deepwater program but is displayed to align with the FY2009 Consolidated Security, Disaster Assistance, and
Coast Guard Deepwater Acquisition Programs: Background, Oversight Issues, and Options for Congress
2009-07-22
NUMBER 5e . TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Congressional Research Service,Library of Congress,101...an industry team led by Lockheed Martin and Northrop Grumman Ship Systems ( NGSS ). ICGS was awarded an indefinite delivery, indefinite quantity (ID...program but is displayed to align with the FY2009 Consolidated Security, Disaster Assistance, and Continuing Appropriations Act, P.L. 110-329.” b
Code of Federal Regulations, 2010 CFR
2010-01-01
... AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS REPORTING OF... designated the Bureau of Industry and Security as the organization responsible for implementing this... offset transactions on the defense preparedness, industrial competitiveness, employment, and trade of the...
15 CFR 730.9 - Organization of the Bureau of Industry and Security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false Organization of the Bureau of Industry... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS GENERAL INFORMATION § 730.9 Organization of the Bureau of Industry and Security. The head of the...
15 CFR 730.9 - Organization of the Bureau of Industry and Security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 15 Commerce and Foreign Trade 2 2014-01-01 2014-01-01 false Organization of the Bureau of Industry... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS GENERAL INFORMATION § 730.9 Organization of the Bureau of Industry and Security. The head of the...
15 CFR 730.9 - Organization of the Bureau of Industry and Security.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 15 Commerce and Foreign Trade 2 2012-01-01 2012-01-01 false Organization of the Bureau of Industry... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS GENERAL INFORMATION § 730.9 Organization of the Bureau of Industry and Security. The head of the...
A threat intelligence framework for access control security in the oil industry
NASA Astrophysics Data System (ADS)
Alaskandrani, Faisal T.
The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.
1980-01-01
TECHNIQUES IMPROVING RAPIDLY C-7 INDUSTRY THRUSTS IN 70s DRIVING FORCE : IMPROVE PRODUCT QUALITY * EASE MAINTENANCE, MODIFICATION IMPROVE PERFORMANCE...together a task force to make recommendations on what we should be doing about computer secur- ity. Other members of the task force came from both our...of the marketing task force mostly echoed and endorsed the user’s report. Both reports were issued in March of 1973. Notice that DoD 5200.28 had just
The FY 1983 Department of Defense Program for Research, Development, and Acquisition
1982-03-02
TRANSFER Arms transfers and technology sharing play an increasingly vital role in international relations and the U.S. has major security interests in such...Funding---------------IV-6 6. Government/Industry Relations -----------------------IV-7 C. CONCLUSIONS ------------------------------------------- IV-8 V... INTERNATIONAL ACTIVITIES------------------------------------ V-1 A. INTRODUCTION ------------------------------------------ V-1 B. DIRECTIONS AND
National Security Assessment of the U.S. Cartridge and Propellant Actuated Device Industry
2006-08-01
reauthorized again through September 30, 2008, by the Small Business Reauthorization Act of 2000 (P.L. 106 -554). The program funds small businesses trying to...assembly such as PBXN -7, black powder, plastics (due to hurricane Katrina), and metal cartridges. As was the case five years ago, RD1333 and
2008-06-01
14] Mark Weiser. Program slicing. Trans. Software Engineering , July 1984. 17 ...entitled “Perpetually Available and Secure In- formation Systems”, the Software Industry Center at CMU and its sponsors, especially the Alfred P. Sloan...ERL In Acme, a software architect can choose to associate a handwritten error message to each specification. If the specification fails, for any
NASA Technical Reports Server (NTRS)
Logsdon, John M. (Editor); Day, Dwayne A. (Editor); Launius, Roger D. (Editor)
1996-01-01
The documents selected for inclusion in this volume are presented in three chapters, each covering a particular aspect of the evolution of U.S. space exploration. These chapters address (1) the relations between the civilian space program of the United States and the space activities of other countries, (2) the relations between the U.S. civilian space program and the space efforts of national security organizations and the military, and (3) NASA's relations with industry and academic institutions.
Coast Guard Deepwater Acquisition Programs: Background, Oversight Issues, and Options for Congress
2009-05-29
NUMBER 5e . TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Congressional Research Service,Library of Congress,101...Guard awarded the role to Integrated Coast Guard Systems (ICGS)—an industry team led by Lockheed Martin and Northrop Grumman Ship Systems ( NGSS ...states that “Polar icebreaker sustainment is not a Deepwater program but is displayed to align with the FY2009 Consolidated Security, Disaster
15 CFR 705.7 - Conduct of an investigation.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS... and copying in the Bureau of Industry and SecurityFreedom of Information Records Inspection Facility... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Conduct of an investigation. 705.7...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-29
...] Guidance for Industry on Standards for Securing the Drug Supply Chain--Standardized Numerical... industry entitled ``Standards for Securing the Drug Supply Chain-Standardized Numerical Identification for... the Drug Supply Chain-Standardized Numerical Identification for Prescription Drug Packages.'' In the...
NASA Astrophysics Data System (ADS)
Frühwirth, Christian
Industry managers have long recognized the vital importance of information security for their businesses, but at the same time they perceived security as a technology-driven rather then a business-driven field. Today, this notion is changing and security management is shifting from technology- to business-oriented approaches. Whereas there is evidence of this shift in the literature, this paper argues that security standards and academic work have not yet taken it fully into account. We examine whether this disconnect has lead to a misalignment of IT security requirements in businesses versus industry standards and academic research. We conducted 13 interviews with practitioners from 9 different firms to investigate this question. The results present evidence for a significant gap between security requirements in industry standards and actually reported security vulnerabilities. We further find mismatches between the prioritization of security factors in businesses, standards and real-world threats. We conclude that security in companies serves the business need of protecting information availability to keep the business running at all times.
Cyber security best practices for the nuclear industry
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badr, I.
2012-07-01
When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)
IMPACTS Results Summary for CY 2010
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weakley, Steven A.
Working in partnership with industry, the U.S. Department of Energy’s (DOE’s) Advanced Manufacturing Office (AMO) is helping reduce industrial energy use, carbon emissions, and waste while boosting productivity and economic competitiveness. Operating within the Office of Energy Efficiency and Renewable Energy (EERE), ITP conducts research, development, and demonstration (RD&D) projects and technology transfer activities that are producing substantial benefits to industry and helping the nation to address some of its biggest challenges in the areas of energy security and environmental performance. This document summarizes some of the impacts of ITP’s programs through 2010. The selection of 2010 as the timeframemore » for this report recognizes the fact that it takes at least two years to gain a full perspective on program performance and to assess the results of commercialization efforts for the technologies and practices at issue.« less
A tainted trade? Moral ambivalence and legitimation work in the private security industry.
Thumala, Angélica; Goold, Benjamin; Loader, Ian
2011-06-01
The private security industry is often represented - and typically represents itself - as an expanding business, confident of its place in the world and sure of its ability to meet a rising demand for security. But closer inspection of the ways in which industry players talk about its past, present and future suggests that this self-promotion is accompanied by unease about the industry's condition and legitimacy. In this paper, we analyse the self-understandings of those who sell security - as revealed in interviews conducted with key industry players and in a range of trade materials - in order to highlight and dissect the constitutive elements of this ambivalence. This analysis begins by describing the reputational problems that are currently thought to beset the industry and the underlying fears about its status and worth that these difficulties disclose. We then examine how security players seek to legitimate the industry using various narratives of professionalization. Four such narratives are identified - regulation, education, association and borrowing - each of which seeks to justify private security and enhance the industry's social worth. What is striking about these legitimation claims is that they tend not to justify the selling of security in market terms. In conclusion we ask why this is the case and argue that market justifications are 'closed-off' by a moral ambivalence that attaches to an industry trading in products which cannot guarantee to deliver the condition that its consumers crave. © London School of Economics and Political Science 2011.
75 FR 81152 - Export Control Modernization: Strategic Trade Authorization License Exception
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-27
... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Parts 732, 738, 740, 743, 758, and... Authorization License Exception AGENCY: Bureau of Industry and Security, Commerce. ACTION: Proposed rule..., Bureau of Industry and Security, Room 2705, U.S. Department of Commerce, Washington, DC 20230. Please...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-06
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70793; File No. S7-24-89] Joint Industry Plan..., Consolidation and Dissemination of Quotation and Transaction Information for Nasdaq-Listed Securities Traded on... Exchange, Inc., Financial Industry Regulatory Authority, Inc., International Securities Exchange LLC...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-04
... security screening procedures. If a foreign national wishes to participate in the public meeting, please..., Microsoft Word, PDF, or ASCII file format, and avoid the use of special characters or any form of encryption... that comments sent by mail are often delayed and may be damaged by mail screening processes.) Hand...
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
One of the Department of Energy’s (DOE) primary forums for helping state and local governments implement costeffective and productive energy systems for American homes, communities, businesses, and industries is the Weatherization and Intergovernmental Programs Office (WIP). WIP is part of DOE’s Office of Energy Efficiency and Renewable Energy’s “all of the above” national energy strategy to create greater energy affordability, security and resiliency.
Space station needs, attributes and architectural options. Volume 3, task 1: Mission requirements
NASA Technical Reports Server (NTRS)
1983-01-01
The mission requirements of the space station program are investigated. Mission parameters are divided into user support from private industry, scientific experimentation, U.S. national security, and space operations away from the space station. These categories define the design and use of the space station. An analysis of cost estimates is included.
A Resource Service Model in the Industrial IoT System Based on Transparent Computing.
Li, Weimin; Wang, Bin; Sheng, Jinfang; Dong, Ke; Li, Zitong; Hu, Yixiang
2018-03-26
The Internet of Things (IoT) has received a lot of attention, especially in industrial scenarios. One of the typical applications is the intelligent mine, which actually constructs the Six-Hedge underground systems with IoT platforms. Based on a case study of the Six Systems in the underground metal mine, this paper summarizes the main challenges of industrial IoT from the aspects of heterogeneity in devices and resources, security, reliability, deployment and maintenance costs. Then, a novel resource service model for the industrial IoT applications based on Transparent Computing (TC) is presented, which supports centralized management of all resources including operating system (OS), programs and data on the server-side for the IoT devices, thus offering an effective, reliable, secure and cross-OS IoT service and reducing the costs of IoT system deployment and maintenance. The model has five layers: sensing layer, aggregation layer, network layer, service and storage layer and interface and management layer. We also present a detailed analysis on the system architecture and key technologies of the model. Finally, the efficiency of the model is shown by an experiment prototype system.
A Resource Service Model in the Industrial IoT System Based on Transparent Computing
Wang, Bin; Sheng, Jinfang; Dong, Ke; Li, Zitong; Hu, Yixiang
2018-01-01
The Internet of Things (IoT) has received a lot of attention, especially in industrial scenarios. One of the typical applications is the intelligent mine, which actually constructs the Six-Hedge underground systems with IoT platforms. Based on a case study of the Six Systems in the underground metal mine, this paper summarizes the main challenges of industrial IoT from the aspects of heterogeneity in devices and resources, security, reliability, deployment and maintenance costs. Then, a novel resource service model for the industrial IoT applications based on Transparent Computing (TC) is presented, which supports centralized management of all resources including operating system (OS), programs and data on the server-side for the IoT devices, thus offering an effective, reliable, secure and cross-OS IoT service and reducing the costs of IoT system deployment and maintenance. The model has five layers: sensing layer, aggregation layer, network layer, service and storage layer and interface and management layer. We also present a detailed analysis on the system architecture and key technologies of the model. Finally, the efficiency of the model is shown by an experiment prototype system. PMID:29587450
15 CFR 700.14 - Preferential scheduling.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Industrial Priorities § 700.14 Preferential scheduling. (a) A...
Code of Federal Regulations, 2010 CFR
2010-01-01
... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.1 Definitions. As used in this part: Department means the...
1990-06-01
reader is cautioned that computer programs developed in this research may not have been exercised for all cases of interest. While every effort has been...Source of Funding Numbers _. Program Element No Project No I Task No I Work Unit Accession No 11 Title (Include security classflcation) APPLICATION OF...formats. Previous applications of these encoding formats were on industry standard computers (PC) over a 16-20 klIz channel. This report discusses the
NASA Technical Reports Server (NTRS)
Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.
2015-01-01
NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.
U.S. Space Policy and Space Industry Strangulation
2010-03-01
protecting U.S. national security, and creating an environment in which non-U.S. citizens can participate fully in the U.S. space industry. 14...still protecting U.S. national security, and creating an environment in which non-U.S. citizens can participate fully in the U.S. space industry...security, and creating and sustaining a globally competitive space industry. These realms are not mutually exclusive. If technologies are overly guarded
Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam
2017-01-01
Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.
NASA Astrophysics Data System (ADS)
Hamid, Nasri A.; Mujaini, Madihah; Mohamed, Abdul Aziz
2017-01-01
The Center for Nuclear Energy (CNE), College of Engineering, Universiti Tenaga Nasional (UNITEN) has a great responsibility to undertake educational activities that promote developing human capital in the area of nuclear engineering and technology. Developing human capital in nuclear through education programs is necessary to support the implementation of nuclear power projects in Malaysia in the near future. In addition, the educational program must also meet the nuclear power industry needs and requirements. In developing a certain curriculum, the contents must comply with the university's Outcomes Based Education (OBE) philosophy. One of the important courses in the nuclear curriculum is in the area of nuclear security. Basically the nuclear security course covers the current issues of law, politics, military strategy, and technology with regard to weapons of mass destruction and related topics in international security, and review legal regulations and political relationship that determine the state of nuclear security at the moment. In addition, the course looks into all aspects of the nuclear safeguards, builds basic knowledge and understanding of nuclear non-proliferation, nuclear forensics and nuclear safeguards in general. The course also discusses tools used to combat nuclear proliferation such as treaties, institutions, multilateral arrangements and technology controls. In this paper, we elaborate the development of undergraduate nuclear security course at the College of Engineering, Universiti Tenaga Nasional. Since the course is categorized as mechanical engineering subject, it must be developed in tandem with the program educational objectives (PEO) of the Bachelor of Mechanical Engineering program. The course outcomes (CO) and transferrable skills are also identified. Furthermore, in aligning the CO with program outcomes (PO), the PO elements need to be emphasized through the CO-PO mapping. As such, all assessments and distribution of Bloom Taxonomy levels are assigned in accordance with the CO-PO mapping. Finally, the course has to fulfill the International Engineering Alliance (IEA) Graduate Attributes of the Washington Accord.
Shift scheduling model considering workload and worker’s preference for security department
NASA Astrophysics Data System (ADS)
Herawati, A.; Yuniartha, D. R.; Purnama, I. L. I.; Dewi, LT
2018-04-01
Security department operates for 24 hours and applies shift scheduling to organize its workers as well as in hotel industry. This research has been conducted to develop shift scheduling model considering the workers physical workload using rating of perceived exertion (RPE) Borg’s Scale and workers’ preference to accommodate schedule flexibility. The mathematic model is developed in integer linear programming and results optimal solution for simple problem. Resulting shift schedule of the developed model has equally distribution shift allocation among workers to balance the physical workload and give flexibility for workers in working hours arrangement.
33 CFR 165.1121 - Security Zone: Fleet Supply Center Industrial Pier, San Diego, CA.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Center Industrial Pier, San Diego, CA. 165.1121 Section 165.1121 Navigation and Navigable Waters COAST... Guard District § 165.1121 Security Zone: Fleet Supply Center Industrial Pier, San Diego, CA. (a) Location. The following area is a security zone: the waters of San Diego Bay extending approximately 100...
75 FR 2435 - Addition to the List of Validated End-Users in the People's Republic of China (PRC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-15
... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 748 [Docket No. 0908111226... (PRC) AGENCY: Bureau of Industry and Security, Commerce. ACTION: Final rule. SUMMARY: In this final rule, the Bureau of Industry and Security (BIS) amends the Export Administration Regulations (EAR) to...
15 CFR 705.3 - Commencing an investigation.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.3 Commencing an investigation. (a) Upon... the effect on the national security of the imports of any article. (b) The Secretary shall immediately...
Do You Take Credit Cards? Security and Compliance for the Credit Card Payment Industry
ERIC Educational Resources Information Center
Willey, Lorrie; White, Barbara Jo
2013-01-01
Security is a significant concern in business and in information systems (IS) education from both a technological and a strategic standpoint. Students can benefit from the study of information systems security when security concepts are introduced in the context of real-world industry standards. The development of a data security standard for…
Ninth Semiannual Report of the Commission to the Congress, July - December 1950. January 1951
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dean, Gordon; Glennan, T. Keith; Murray, Thomas E.
1951-01-31
The document represents the ninth semiannual Atomic Energy Commission (AEC) report to Congress. The report sums up the major activities and developments in the national atomic energy program. This ninth report gives a summary of the year's program operations insofar as they can be reported within the limits of national security. It provides as well a brief review of the methods which the Commission follows in contracting with industries, research institutions, and with universities and colleges for the carrying on of the many phases of the national atomic energy program.
15 CFR 700.17 - Use of rated orders.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Industrial Priorities § 700.17 Use of rated orders. (a) A person...
15 CFR 700.10 - Delegation of authority.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Industrial Priorities § 700.10 Delegation of authority. (a) The... respect to industrial resources have been delegated to the Secretary of Commerce under Executive Order...
15 CFR 705.11 - Determination by the President and adjustment of imports.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.11 Determination by... national security, the President is required by Section 232(c) of the Trade Expansion Act of 1962, as...
Real Time Quality Control Methods for Cued EMI Data Collection
2016-03-14
contents be construed as reflecting the official policy or position of the Department of Defense. Reference herein to any specific commercial product...This project evaluated the effectiveness of in-field quality control (QC) procedures during cued electromagnetic induction (EMI) data collection. The...electromagnetic induction ESTCP Environmental Security Technology Certification Program hr hour ISO Industry Standard Object IVS Instrument
Code of Federal Regulations, 2010 CFR
2010-07-01
... thereto or divisions thereof or for the registration of a utility model, industrial design, or model, in a... CFR part 810 (Foreign Atomic Energy Programs of the Department of Energy). (c) Where technical data in... and Security Regulations, Department of Commerce) and 10 CFR part 810 (Assistance to Foreign Atomic...
Europe Report, Science and Technology.
1986-11-17
fallout, bio- technology, stimulation, BRITE [Basic Research in Industrial Technologies for Europe] and non-nuclear energy ); -Overall assessment of...must make more use of new technologies," Narjes says. The new program will also pay particular attention to public health, environment, and energy ...nuclear fission and fusion). Concurrently subjects such as security, waste, and energy saving will get more attention. It is evident that the
State Merit Scholarship Programs and Racial Inequality
ERIC Educational Resources Information Center
Heller, Donald E., Ed.; Marin, Patricia, Ed.
2004-01-01
A central dream of American parents is sending their kids to college. What used to be unusual has now become a necessity if young people are to have a secure life in the middle class in a post-industrial economy. As such, one basic goal of higher education policy should be to make certain that this opportunity is not foreclosed by a family's…
15 CFR 700.16 - Changes or cancellations of priority ratings and rated orders.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Industrial Priorities § 700...
Securing the Internet frontier.
Morrissey, J
1996-10-21
Just as in the Wild West, security strategies are being mobilized for the untamed Internet frontier. Technology developed by settlers from the banking and merchandising industries is being retooled for healthcare, where security-conscious industries see a big market opportunity.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kotta, P. R.; Kline, K. M.
2005-02-28
The Laboratory Directed Research and Development (LDRD) Program is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and the National Nuclear Security Administration in national security, homeland security, energy security, environmental management, bioscience and healthcare technology, and breakthroughs in fundamental science and technology. The LDRD Program was authorized by Congress in 1991 and is administered by the Laboratory Science and Technology Office. The accomplishments described in this Annual Report demonstrate how the LDRD portfolio is strongly aligned with these missions and contributes to the Laboratory’smore » success in meeting its goals. The LDRD budget of $69.8 million for FY2004 sponsored 220 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific and technical quality and mission relevance. Each year, the number of meritorious proposals far exceeds the funding available, making the selection a challenging one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the Nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory’s multidisciplinary team approach to science and technology. Safeguarding the Nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest technical staff and for establishing collaborations with universities, industry, and other scientific and research institutions. By keeping the Laboratory at the forefront of science and technology, the LDRD Program enables us to meet our mission challenges, especially those of our ever-evolving national security and homeland security missions.« less
Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA Nationals
NASA Astrophysics Data System (ADS)
Houdeau, Detlef
The first implementation of biometric documents, called biometric passports, based on a regulation is running, the second implementation since end of CY 2008 is coming to Europe. The focus is on persons staying for business, study or leisure for more than 3 months in Europe and coming from a state outside Europe and not being a member of the Visa-Waiver-Program of the EU. This second wave increases the demand for the security industry for certified security microcontroller chips, secure smart cards, readers and supporting infrastructure on top of the biometric Passport business. It underlines the continuing advance of contactless identification technology in the public sector. The article gives an overview on the application, the technology, the EU regulation, the EU roadmap and the implementations.
NASA Technical Reports Server (NTRS)
Campbell, Donald C.
1995-01-01
Aeropropulsion technologies must progress to satisfy increasingly stringent global environmental requirements with economically viable air transportation systems. In this paper, key propulsion technologies to meet future needs are identified and the associated challenges are briefly discussed. Also discussed are NASA's vision, NASA's changing role in meeting today's challenge of a shrinking research budget, and propulsion technology impacts on the environment and air transport economics. Critical aeropropulsion technology drivers are identified and their impact evaluated. The aviation industry is critical to the nation's economy, job creation, and national security. NASA's advanced aeropropulsion technology programs and their relation to the aviation industry are discussed.
NASA Astrophysics Data System (ADS)
Skarnemark, Gunnar; Allard, Stefan; Ekberg, Christian; Nordlund, Anders
2009-08-01
The need for engineers and scientists who can ensure safe and secure use of nuclear energy is large in Sweden and internationally. Chalmers University of Technology is therefore launching a new 2-year master's program in Nuclear Engineering, with start from the autumn of 2009. The program is open to Swedish and foreign students. The program starts with compulsory courses dealing with the basics of nuclear chemistry and physics, radiation protection, nuclear power and reactors, nuclear fuel supply, nuclear waste management and nuclear safety and security. There are also compulsory courses in nuclear industry applications and sustainable energy futures. The subsequent elective courses can be chosen freely but there is also a possibility to choose informal tracks that concentrate on nuclear chemistry or reactor technology and physics. The nuclear chemistry track comprises courses in e.g. chemistry of lanthanides, actinides and transactinides, solvent extraction, radioecology and radioanalytical chemistry and radiopharmaceuticals. The program is finished with a one semester thesis project. This is probably a unique master program in the sense of its combination of deep courses in both nuclear technology and nuclear chemistry.
The strategic measures for the industrial security of small and medium business.
Lee, Chang-Moo
2014-01-01
The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Authority of the Office of Export Enforcement, the Bureau of Industry and Security, Customs offices and Postmasters in clearing shipments 758.7 Section 758.7 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY,...
American Security and the International Energy Situation. Volume 4. Collected Papers
1975-04-15
piograms as jet engine sales Wheat shipments may permit the Soviets to keep chemical industries onenled l.siim.«,, ,1 Pi.l.vs.., I...security and economic interde- pendence among Western advanced industrialized countries. Periodic con- flicts have been replaced by a "security... industrialized countries, creating an "interpenetration of econ- omies." Each development affects the dimensions of the access-to- resources
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Implements the requirements of the Department of Defense's Industrial Security Regulation (ISR) and Industrial Security Manual for Safeguarding Classified Information (ISM). By agreement, the Department of Defense (DOD) will act for, and on behalf of, GSA in rendering security services required for safeguarding...
Code of Federal Regulations, 2010 CFR
2010-04-01
...-vested worker covered under Social Security? 404.1402 Section 404.1402 Employees' Benefits SOCIAL... When are railroad industry services by a non-vested worker covered under Social Security? If you are a non-vested worker, we (the Social Security Administration) will consider your services in the railroad...
76 FR 1521 - Security Zone: Fleet Industrial Supply Center Pier, San Diego, CA
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-11
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0423] RIN 1625-AA87 Security Zone: Fleet Industrial Supply Center Pier, San Diego, CA AGENCY: Coast Guard, DHS. ACTION: Final rule. SUMMARY: The Coast Guard is removing a security zone on the navigable waters of San Diego...
Code of Federal Regulations, 2014 CFR
2014-04-01
...-vested worker covered under Social Security? 404.1402 Section 404.1402 Employees' Benefits SOCIAL... When are railroad industry services by a non-vested worker covered under Social Security? If you are a non-vested worker, we (the Social Security Administration) will consider your services in the railroad...
Code of Federal Regulations, 2012 CFR
2012-04-01
...-vested worker covered under Social Security? 404.1402 Section 404.1402 Employees' Benefits SOCIAL... When are railroad industry services by a non-vested worker covered under Social Security? If you are a non-vested worker, we (the Social Security Administration) will consider your services in the railroad...
Performance of the Defense Acquisition System, 2013 Annual Report
2013-06-28
well beyond their start dates, which could indicate factors not attributable to the initial management of the contracts. Figure 2-13. DoD Total ...Attributed to W. Edwards Deming While the United States achieves its national security missions by equipping its military forces with the best weapons...annual reports on the performance of the defense acquisition system—its programs, institutions, workforce, managers , executives, and industrial partners
The MICROBE Project, A Report from the Interagency Working Group on Microbial Genomics
2001-01-01
including targeting of genes related to pathogenesis, possibilities for acquired pathogen resistance, industrial and food -grade enzymes, and probiotics ...safety, food security, biotechnology, value-added products , human nutrition and functional foods , plant and animal protection and furthering fundamental...supports a number of microbial studies, which are integral components of the USDA national programs in animal health, food animal production , food
2007 National Security Space Policy and Architecture Symposium
2007-02-02
Tactical Satellite (TacSat)-2 Experiment Successful Launch, 16 Dec 06, Orbital Minotaur Ground Terminal – China Lake Capability: • Field tasking/data...AIRSS risk • Develop, build, and flight qualify wide- field -of-view, full-Earth staring sensor • FX-AIRSS flight experiment : investigate data...Demonstration Critical Field Experiments Government Industry Technology Knowledge Transfer (NLT this step) Managing Risks: • Program • Technical
Methodology to Improve Aviation Security With Terrorist Using Aircraft as a Weapon
2013-09-01
STATEMENT Approval for public release;distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words ) The aviation industry... Electronic Baggage Screening Program EDS Explosive Detection System EMMI Energy, Matter, Material wealth, and Information ETD Explosives Trace...12 All checked baggage in the United States has been subjected to 100% screening since December 2003 under TSA’s Electronic Baggage Screening
Defense Industrial Personnel Security Clearance Review Program
1992-01-02
or on closed accounts. 5. Indication of deceit or deception in obtaining credit or bank accounts, misappropriation of funds, income tax evasion ...income tax evasion , expense account fraud, filing deceptive loan statements, and other intentional financial breaches of trust; (3) inability or...information; or any U.S. citizen nominated by the Red Cross or United Service Organizations for assignment with the Military Services overseas. The
Chemical Industry Security: Voluntary or Mandatory Approach?
2007-03-01
reasonably ask ourselves whether we run the risk of comparing apples and oranges when trying to learn something new from them.35 The main...Myriam Dunn’s caution of comparing apples and oranges in CIP strategies. The European Union strategy of classifying CI information does not appear...level to establish an effective oversight program. SWOT Analysis – New Jersey Department of Environmental Protection Strengths: • Existing
An Overview of SBIR Phase 2 Communications Technology and Development
NASA Technical Reports Server (NTRS)
Nguyen, Hung D.; Steele, Gynelle C.
2015-01-01
Technological innovation is the overall focus of NASA's Small Business Innovation Research (SBIR) program. The program invests in the development of innovative concepts and technologies to help NASA's mission directorates address critical research and development needs for agency projects. This report highlights innovative SBIR Phase II projects from 2007-2012 specifically addressing areas in Communications Technology and Development which is one of six core competencies at NASA Glenn Research Center. There are eighteen technologies featured with emphasis on a wide spectrum of applications such as with a security-enhanced autonomous network management, secure communications using on-demand single photons, cognitive software-defined radio, spacesuit audio systems, multiband photonic phased-array antenna, and much more. Each article in this booklet describes an innovation, technical objective, and highlights NASA commercial and industrial applications. This report serves as an opportunity for NASA personnel including engineers, researchers, and program managers to learn of NASA SBIR's capabilities that might be crosscutting into this technology area. As the result, it would cause collaborations and partnerships between the small companies and NASA Programs and Projects resulting in benefit to both SBIR companies and NASA.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jacobs, R
The Physics and Advanced Technologies (PAT) Directorate was created in July 2000 by Bruce Tarter, Director of Lawrence Livermore National Laboratory (LLNL). The Director called for the new organization to execute and support programs that apply cutting-edge physics and advanced technology to develop integrated solutions to problems in national security, fusion energy, information science, health care, and other national grand challenges. When I was appointed a year later as the PAT Directorate's first Associate Director, I initiated a strategic planning project to develop a vision, mission, and long-term goals for the Directorate. We adopted the goal of becoming a leadermore » in frontier physics and technology for twenty-first-century national security missions: Stockpile Stewardship, homeland security, energy independence, and the exploration of space. Our mission is to: (1) Help ensure the scientific excellence and vitality of the major LLNL programs through its leadership role in performing basic and applied multidisciplinary research and development with programmatic impact, and by recruiting and retaining science and technology leaders; (2) Create future opportunities and directions for LLNL and its major programs by growing new program areas and cutting-edge capabilities that are synergistic with, and supportive of, its national security mission; (3) Provide a direct conduit to the academic and high-tech industrial sectors for LLNL and its national security programs, through which the Laboratory gains access to frontier science and technology, and can impact the science and technology communities; (4) Leverage unique Laboratory capabilities, to advance the state universe. This inaugural PAT Annual Report begins a series that will chronicle our progress towards fulfilling this mission. I believe the report demonstrates that the PAT Directorate has a strong base of capabilities and accomplishments on which to build in meeting its goals. Some of the highlights include: (1) Leadership of the Laboratory's Physical Data Research Program that provides fundamental physics information for the Stockpile Stewardship Program. (2) Development of the handheld Microbead Immunoassay Dipstick System that will allow relatively untrained first-responders to run sophisticated onsite diagnostics for pathogens, including those associated with biowarfare agents, by using a simple, one-step measurement. (3) Major advances in target design for inertial fusion energy research using both laser and ion-beam drivers. (4) Development of the Advanced Technology Kill Vehicle concept for use as a high-performance interceptor in a broad range of missile defense programs. Over the course of the past decade, the Laboratory has seen its major program evolve from weapons research, development, and testing, to Stockpile Stewardship. Today, the country's national security priorities are changing rapidly: nuclear security is becoming a broader set of missions, and the Laboratory is being asked to contribute to a range of new mission areas from countering bioterrorism to ensuring information security. As we embark on the twenty-first century, the new PAT Directorate is poised to help lead the Laboratory's response to the country's changing national security needs.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhou, Nan; Romankiewicz, John; Vine, Edward
2012-12-15
In recent years, the number of energy efficiency policies implemented has grown very rapidly as energy security and climate change have become top policy issues for many governments around the world. Within the sphere of energy efficiency policy, governments (federal and local), electric utilities, and other types of businesses and institutions are implementing a wide variety of programs to spread energy efficiency practices in industry, buildings, transport, and electricity. As programs proliferate, there is an administrative and business imperative to evaluate the savings and processes of these programs to ensure that program funds spent are indeed leading to a moremore » energy-efficient economy.« less
How Corruption Blunts Counternarcotic Policies in Afghanistan: A Multiagent Investigation
NASA Astrophysics Data System (ADS)
Geller, Armando; Mussavi Rizi, Seyed M.; Łatek, Maciej M.
We report the results of multiagent modeling experiments on interactions between the drug industry and corruption in Afghanistan. The model formalizes assumptions on the motivations of players in the Afghan drug industry, quantifies the tradeoffs among various choices players face and enables inspection of the time, space and level of supply chain in which one can expect positive and negative impacts of counternarcotic policies. If reducing opium exports is one measure of effectiveness for NATO operations in Afghanistan, grasping the links between corruption and the drug industry should provide a better picture of the second-order interactions between corruption and investment in improving the governance quality, in deploying security forces tasked with eradication and interdiction and in programs to enhance rural livelihoods.
76 FR 69303 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-08
...: [email protected] ; and (ii) Thomas Bayer, Director/Chief Information Officer, Securities and... assistance of truly independent legal counsel. \\5\\ See Role of Independent Directors of Investment Companies... reports prepared by the Securities Industry and Financial Markets Association. See Securities Industry and...
76 FR 47527 - Retrospective Regulatory Review Under E.O. 13563
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-05
... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Chapter VII [Docket No. 110711380... Security, Commerce. ACTION: Notice of inquiry. SUMMARY: The Bureau of Industry and Security (BIS... of portions of the Export Administration Regulations, Chemical Weapons Convention Regulations...
Development of a performance-based industrial energy efficiency indicator for corn refining plants.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boyd, G. A.; Decision and Information Sciences; USEPA
2006-07-31
Organizations that implement strategic energy management programs have the potential to achieve sustained energy savings if the programs are carried out properly. A key opportunity for achieving energy savings that plant managers can take is to determine an appropriate level of energy performance by comparing their plant's performance with that of similar plants in the same industry. Manufacturing facilities can set energy efficiency targets by using performance-based indicators. The U.S. Environmental Protection Agency (EPA), through its ENERGY STAR{reg_sign} program, has been developing plant energy performance indicators (EPIs) to encourage a variety of U.S. industries to use energy more efficiently. Thismore » report describes work with the corn refining industry to provide a plant-level indicator of energy efficiency for facilities that produce a variety of products--including corn starch, corn oil, animal feed, corn sweeteners, and ethanol--for the paper, food, beverage, and other industries in the United States. Consideration is given to the role that performance-based indicators play in motivating change; the steps needed to develop indicators, including interacting with an industry to secure adequate data for an indicator; and the actual application and use of an indicator when complete. How indicators are employed in the EPA's efforts to encourage industries to voluntarily improve their use of energy is discussed as well. The report describes the data and statistical methods used to construct the EPI for corn refining plants. Individual equations are presented, as are the instructions for using them in an associated Excel spreadsheet.« less
The future of the US Space Industrial Base
NASA Astrophysics Data System (ADS)
1992-11-01
Our space industrial base has given the United States the capability to be the world's leading space-faring nation. We have exploited space to greatly advance our national security by using extraordinarily sophisticated reconnaissance space systems to guard against military surprise, and other spacecraft that support the pinpoint delivery of weapons. We have fulfilled the dreams of those visionary national leaders who enacted the first National Aeronautics and Space Act by advancing our scientific knowledge of the planet we occupy and the universe around us. And the advancements in technology engendered by the U.S. space program have had world-wide impact in fostering entire new industries. The industrial base is broad. It is not merely plant and equipment, but an entire infrastructure of skilled scientific and technical manpower backed up by superb government, private and academic facilities and institutions.
Who wins and who loses? Public transfer accounts for US generations born 1850 to 2090
Bommier, Antoine; Miller, Tim; Zuber, Stéphane
2010-01-01
Public transfer programs in industrial nations are thought to benefit the elderly through pension and health care programs at the expense of the young and future generations. However, this intergenerational picture changes if public education is also considered as a transfer program. We calculate the net present value (NPV) of benefits received minus taxes paid for US generations born 1850 to 2090. Surprisingly, all generations 1950 to 2050 are net gainers, while many current elderly are losers. Windfall gains from starting Social Security and Medicare partially offset windfall losses from starting public education, roughly consistent with the Becker-Murphy theory. PMID:20300431
2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference
2017-11-15
beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and
15 CFR 700.18 - Limitations on placing rated orders.
Code of Federal Regulations, 2012 CFR
2012-01-01
... transportation (Department of Transportation); (v) Water resources (Department of Defense/U.S. Army Corps of... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Industrial Priorities § 700.18 Limitations on placing...
15 CFR 700.18 - Limitations on placing rated orders.
Code of Federal Regulations, 2014 CFR
2014-01-01
... transportation (Department of Transportation); (v) Water resources (Department of Defense/U.S. Army Corps of... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Industrial Priorities § 700.18 Limitations on placing...
15 CFR 700.18 - Limitations on placing rated orders.
Code of Federal Regulations, 2013 CFR
2013-01-01
... transportation (Department of Transportation); (v) Water resources (Department of Defense/U.S. Army Corps of... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Industrial Priorities § 700.18 Limitations on placing...
15 CFR 705.5 - Request or application for an investigation.
Code of Federal Regulations, 2010 CFR
2010-01-01
... industry affected, including pertinent information regarding companies and their plants, locations... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE... shall be filed with the Director, Office of Technology Evaluation, Room H-1093, U.S. Department of...
The Strategic Measures for the Industrial Security of Small and Medium Business
Lee, Chang-Moo
2014-01-01
The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures. PMID:24955414
The proliferation of aerospace weapons technology: Ballistic missiles and the case of Brazil
NASA Astrophysics Data System (ADS)
Vossen, Terrence John
1993-04-01
The rationale behind the development of ballistic missile production in Brazil is examined by exploring the political, military, and economic determinants of ballistic missile demand in that country. To ascertain how Brazil developed missile production capabilities, the contributions of aerospace industries in industrialized states, the Brazilian space program, trade between less-developed countries, and illicit trade in missile technology are assessed. It is argued that missile development increasingly became a function of economic as opposed to security considerations, and that technologies transferred from developed country aerospace firms and Brazil's space program were primarily responsible for the creation of production capabilities. It is also contended that the proliferation of missile technology to Brazil was consistent with the workings of a system evident in the aerospace weapons technology market that sustains the horizontal spread of weapons production capabilities.
Public offerings of securities by petroleum industry: methods and costs of raising capital
DOE Office of Scientific and Technical Information (OSTI.GOV)
Siemon, D.
1978-01-01
This study examines public securities offerings by the petroleum industry and the flotation costs associated with raising capital through offerings to the public. Descriptive material is presented on an aggregate basis for the industry and also by selected company characteristics. Data were obtained from the Securities and Exchange Commission's records of registration statements for public offerings and include all public offerings registered with the SEC during the period January 1970 through October 1975. The petroleum industry issued 101 debt offerings and 1058 equity offerings during the time period. The total number of offerings for all industries was estimated to bemore » 20,000, so the petroleum industry accounted for roughly 5% of the total volume.« less
The impact of internet-connected control systems on the oil and gas industry
NASA Astrophysics Data System (ADS)
Martel, Ruth T.
In industry and infrastructure today, communication is a way of life. In the oil and gas industry, the use of devices that communicate with the network at large is both commonplace and expected. Unfortunately, security on these devices is not always best. Many industrial control devices originate from legacy devices not originally configured with security in mind. All infrastructure and industry today has seen an increase in attacks on their networks and in some cases, a very dramatic increase, which should be a cause for alarm and action. The purpose of this research was to highlight the threat that Internet-connected devices present to an organization's network in the oil and gas industry and ultimately, to the business and possibly even human life. Although there are several previous studies that highlight the problem of these Internet-connected devices, there remains evidence that security response has not been adequate. The analysis conducted on only one easily discovered device serves as an example of the ongoing issue of the security mindset in the oil and gas industry. The ability to connect to a network through an Internet-connected device gives a hacker an anonymous backdoor to do great damage in that network. The hope is that the approach to security in infrastructure and especially the oil and gas industry, changes before a major catastrophe occurs involving human life.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-29
... Committee of the Securities Industry and Financial Markets Association ACTION: Notice of renewal. SUMMARY... the Treasury Borrowing Advisory Committee of the Securities Industry and Financial Markets Association... Management (202) 622-1876. SUPPLEMENTARY INFORMATION: The purpose of the Committee is to provide informed...
Data security101: avoiding the list.
Perna, Gabriel
2012-01-01
Thanks to the rampant digitization of healthcare data, breaches have become commonplace in an industry that lacks advanced security practices. In this industry-wide report, those who have dealt with breaches implore others to shore up internal security practices and be transparent. As one CIO keenly notes, "we're all in this together."
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-29
... Secure Solutions USA, SBM Management Services, LP, ALSCO Portland Industrial, VWR International, Inc... G4S Secure Solutions USA, SBM Management Services, LP, Alsco Portland Industrial, VWR International... workers from Express Temporaries, Aerotek Commercial Staffing, G4S Secure Solutions USA, SBM Management...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-31
.... The commenter states that such securities are likely to become more important to banks as new... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71180; File No. SR-FINRA-2013-039] Self... Securities to FINRA December 24, 2013. I. Introduction On September 16, 2013, the Financial Industry...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-03
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61979; File No. SR-FINRA-2010-003] Self..., as Modified by Amendment Nos. 1 and 2, Relating to Trade Reporting of OTC Equity Securities and Restricted Equity Securities April 23, 2010. I. Introduction On January 15, 2010, Financial Industry...
Defense AR Journal. Volume 16, Number 2, Issue 51, July 2009
2009-07-01
and provides an economic theory for reviving this declining, but important industry. The fourth article by Dr. Roy Wood, “Program Manager as Chief...services (Avant, 2007). United States Naval War College Professor Larry McCabe observed that an economic aspect to the emergence of private security...and nonlinear relationships in managerial control. The methodology’s ability to model many diverse system components (e.g., work, people, money
Critical Infrastructure: Control Systems and the Terrorist Threat
2004-01-20
Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL31534 Critical...http://www.pnl.gov/main/sectors/homeland.html]. 68 Rolf Carlson, “Sandia SCADA Program High-Security SCADA LDRD Final Report ,” Sandia Report SAND2002...and Industry Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to
Critical Infrastructure: Control Systems and the Terrorist Threat
2003-07-14
Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL31534 Critical...available online at [http://www.pnl.gov/main/sectors/homeland.html]. 56 Rolf Carlson, “Sandia SCADA Program High-Security SCADA LDRD Final Report ...Industry Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to
Joint Force Quarterly. Number 16, Summer 1997
1997-08-01
administration and Congress have agreed to keep this program on an accelerated research and develop - ment path aimed at creating the option to make a deci...industrial base has played a criti- cal role in national security strategy because of its ability to design, develop , and manufacture tech- nologically...the field . Moreover, it was not able to target recruiting on operational or logistics specialties. An infusion of experienced personnel and an ability
Clean Coal Technology Demonstration Program: Project fact sheets 2000, status as of June 30, 2000
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
2000-09-01
The Clean Coal Technology Demonstration Program (CCT Program), a model of government and industry cooperation, responds to the Department of Energy's (DOE) mission to foster a secure and reliable energy system that is environmentally and economically sustainable. The CCT Program represents an investment of over $5.2 billion in advanced coal-based technology, with industry and state governments providing an unprecedented 66 percent of the funding. With 26 of the 38 active projects having completed operations, the CCT Program has yielded clean coal technologies (CCTs) that are capable of meeting existing and emerging environmental regulations and competing in a deregulated electric powermore » marketplace. The CCT Program is providing a portfolio of technologies that will assure that U.S. recoverable coal reserves of 274 billion tons can continue to supply the nation's energy needs economically and in an environmentally sound manner. As the nation embarks on a new millennium, many of the clean coal technologies have realized commercial application. Industry stands ready to respond to the energy and environmental demands of the 21st century, both domestically and internationally, For existing power plants, there are cost-effective environmental control devices to control sulfur dioxide (S02), nitrogen oxides (NO,), and particulate matter (PM). Also ready is a new generation of technologies that can produce electricity and other commodities, such as steam and synthetic gas, and provide efficiencies and environmental performance responsive to global climate change concerns. The CCT Program took a pollution prevention approach as well, demonstrating technologies that remove pollutants or their precursors from coal-based fuels before combustion. Finally, new technologies were introduced into the major coal-based industries, such as steel production, to enhance environmental performance. Thanks in part to the CCT Program, coal--abundant, secure, and economical--can continue in its role as a key component in the U.S. and world energy markets. The CCT Program also has global importance in providing clean, efficient coal-based technology to a burgeoning energy market in developing countries largely dependent on coal. Based on 1997 data, world energy consumption is expected to increase 60 percent by 2020, with almost half of the energy increment occurring in developing Asia (including China and India). By 2020, energy consumption in developing Asia is projected to surpass consumption in North America. The energy form contributing most to the growth is electricity, as developing Asia establishes its energy infrastructure. Coal, the predominant indigenous fuel, in that region will be the fuel of choice in electricity production. The CCTs offer a means to mitigate potential environmental problems associated with unprecedented energy growth, and to enhance the U.S. economy through foreign equipment sales and engineering services.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-09
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Community Alliance, Inc., Defi Global, Inc., Easy Energy, Inc., Industry Concept Holdings, Inc., and Transworld Benefits International, Inc.; Order... that there is a lack of current and accurate information concerning the securities of Industry Concept...
Application of external axis in thermal spraying
NASA Astrophysics Data System (ADS)
Gao, Guoyou; Wang, Wei; Chen, Tao; Hui, Chun
2018-05-01
Industrial robots are widely used nowadays in the process of thermal spraying, human work can be largely replaced due to the high-efficient, security, precision and repeatability of industrial robot. As offering the convenience to industrial product, Robots have some natural deficiencies because of its mechanical linkages of six-axis. When robot performs a series of stage of production, it could be hard to move to the next one because one of his axis reaches a maximum value. For this reason, external axis is added to robot system to extend the reachable space of robot axis. This paper concerns to the application of external axis and the different methods of programming the robot with work-holding external axis in the virtual environment. Experiments demonstrate the coating layer on the regular workpiece is uniform.
15 CFR 700.92 - Applicability of this regulation and official actions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Miscellaneous Provisions § 700.92...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-19
... Committee of the Securities Industry and Financial Markets Association ACTION: Notice of Renewal of... Securities Industry and Financial Markets Association (the ``Committee'') is necessary and in the public interest in connection with the performance of duties imposed on the Department of the Treasury by law. FOR...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-13
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66528; File No. SR-FINRA-2012-014] Self... Requirements for Credit Default Swaps) March 7, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange..., 2012, Financial Industry Regulatory Authority, Inc. (``FINRA'') filed with the Securities and Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63319; File No. SR-FINRA-2010-060] Self... Changes to Certain FINRA Rules November 16, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange..., 2010, Financial Industry Regulatory Authority, Inc. (``FINRA'') filed with the Securities and Exchange...
12 CFR 326.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...
12 CFR 326.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 9 2011-10-01 2011-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 9 2013-10-01 2013-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 9 2012-10-01 2012-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
Nevada National Security Site Industrial Sites Project Closeout - 12498
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cabble, Kevin; Krauss, Mark; Matthews, Pat
The U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office is responsible for environmental restoration (ER) at the Nevada National Security Site (NNSS). This includes remediation at Industrial Sites where past nuclear testing activities and activities that supported nuclear testing may have or are known to have resulted in the release of contaminants into the environment. Industrial Sites at the NNSS have included nuclear facilities that supported the nuclear rocket/missile development programs, gas stations, landfills, spill sites, ordnance sites, and numerous other waste disposal and release sites. The NNSS Industrial Sites activities neared completion at the endmore » of fiscal year 2011 while other activities required under the Federal Facility Agreement and Consent Order (FFACO) and part of the same NNSS ER Project are forecasted to extend to 2027 or beyond. With the majority of Industrial Sites corrective action units (CAUs) completed (more than 250 CAUs and over 1,800 corrective action sites), it was determined that an activity closeout process should be implemented to ensure that the work completed over the past 15 years is well documented in a comprehensive and concise summary. While the process used to close each individual CAU is described in approved documents, no single document describes in summary fashion the work completed to close the many individual Industrial Sites. The activity closeout process will be used to develop an Industrial Sites closeout document that describes these years of work. This document will summarize the number of Industrial Sites closed under the FFACO and provide general descriptions of projects, contaminants removed, and sites closed in place with corresponding Use Restrictions. Other pertinent information related to Industrial Sites work such as the project history, closure decisions, historical declarations, remediation strategies, and final CAU status will be included in the closeout document, along with a table listing each CAU and corresponding corrective action sites within each CAU. Using this process of conducting the activity closeout and developing a closeout document may prove useful for other ER projects within the DOE complex in describing how a long period of ER can be summarized in a single document. The NNSS Industrial Sites activities were completed over the span of 15 years and involved the investigation, cleanup or Use Restriction, and closure of more than 260 CAUs and over 1,800 sites. These activities will conclude in FY 2012 (with the exception of one CAU). In order to capture the work completed over this length of time and document decisions made during the activities, a closeout effort was initiated. The closeout will review the work conducted during the Industrial Sites activities and produce a single document that summarizes Industrial Sites activities. This closeout is being conducted at an interim stage in the overall NNSA/NSO ER Project since the Soils and UGTA activities will continue for a number of years, but the completion of the Industrial Sites project warrants conducting a closeout now while personnel are available and information is still current. The process followed by NNSA/NSO in conducing project closeout for the Industrial Sites portion of the ER program may prove useful within the DOE complex in demonstrating how a large ER project can be summarized. (authors)« less
New deal for military space programs
NASA Astrophysics Data System (ADS)
Paecht, A.
1995-01-01
Military space programs will see a new incentive in telecommunications or optical and radar observation. In the intermediate term, electromagnetic surveillance or the detection of ballistic missile firings will have to be developed to meet our country's security needs. National organizations in the space field (CNES, DGA, ONERA) must be corrected. The improvement in French-German relations, currently being negotiated between the governments and private enterprises, will allow the emergence of a European space industry and of a joint and autonomous observation system. Financing of all the space programs-70 billion francs in 20 years will be possible only at the cost of a substantial savings effort in all areas, and of a heightened civilian-military synergy.
The influence of industry on dental education.
Gillis, Martin R; McNally, Mary E
2010-10-01
Academic dental institutions face the growing challenge of securing the resources needed to develop a curriculum that incorporates current innovation and technology to ensure that students' learning experiences are relevant to current dental practice. As a result, university-industry relationships are becoming increasingly common in academe. While these relationships facilitate curriculum relevance, they also expose students to external market forces. The purpose of this study was to explore the influence of industry on dental education using a qualitative research study design. Analysis of semistructured interviews with thirteen Dalhousie University dental faculty members revealed two primary themes that suggest a tension between the traditional hierarchical organizational structures guiding curriculum (i.e., authoritarianism) and industry's quest for profit (i.e., entrepreneurialism). Additional themes demonstrate a belief that industry directly influences students' knowledge and understanding of evidence as well as their experience with both the formal and informal curricula. Industry's presence in academe is a concern. Dental educators, as stewards of the profession, must be nimble in brokering industry's presence without compromising the integrity of both the educational program and the teaching institution as a whole.
Best Practices for the Security of Radioactive Materials
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coulter, D.T.; Musolino, S.
2009-05-01
This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studiesmore » suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.« less
78 FR 24161 - Bureau of Industry and Security
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-24
... of Industry and Security senior management. 4. Discussion on General Technology Note as it applies to.... Report of Composite Working Group and other working groups. 7. Report on regime-based activities. 8...
15 CFR 730.9 - Organization of the Bureau of Industry and Security.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Department's organizational and administrative orders are available via Office of Management and Organization... Strategic Industries and Economic Security, and the Office of Technology Evaluation. The functions of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-17
... Request; National Security and Critical Technology Assessments of the U.S. Industrial Base AGENCY: Bureau... Federal agencies, conducts assessments of U.S. industrial base sectors deemed critical to U.S. national... needs of these critical market segments in order to maintain a strong U.S. industrial base. II. Method...
2009-12-01
the degree of MASTER OF SCIENCE IN DEFENSE ANALYSIS From the NAVAL POSTGRADUATE SCHOOL December 2009 Author: C. Tim...rich agricultural production of wines , alcoholic beverages, and citrus fruits combined with its Black Sea coast tourist industry and black market...This U.S. assistance includes Freedom Support Act (FSA) programs, food aid (United States Department of Agriculture (USDA), Peace Corps, and security
Review of Private Sector Personnel Screening Practices
2000-10-01
private sector investigative sources or methods would be useful to the DoD for conducting national security background investigations. The federal government by and large examines more sources and conducts more thorough investigations than industry. In general, private employers (1) have less access to information about applicants...outsource many elements of background checks. It is recommended that the DoD periodically evaluate private sector screening programs and data sources in order to monitor
Perimeter Security and Intruder Detection Using Gravity Gradiometry: A Feasibility Study
2011-03-24
design, build, and operate, and it is usually not feasible to integrate new technology into an already existing system. So far, however, the...gravitational gradients is not a new concept and has been applied across a variety of industries. The first device for gravity gradient measurement was the...which generates a new simulated GGI reading. The program loops for a set number of iterations, and then ends by calculating algorithm performance
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-23
... investment grade by at least one NRSRO and securities issued by registered open-end investment companies that... Investment Company Act will also limit a BIDCO's investments in registered open-end funds to those funds that... 3235-AL02 Purchase of Certain Debt Securities by Business and Industrial Development Companies Relying...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vrieling, P. Douglas
2016-01-01
The Livermore Valley Open Campus (LVOC), a joint initiative of the National Nuclear Security Administration (NNSA), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL), enhances the national security missions of NNSA by promoting greater collaboration between world-class scientists at the national security laboratories, and their partners in industry and academia. Strengthening the science, technology, and engineering (ST&E) base of our nation is one of the NNSA’s top goals. By conducting coordinated and collaborative programs, LVOC enhances both the NNSA and the broader national science and technology base, and helps to ensure the health of core capabilities at LLNLmore » and SNL. These capabilities must remain strong to enable the laboratories to execute their primary mission for NNSA.« less
Security Hardened Cyber Components for Nuclear Power Plants: Phase I SBIR Final Technical Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Franusich, Michael D.
SpiralGen, Inc. built a proof-of-concept toolkit for enhancing the cyber security of nuclear power plants and other critical infrastructure with high-assurance instrumentation and control code. The toolkit is based on technology from the DARPA High-Assurance Cyber Military Systems (HACMS) program, which has focused on applying the science of formal methods to the formidable set of problems involved in securing cyber physical systems. The primary challenges beyond HACMS in developing this toolkit were to make the new technology usable by control system engineers and compatible with the regulatory and commercial constraints of the nuclear power industry. The toolkit, packaged as amore » Simulink add-on, allows a system designer to assemble a high-assurance component from formally specified and proven blocks and generate provably correct control and monitor code for that subsystem.« less
A secure EHR system based on hybrid clouds.
Chen, Yu-Yi; Lu, Jun-Chao; Jan, Jinn-Ke
2012-10-01
Consequently, application services rendering remote medical services and electronic health record (EHR) have become a hot topic and stimulating increased interest in studying this subject in recent years. Information and communication technologies have been applied to the medical services and healthcare area for a number of years to resolve problems in medical management. Sharing EHR information can provide professional medical programs with consultancy, evaluation, and tracing services can certainly improve accessibility to the public receiving medical services or medical information at remote sites. With the widespread use of EHR, building a secure EHR sharing environment has attracted a lot of attention in both healthcare industry and academic community. Cloud computing paradigm is one of the popular healthIT infrastructures for facilitating EHR sharing and EHR integration. In this paper, we propose an EHR sharing and integration system in healthcare clouds and analyze the arising security and privacy issues in access and management of EHRs.
International Commercial Remote Sensing Practices and Policies: A Comparative Analysis
NASA Astrophysics Data System (ADS)
Stryker, Timothy
In recent years, there has been much discussion about U.S. commercial remoteUnder the Act, the Secretary of Commerce sensing policies and how effectively theylicenses the operations of private U.S. address U.S. national security, foreignremote sensing satellite systems, in policy, commercial, and public interests.consultation with the Secretaries of Defense, This paper will provide an overview of U.S.State, and Interior. PDD-23 provided further commercial remote sensing laws,details concerning the operation of advanced regulations, and policies, and describe recentsystems, as well as criteria for the export of NOAA initiatives. It will also addressturnkey systems and/or components. In July related foreign practices, and the overall2000, pursuant to the authority delegated to legal context for trade and investment in thisit by the Secretary of Commerce, NOAA critical industry.iss ued new regulations for the industry. Licensing and Regulationsatellite systems. NOAA's program is The 1992 Land Remote Sensing Policy Act ("the Act"), and the 1994 policy on Foreign Access to Remote Sensing Space Capabilities (known as Presidential Decision Directive-23, or PDD-23) put into place an ambitious legal and policy framework for the U.S. Government's licensing of privately-owned, high-resolution satellite systems. Previously, capabilities afforded national security and observes the international obligations of the United States; maintain positive control of spacecraft operations; maintain a tasking record in conjunction with other record-keeping requirements; provide U.S. Government access to and use of data when required for national security or foreign policy purposes; provide for U.S. Government review of all significant foreign agreements; obtain U.S. Government approval for any encryption devices used; make available unenhanced data to a "sensed state" as soon as such data are available and on reasonable cost terms and conditions; make available unenhanced data as requested by the U.S. Government Archive; and, obtain a priori U.S. Government approval of all plans and procedures to deal with safe disposition of the satellite. Further information on NOAA's regulations and NOAA's licensing program is available at www.licensing.noaa.gov. Monitoring and Enforcement NOAA's enforcement mission is focused on the legislative mandate which states that the Secretary of Commerce has a continuing obligation to ensure that licensed imaging systems are operated lawfully to preserve the national security and foreign policies of the United States. NOAA has constructed an end-to-end monitoring and compliance program to review the activities of licensed companies. This program includes a pre- launch review, an operational baseline audit, and an annual comprehensive national security audit. If at any time there is suspicion or concern that a system is being operated unlawfully, a no-notice inspection may be initiated. setbacks, three U.S. companies are now operational, with more firms expected to become so in the future. While NOAA does not disclose specific systems capabilities for proprietary reasons, its current licensing resolution thresholds for general commercial availability are as follows: 0.5 meter Ground Sample Distance (GSD) for panchromatic systems, 2 meter GSD for multi-spectral systems, 3 meter Impulse Response (IPR) for Synthetic Aperture Radar systems, and 20 meter GSD for hyperspectral systems (with certain 8-meter hyperspectral derived products also licensed for commercial distribution). These thresholds are subject to change based upon foreign availability and other considerations. It should also be noted that license applications are reviewed and granted on a case-by-case basis, pursuant to each system's technology and concept of operations. In 2001, NOAA, along with the Department of Commerce's International Trade Administration, commissioned a study by the RAND Corporation to assess the risks faced by the U.S. commercial remote sensing satellite industry. In commissioning this study, NOAA's goal was to better understand the role that U.S. Government policies and regulations have in shaping the prospects for emerging commercial remote sensing satellite firms. The study assessed the risks against broader trends in the larger U.S. remote sensing industry and geospatial technology and effective policy implementation. The Department of Commerce is working with NOAA licensees to identify foreign actions which could restrict market access by U.S. firms, and seeking to provide a "level playing field" for U.S. service providers. The Department of Commerce has dedicated new resources to its licensing activities. In Fiscal Year 2002, the Department obtained 1.2 million in funding to support the NOAA program, through staff, equipment, technical support, constituent outreach, and market and policy studies. To better understand the market and make more well-informed licensing decisions, NOAA is participating in a broad-based market study effort under the direction of the American Society for Photogrammetry and Remote Sensing (ASPRS) and NASA's Commercial Remote Sensing Program. This study is providing long-term analysis of the commercial remote sensing industry. It is being supported by interviews with industry and government experts, a web-based survey, and a thorough review and analysis of related literature. The project should more clearly determine future remote sensing needs and requirements, and maximize the industry's baselines, standards, and socio-economic potential. NOAA, through its participation in this study, has gained important new insights into the status and future trends of this industry. The study's initial findings estimate 2001 industry revenue at 2 billion, growing at 13% per year, to an approximate level of 6 billion in 2010 (in constant, calendar year 2000 dollars). Currently, across all sectors, the most active market segments are in nati onal /glo bal security, mapping/geography, civil government, and have provided for appropriate measures for monitoring and compliance. This approach provides a valuable framework for companies, investors, customers, and foreign partners. The clearly-defined ground rules are designed to facilitate full private sector competition, innovation, and domestic and international market development. International market development remains a key issue for the U.S. Government and for U.S. industry in general. NOAA has learned of some interest by foreign governments in promulgating new laws and regulations to address this growing industry. However, to date, most governments have yet to publicize new commercial remote sensing laws or regulations. In some instances, data policies for commercial remote sensing have been developed, but only in the context of government-owned and operated systems, or private systems in which a government is the controlling shareholder. Other than some initial consultations and limited agreements between supplier nations, there has to date been little overall international coordination of commercial remote sensing policies and practices. The result has been an uncertain and non- uniform international business environment, which can cause difficulties for all commercial remote sensing operators. Related international market distortions inhibit the maturation of the industry and the normalization of business practices. This situation may make it more difficult for key stakeholders to make decisions on investments, purchases, regulatory affairs, and international partnerships. To put this growing industry on a more level footing, there should be further coordination
12 CFR 168.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 168.3 Section 168.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...
12 CFR 568.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Security program. 568.3 Section 568.3 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...
12 CFR 391.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for business...
12 CFR 168.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security program. 168.3 Section 168.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...
12 CFR 391.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for business...
NASA Technical Reports Server (NTRS)
Bullock, Kimberly R.
1995-01-01
The development and application of new technologies in the United States has always been important to the economic well being of the country. The National Aeronautics and Space Administration (NASA) has been an important source of these new technologies for almost four decades. Recently, increasing global competition has emphasized the importance of fully utilizing federally funded technologies. Today NASA must meet its mission goals while at the same time, conduct research and development that contributes to securing US economic growth. NASA technologies must be quickly and effectively transferred into commercial products. In order to accomplish this task, NASA has formulated a new way of doing business with the private sector. Emphasis is placed on forming mutually beneficial partnerships between NASA and US industry. New standards have been set in response to the process that increase effectiveness, efficiency, and timely customer response. This summer I have identified potential markets for two NASA inventions: including the Radially Focused Eddy Current Sensor for Characterization of Flaws in Metallic Tubing and the Radiographic Moire. I have also worked to establish a cooperative program with TAG, private industry, and a university known as the TAG/Industry/Academia Program.
15 CFR Appendix I to Part 700 - Form BIS-999-Request for Special Priorities Assistance
Code of Federal Regulations, 2010 CFR
2010-01-01
... and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Pt. 700, App. I Appendix I...
Seven layers of security to help protect biomedical research facilities.
Mortell, Norman
2010-04-01
In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.
17 CFR 229.1201 - (Item 1201) General instructions to oil and gas industry-specific disclosures.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false (Item 1201) General instructions to oil and gas industry-specific disclosures. 229.1201 Section 229.1201 Commodity and Securities... instructions to oil and gas industry-specific disclosures. (a) If oil and gas producing activities are material...
17 CFR 229.1201 - (Item 1201) General instructions to oil and gas industry-specific disclosures.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false (Item 1201) General instructions to oil and gas industry-specific disclosures. 229.1201 Section 229.1201 Commodity and Securities... instructions to oil and gas industry-specific disclosures. (a) If oil and gas producing activities are material...
Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS)
2012-05-01
protect, and secure the United States and its interests. • AOF is the United States, Alaska, Canada, Mexico, Bahamas, Puerto Rico , and the U.S. Virgin...Criteria (UFC) for Smart Microgrid Cyber design guides for Industrial Control Systems (ICS) Residual systems Operations and Maintenance Operator...Training Sustainment Commercial Transition Cooperation with NIST for microgrid security standards Working with industry associations and
The cyber security threat stops in the boardroom.
Scully, Tim
The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.
US Rocket Propulsion Industrial Base Health Metrics
NASA Technical Reports Server (NTRS)
Doreswamy, Rajiv
2013-01-01
The number of active liquid rocket engine and solid rocket motor development programs has severely declined since the "space race" of the 1950s and 1960s center dot This downward trend has been exacerbated by the retirement of the Space Shuttle, transition from the Constellation Program to the Space launch System (SLS) and similar activity in DoD programs center dot In addition with consolidation in the industry, the rocket propulsion industrial base is under stress. To Improve the "health" of the RPIB, we need to understand - The current condition of the RPIB - How this compares to past history - The trend of RPIB health center dot This drives the need for a concise set of "metrics" - Analogous to the basic data a physician uses to determine the state of health of his patients - Easy to measure and collect - The trend is often more useful than the actual data point - Can be used to focus on problem areas and develop preventative measures The nation's capability to conceive, design, develop, manufacture, test, and support missions using liquid rocket engines and solid rocket motors that are critical to its national security, economic health and growth, and future scientific needs. center dot The RPIB encompasses US government, academic, and commercial (including industry primes and their supplier base) research, development, test, evaluation, and manufacturing capabilities and facilities. center dot The RPIB includes the skilled workforce, related intellectual property, engineering and support services, and supply chain operations and management. This definition touches the five main segments of the U.S. RPIB as categorized by the USG: defense, intelligence community, civil government, academia, and commercial sector. The nation's capability to conceive, design, develop, manufacture, test, and support missions using liquid rocket engines and solid rocket motors that are critical to its national security, economic health and growth, and future scientific needs. center dot The RPIB encompasses US government, academic, and commercial (including industry primes and their supplier base) research, development, test, evaluation, and manufacturing capabilities and facilities. center dot The RPIB includes the skilled workforce, related intellectual property, engineering and support services, and supply chain operations and management. This definition touches the five main segments of the U.S. RPIB as categorized by the USG: defense, intelligence community, civil government, academia, and commercial sector.
Suspect/Counterfeit Items Information Guide for Subcontractors/Suppliers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tessmar, Nancy D.; Salazar, Michael J.
2012-09-18
Counterfeiting of industrial and commercial grade items is an international problem that places worker safety, program objectives, expensive equipment, and security at risk. In order to prevent the introduction of Suspect/Counterfeit Items (S/CI), this information sheet is being made available as a guide to assist in the implementation of S/CI awareness and controls, in conjunction with subcontractor's/supplier's quality assurance programs. When it comes to counterfeit goods, including industrial materials, items, and equipment, no market is immune. Some manufactures have been known to misrepresent their products and intentionally use inferior materials and processes to manufacture substandard items, whose properties can significantlymore » cart from established standards and specifications. These substandard items termed by the Department of Energy (DOE) as S/CI, pose immediate and potential threats to the safety of DOE and contractor workers, the public, and the environment. Failure of certain systems and processes caused by an S/CI could also have national security implications at Los Alamos National Laboratory (LANL). Nuclear Safety Rules (federal Laws), DOE Orders, and other regulations set forth requirements for DOE contractors to implement effective controls to assure that items and services meet specified requirements. This includes techniques to implement and thereby minimizing the potential threat of entry of S/CI to LANL. As a qualified supplier of goods or services to the LANL, your company will be required to establish and maintain effective controls to prevent the introduction of S/CI to LANL. This will require that your company warrant that all items (including their subassemblies, components, and parts) sold to LANL are genuine (i.e. not counterfeit), new, and unused, and conform to the requirements of the LANL purchase orders/contracts unless otherwise approved in writing to the Los Alamos National Security (LANS) contract administrator/procurements specialist.« less
The 3D Elevation Program: summary of program direction
Snyder, Gregory I.
2012-01-01
The 3D Elevation Program (3DEP) initiative responds to a growing need for high-quality topographic data and a wide range of other three-dimensional representations of the Nation's natural and constructed features. The National Enhanced Elevation Assessment (NEEA), which was completed in 2011, clearly documented this need within government and industry sectors. The results of the NEEA indicated that enhanced elevation data have the potential to generate $13 billion in new benefits annually. The benefits apply to food risk management, agriculture, water supply, homeland security, renewable energy, aviation safety, and other areas. The 3DEP initiative was recommended by the National Digital Elevation Program and its 12 Federal member agencies and was endorsed by the National States Geographic Information Council (NSGIC) and the National Geospatial Advisory Committee (NGAC).
In-plant management of hazardous waste
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, M.W.; Howell, W.L. Jr.
1995-12-31
One of the earliest sustainable technologies for the management of hazardous industrial wastes, and one of the most successful, is {open_quotes}In-Plant Control{close_quotes} Waste elimination, reuse and/or minimization can encourage improved utilization of resources, decreased environmental degradation and increased profits at individual industrial product ion sites, or within an industry. For new facilities and industries, putting such programs in place is relatively easy. Experience has shown, however, that this may be more difficult to initiate in existing facilities, especially in older and heavier industries. This task can be made easier by promoting a mutually respectful partnership between production and environmental interestsmore » within the facility or industry. This permits {open_quotes}common sense{close_quotes} thinking and a cooperative, proactive strategy for securing an appropriate balance between economic growth, environmental protection and social responsibility. Case studies are presented wherein a phased, incremental in-plant system for waste management was developed and employed to good effect, using a model that entailed {open_quotes}Consciousness, Commitment, Training, Recognition, Re-engineering and Continuous Improvement{close_quotes} to promote waste minimization or elimination.« less
Technical Analysis of SSP-21 Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bromberger, S.
As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will usemore » other advanced technologies to provide a subset of security services.« less
12 CFR 225.125 - Investment adviser activities.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Court has upheld that determination. See Securities Industry Ass'n v. Board of Governors, 468 U.S. 207 (1984); see also Securities Industry Ass'n v. Board of Governors, 821 F.2d 810 (D.C. Cir. 1987), cert...
12 CFR 225.125 - Investment adviser activities.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Court has upheld that determination. See Securities Industry Ass'n v. Board of Governors, 468 U.S. 207 (1984); see also Securities Industry Ass'n v. Board of Governors, 821 F.2d 810 (D.C. Cir. 1987), cert...
12 CFR 225.125 - Investment adviser activities.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Court has upheld that determination. See Securities Industry Ass'n v. Board of Governors, 468 U.S. 207 (1984); see also Securities Industry Ass'n v. Board of Governors, 821 F.2d 810 (D.C. Cir. 1987), cert...
Code of Federal Regulations, 2010 CFR
2010-07-01
... (CONUS), Alaska, Hawaii, and Puerto Rico; the Defense Industrial Security Clearance Office (DISCO), Columbus, Ohio; the Personnel Investigations Center (PIC) and National Computer Center (NCC) in Baltimore, Maryland; Office of Industrial Security International Europe (OISI-E), located in Brussels, Belgium with a...
Code of Federal Regulations, 2013 CFR
2013-07-01
... (CONUS), Alaska, Hawaii, and Puerto Rico; the Defense Industrial Security Clearance Office (DISCO), Columbus, Ohio; the Personnel Investigations Center (PIC) and National Computer Center (NCC) in Baltimore, Maryland; Office of Industrial Security International Europe (OISI-E), located in Brussels, Belgium with a...
Code of Federal Regulations, 2011 CFR
2011-07-01
... (CONUS), Alaska, Hawaii, and Puerto Rico; the Defense Industrial Security Clearance Office (DISCO), Columbus, Ohio; the Personnel Investigations Center (PIC) and National Computer Center (NCC) in Baltimore, Maryland; Office of Industrial Security International Europe (OISI-E), located in Brussels, Belgium with a...
Code of Federal Regulations, 2014 CFR
2014-07-01
... (CONUS), Alaska, Hawaii, and Puerto Rico; the Defense Industrial Security Clearance Office (DISCO), Columbus, Ohio; the Personnel Investigations Center (PIC) and National Computer Center (NCC) in Baltimore, Maryland; Office of Industrial Security International Europe (OISI-E), located in Brussels, Belgium with a...
Code of Federal Regulations, 2012 CFR
2012-07-01
... (CONUS), Alaska, Hawaii, and Puerto Rico; the Defense Industrial Security Clearance Office (DISCO), Columbus, Ohio; the Personnel Investigations Center (PIC) and National Computer Center (NCC) in Baltimore, Maryland; Office of Industrial Security International Europe (OISI-E), located in Brussels, Belgium with a...
75 FR 43486 - Proposed Information Collection; Comment Request; Special Comprehensive License
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment Request; Special Comprehensive License AGENCY: Bureau of Industry and Security, Commerce ACTION: Notice....gov . SUPPLEMENTARY INFORMATION: I. Abstract The Special Comprehensive License (SCL) procedure...
75 FR 18872 - Ginnie Mae Multiclass Securities Program Documents
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-13
... Securities Program Documents AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notice. SUMMARY... with the Multiclass Securities Program. The intent of the Multiclass Securities program is to increase... Securities Program Documents. OMB Approval Number: 2503-0030. Form Numbers: None. Description of the Need for...
12 CFR 748.0 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM, REPORT....0 Security program. (a) Each federally insured credit union will develop a written security program...
12 CFR 748.0 - Security program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM, REPORT....0 Security program. (a) Each federally insured credit union will develop a written security program...
Process Security in Chemical Engineering Education
ERIC Educational Resources Information Center
Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.
2005-01-01
The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…
49 CFR 1546.103 - Form, content, and availability of security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 9 2011-10-01 2011-10-01 false Form, content, and availability of security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program. (a...
49 CFR 1546.103 - Form, content, and availability of security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 9 2013-10-01 2013-10-01 false Form, content, and availability of security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program. (a...
Maritime security report number 1. August 1995
DOT National Transportation Integrated Search
1995-08-01
Maritime Security Reports are unclassified periodic publications prepared to inform the commercial maritime industry, senior Maritime Administration officials, the Secretary of Transportation's Office of Intelligence and Security, and the Security Su...
Recollections on Sixty Years of NBS Ionizing Radiation Programs for Energetic X Rays and Electrons1
Koch, H. William
2006-01-01
These recollections are on ionizing radiation programs at the National Bureau of Standards (NBS) that started in 1928 and ended in 1988 when NBS became the National Institute of Standards and Technology (NIST). The independent Council on Ionizing Radiation Measurements and Standards (CIRMS) was formed in 1992. This article focuses on how measurements and standards for x rays, gamma rays, and electrons with energies above 1 MeV began at NBS and how they progressed. It also suggests how the radiation processors of materials and foods, the medical radiographic and radiological industries, and the radiological protection interests of the government (including homeland security) represented in CIRMS can benefit from NIST programs. PMID:27274947
Security enhancement study for the U.S. motorcoach industry : executive summary
DOT National Transportation Integrated Search
2003-05-01
The Security Enhancement Study for the U.S. Motorcoach Industry was commissioned by the Federal Motor Carrier Safety Administration (FMCSA) and conducted by the John A. Volpe National Transportation Systems Center (Volpe Center). It was prepared to i...
78 FR 41032 - Proposed Information Collection; Comment Request; Special Comprehensive License
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-09
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment Request; Special Comprehensive License AGENCY: Bureau of Industry and Security. ACTION: Notice. [email protected] . SUPPLEMENTARY INFORMATION: I. Abstract The Special Comprehensive License (SCL) procedure...
NASA Astrophysics Data System (ADS)
Knudson, Christa K.; Kemp, Michael C.; Lombardo, Nicholas J.
2009-05-01
The U.S. Department of Homeland Security's Standoff Technology Integration and Demonstration Program is designed to accelerate the development and integration of technologies, concepts of operations, and training to defeat explosives attacks at large public events and mass transit facilities. The program will address threats posed by suicide bombers, vehicle-borne improvised explosive devices, and leave-behind bombs. The program is focused on developing and testing explosives countermeasure architectures using commercial off-the-shelf and near-commercial standoff and remotely operated detection technologies in prototypic operational environments. An important part of the program is the integration of multiple technologies and systems to protect against a wider range of threats, improve countermeasure performance, increase the distance from the venue at which screening is conducted, and reduce staffing requirements. The program will routinely conduct tests in public venues involving successively more advanced technology, higher levels of system integration, and more complex scenarios. This paper describes the initial field test of an integrated countermeasure system that included infrared, millimeter-wave, and video analytics technologies for detecting person-borne improvised explosive devices at a public arena. The test results are being used to develop a concept for the next generation of integrated countermeasures, to refine technical and operational requirements for architectures and technologies, and engage industry and academia in solution development.
Bulletin of the Division of Electrical Engineering, 1987-1988, volume 3, number 2
NASA Astrophysics Data System (ADS)
1988-05-01
A report is provided on the activities of the Division of Electrical Engineering of the National Research Council of Canada. The Division engages in the development of standards and test procedures, and undertakes applied research in support of Canadian industry, government departments, and universities. Technology transfer and collaborative research continue to grow in importance as focuses of Division activities. The Division is comprised of three sections: the Laboratory for Biomedical Engineering, the Laboratory for Electromagnetic and Power Engineering, and the Laboratory for Intelligent Systems. An agreement has been reached to commercially exploit the realtime multiprocessor operating system Harmony. The dielectrics group has made contract research agreements with industry from both Canada and the United States. The possibility of employing a new advanced laser vision camera, which can be mounted on a robot arm in a variety of industrial applications is being explored. Potential short-term spinoffs related to intelligent wheelchairs are being sought as part of the new interlaboratory program which has as its long-term objective the development of a mobile robot for health care applications. A program in applied artificial intelligence has been established. Initiatives in collaboration with outside groups include proposals for major institutes in areas ranging from police and security research to rehabilitation research, programs to enhance Canadian industrial competence working with the Canadian Manufacturers' Association and other government departments, and approaches to the utilization of existing facilities which will make them more valuable without significant financial expenditures.
Space technology transfer to developing countries: opportunities and difficulties
NASA Astrophysics Data System (ADS)
Leloglu, U. M.; Kocaoglan, E.
Space technology, with its implications on science, economy and security, is mostly chosen as one of the priority areas for technological development by developing countries. Most nations aspiring to begin playing in the space league prefer technology transfer programs as a first step. Decreasing initial costs by small satellite technology made this affordable for many countries. However, there is a long way from this first step to establishment of a reliable space industry that can both survive in the long term with limited financial support from the government and meet national needs. This is especially difficult when major defense companies of industrialized countries are merging to sustain their competitiveness. The prerequisites for the success are implementation of a well-planned space program and existence of industrialization that can support basic testing and manufacturing activities and supply qualified manpower. In this study, the difficulties to be negotiated and the vicious circles to be broken for latecomers, that is, developing countries that invest on space technologies are discussed. Especially, difficulties in the technology transfer process itself, brain drain from developing countries to industrialized countries, strong competition from big space companies for domestic needs, costs of establishing and maintaining an infrastructure necessary for manufacturing and testing activities, and finally, the impact of export control will be emphasized. We will also try to address how and to what extent collaboration can solve or minimize these problems. In discussing the ideas mentioned above, lessons learned from the BILSAT Project, a technology transfer program from the UK, will be referred.
A national-scale authentication infrastructure.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Butler, R.; Engert, D.; Foster, I.
2000-12-01
Today, individuals and institutions in science and industry are increasingly forming virtual organizations to pool resources and tackle a common goal. Participants in virtual organizations commonly need to share resources such as data archives, computer cycles, and networks - resources usually available only with restrictions based on the requested resource's nature and the user's identity. Thus, any sharing mechanism must have the ability to authenticate the user's identity and determine if the user is authorized to request the resource. Virtual organizations tend to be fluid, however, so authentication mechanisms must be flexible and lightweight, allowing administrators to quickly establish andmore » change resource-sharing arrangements. However, because virtual organizations complement rather than replace existing institutions, sharing mechanisms cannot change local policies and must allow individual institutions to maintain control over their own resources. Our group has created and deployed an authentication and authorization infrastructure that meets these requirements: the Grid Security Infrastructure. GSI offers secure single sign-ons and preserves site control over access policies and local security. It provides its own versions of common applications, such as FTP and remote login, and a programming interface for creating secure applications.« less
A Nuclear Energy Renaissance in the U.S.?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kessler, Carol E.; Mahy, Heidi A.; Ankrum, Al
2008-01-01
Is it time for a nuclear energy renaissance? Among other things, nuclear power is a carbon neutral source of base load power. With the growth in energy use expected over the next 20 years and the growing negative impacts of global climate changes, the cost of oil and gas, energy security and diversity concerns, and progress on advanced reactor designs, it may be the right time for nuclear power to enter a new age of growth. Asia and Russia are both planning for a nuclear renaissance. In Europe, Finland and France have both taken steps to pursue new nuclear reactors.more » U.S. utilities are preparing for orders of new reactors; one submitted a request to the U.S. Nuclear Regulatory Commission (NRC) to review its request to construct a new reactor on an existing site. What has the industry been doing since nuclear energy was birthed in the 1960s? In those days a bold new industry boasted that nuclear power in the United States was going to be “too cheap to meter”, but as we all know this did not come about for many reasons. Eventually, it became clear that industry had neglected to do its homework. Critiques of the industry were made on safety, security, environment, economic competitiveness (without government support), and nonproliferation. All of these factors need to be effectively addressed to promote the confidence and support of the public – without which a nuclear power program is not feasible.« less
Code of Federal Regulations, 2013 CFR
2013-01-01
... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS REPORTING OF OFFSETS AGREEMENTS IN SALES OF WEAPON SYSTEMS OR DEFENSE-RELATED ITEMS TO FOREIGN COUNTRIES OR FOREIGN FIRMS § 701.4 Procedures. (a) Reporting period. The Department of Commerce publishes a notice in the...
Code of Federal Regulations, 2010 CFR
2010-01-01
... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE..., or other relevant information and documents available to the Department of Commerce, or consult with... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Appeals. 700.81 Section 700.81...
15 CFR 700.51 - Requests for priority rating authority.
Code of Federal Regulations, 2010 CFR
2010-01-01
... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE... authorized include: (1) Production or construction equipment; (2) Computers when not used as production items... construction equipment. (1) A request for priority rating authority for production or construction equipment...
15 CFR 700.60 - General provisions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false General provisions. 700.60 Section 700.60 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Directives. 700.62 Section 700.62 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE...
15 CFR 700.61 - Rating Authorizations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Rating Authorizations. 700.61 Section 700.61 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS...
15 CFR 700.70 - General provisions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false General provisions. 700.70 Section 700.70 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS...
15 CFR 701.5 - Confidentiality.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Confidentiality. 701.5 Section 701.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS REPORTING OF...
Code of Federal Regulations, 2014 CFR
2014-01-01
... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS REPORTING OF OFFSETS AGREEMENTS IN SALES OF WEAPON SYSTEMS OR DEFENSE-RELATED ITEMS TO FOREIGN COUNTRIES OR FOREIGN FIRMS § 701.4 Procedures. (a) Reporting period. The Department of Commerce publishes a notice in the...
Code of Federal Regulations, 2012 CFR
2012-01-01
... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS REPORTING OF OFFSETS AGREEMENTS IN SALES OF WEAPON SYSTEMS OR DEFENSE-RELATED ITEMS TO FOREIGN COUNTRIES OR FOREIGN FIRMS § 701.4 Procedures. (a) Reporting period. The Department of Commerce publishes a notice in the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS REPORTING OF OFFSETS AGREEMENTS IN SALES OF WEAPON SYSTEMS OR DEFENSE-RELATED ITEMS TO FOREIGN COUNTRIES OR FOREIGN FIRMS § 701.4 Procedures. (a) Reporting period. The Department of Commerce publishes a notice in the...
49 CFR 1548.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2014 CFR
2014-10-01
... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2014-10-01 2014-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...
49 CFR 1548.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2010-10-01 2010-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...
49 CFR 1548.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2013-10-01 2013-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...
49 CFR 1548.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2011-10-01 2011-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...
15 CFR 700.91 - Records and reports.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Records and reports. 700.91 Section 700.91 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS...
77 FR 25133 - Order Temporarily Denying Export Privileges
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-27
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Order Temporarily Denying Export Privileges... Section 766.24 of the Export Administration Regulations (``EAR'' or the ``Regulations''),\\1\\ the Bureau of Industry and Security (``BIS''), U.S. Department of Commerce, through its Office of Export Enforcement...
15 CFR 700.90 - Protection against claims.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Protection against claims. 700.90 Section 700.90 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS...
15 CFR 701.3 - Applicability and scope.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Applicability and scope. 701.3 Section 701.3 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS...
15 CFR 700.53 - Criteria for assistance.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 15 Commerce and Foreign Trade 2 2012-01-01 2012-01-01 false Criteria for assistance. 700.53 Section 700.53 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS...
15 CFR 700.53 - Criteria for assistance.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false Criteria for assistance. 700.53 Section 700.53 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS...
15 CFR 700.53 - Criteria for assistance.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false Criteria for assistance. 700.53 Section 700.53 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS...
15 CFR 700.53 - Criteria for assistance.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 15 Commerce and Foreign Trade 2 2014-01-01 2014-01-01 false Criteria for assistance. 700.53 Section 700.53 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS...
15 CFR 700.53 - Criteria for assistance.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Criteria for assistance. 700.53 Section 700.53 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS...
2008-06-01
of Defence, and seven of the world’s larg- est aerospace and defense (A&D) companies . These parties have come together to address one problem: how to...partner would then be responsible for verifying when employees exit the program or leave the company for whatever reason, and Boeing would not have to...uses business-to-business, or B2B , encryption to exchange encrypted and digitally signed e-mail. This provides en- crypted e-mail on a user-to-user
A Nation of Programs with No System - An Apprenticeship in America
1993-04-01
interpretation of "apprenticeship", it could safely be said that the U.S. government has funded approximately $15 - 20 million per year over the past decade to... Past or a Useful Tool For Our Globally Competitive Economic Future? Keith J. Boi Faculty Research AdWvsor Dr. John E. Bokel The Industrial College of...NO. ACCESSION NO. 1 1. TITLE (Include Security Classification) 12. PERSONAL AUTHOR(S) 13a. TYPE OF REPORT 13b. TIME COVERED 14. DATE OF REPORT ( Year
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1987-12-31
This report also provides data on the initiatives being implemented as a result of the review of domestic airport security by the Secretary’s Safety...enforcement support for airline and airport security measures. Finally, the passengers-the ultimate beneficiaries of the security program--pay for...of these airports is required to implement a security program which provides a secure operating environment for these air carriers. Airport security programs
Effectiveness of the Civil Aviation Security Program.
1979-12-05
The airline and airport security measures currently in effect continue to provide increased safety for airline passengers and crews as well as...107 governing airport security . other ongoing programs which contributed significantly to airport security included the training of law enforce- ment...officers supporting airport security programs and the explosives detection K(9 team program. Highlights of these actions and programs are summarized
Solar energy: An investment in our nation`s energy and economic security
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1995-08-01
The Solar Energy Industries Association (SEIA) is the national trade organization of the photovoltaics and solar thermal manufacturers and component suppliers. The solar energy industries are engaged in aggressive efforts to develop, validate, and deploy solar energy systems for a wide variety of applications in every sector of our economy. In many cases. these efforts are being implemented in partnership with the US DOE and its laboratories. These partnerships are heavily cost-shared by industry and were entered into in good faith by companies and corporations willing to include their significant cost-share in their multi-year budget planning. The result is amore » set of highly leveraged programs that are on-budget, on-time, and are working. The authors feel confident that those who take the time to look will see the compelling benefits of continued investment in solar energy.« less
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
The Economic Impact of the Homeland Security Advisory System: The Cost of Heightened Border Security
2008-12-01
the United States. Secondary economic impacts of the HSAS such as the airline industry , lost tourism , and retail business from cross-border...Ontario and its businesses. The study is aimed at the trucking, automotive, and tourism industries ; and how they are impacted by border delays. The...19 A. DETROIT-WINDSOR AND THE AUTOMOTIVE INDUSTRY ............19 B. THE AMBASSADOR BRIDGE SYSTEM .................................................21
An approach to quality and security of supply for single-use bioreactors.
Barbaroux, Magali; Gerighausen, Susanne; Hackel, Heiko
2014-01-01
Single-use systems (also referred to as disposables) have become a huge part of the bioprocessing industry, which raised concern in the industry regarding quality and security of supply. Processes must be in place to assure the supply and control of outsourced activities and quality of purchased materials along the product life cycle. Quality and security of supply for single-use bioreactors (SUBs) are based on a multidisciplinary approach. Developing a state-of-the-art SUB-system based on quality by design (QbD) principles requires broad expertise and know-how including the cell culture application, polymer chemistry, regulatory requirements, and a deep understanding of the biopharmaceutical industry. Using standardized products reduces the complexity and strengthens the robustness of the supply chain. Well-established supplier relations including risk mitigation strategies are the basis for achieving long-term security of supply. Well-developed quality systems including change control approaches aligned with the requirements of the biopharmaceutical industry are a key factor in supporting long-term product availability. This chapter outlines the approach to security of supply for key materials used in single-use production processes for biopharmaceuticals from a supplier perspective.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-12
... Commerce, Room 6616, 14th and Constitution Avenue NW., Washington, DC 20230 (or via the Internet at JJessup... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment Request; Licensing Responsibilities and Enforcement AGENCY: Bureau of Industry and Security, Commerce...
77 FR 54559 - Proposed Information Collection; Comment Request; Offsets in Military Exports
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-05
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment Request; Offsets in Military Exports AGENCY: Bureau of Industry and Security, Department of Commerce. ACTION: Notice. SUMMARY: The Department of Commerce, as part of its continuing effort to reduce paperwork...
78 FR 38922 - Order Relating to Billy L. Powell, Sr.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-28
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Order Relating to Billy L. Powell, Sr. In the Matter of: Billy L. Powell, Sr., 1911 Hickory Creek, Kingwood, TX 77339, Respondent. The Bureau of Industry and Security, U.S. Department of Commerce (``BIS''), [[Page 38923
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-16
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment Request; Chemical Weapons Convention Provisions of the Export Administration Regulations AGENCY: Bureau of Industry and Security, Commerce. ACTION: Notice. SUMMARY: The Department of Commerce, as part of its...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-11
..., Consolidation and Dissemination of Quotation and Transaction Information for Nasdaq-Listed Securities Traded on... Exchange, Inc., Financial Industry Regulatory Authority, Inc., International Securities Exchange LLC...-Regulatory Organization Plan Governing the Collection, Consolidation, and Dissemination of Quotation and...
15 CFR 701.6 - Violations, penalties, and remedies.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Violations, penalties, and remedies. 701.6 Section 701.6 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE...
15 CFR 700.74 - Violations, penalties, and remedies.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Violations, penalties, and remedies. 700.74 Section 700.74 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE...
NASA Astrophysics Data System (ADS)
Sumriddetchkajorn, Sarun
2015-01-01
Throughout my experience in photonics engineering, this article shows that photonics is indeed a key technology enabler for enhancing our competitiveness. In particular, I snapshot the achievements of NECTEC research teams in implementing devices and systems suitable for healthcare, homeland security, agriculture, and industry.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-12
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment Request; Short Supply Regulations, Petroleum (Crude Oil) AGENCY: Bureau of Industry and Security. ACTION... supporting documentation for license applications to export petroleum (crude oil) and is used by licensing...
2011 Computation Directorate Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crawford, D L
2012-04-11
From its founding in 1952 until today, Lawrence Livermore National Laboratory (LLNL) has made significant strategic investments to develop high performance computing (HPC) and its application to national security and basic science. Now, 60 years later, the Computation Directorate and its myriad resources and capabilities have become a key enabler for LLNL programs and an integral part of the effort to support our nation's nuclear deterrent and, more broadly, national security. In addition, the technological innovation HPC makes possible is seen as vital to the nation's economic vitality. LLNL, along with other national laboratories, is working to make supercomputing capabilitiesmore » and expertise available to industry to boost the nation's global competitiveness. LLNL is on the brink of an exciting milestone with the 2012 deployment of Sequoia, the National Nuclear Security Administration's (NNSA's) 20-petaFLOP/s resource that will apply uncertainty quantification to weapons science. Sequoia will bring LLNL's total computing power to more than 23 petaFLOP/s-all brought to bear on basic science and national security needs. The computing systems at LLNL provide game-changing capabilities. Sequoia and other next-generation platforms will enable predictive simulation in the coming decade and leverage industry trends, such as massively parallel and multicore processors, to run petascale applications. Efficient petascale computing necessitates refining accuracy in materials property data, improving models for known physical processes, identifying and then modeling for missing physics, quantifying uncertainty, and enhancing the performance of complex models and algorithms in macroscale simulation codes. Nearly 15 years ago, NNSA's Accelerated Strategic Computing Initiative (ASCI), now called the Advanced Simulation and Computing (ASC) Program, was the critical element needed to shift from test-based confidence to science-based confidence. Specifically, ASCI/ASC accelerated the development of simulation capabilities necessary to ensure confidence in the nuclear stockpile-far exceeding what might have been achieved in the absence of a focused initiative. While stockpile stewardship research pushed LLNL scientists to develop new computer codes, better simulation methods, and improved visualization technologies, this work also stimulated the exploration of HPC applications beyond the standard sponsor base. As LLNL advances to a petascale platform and pursues exascale computing (1,000 times faster than Sequoia), ASC will be paramount to achieving predictive simulation and uncertainty quantification. Predictive simulation and quantifying the uncertainty of numerical predictions where little-to-no data exists demands exascale computing and represents an expanding area of scientific research important not only to nuclear weapons, but to nuclear attribution, nuclear reactor design, and understanding global climate issues, among other fields. Aside from these lofty goals and challenges, computing at LLNL is anything but 'business as usual.' International competition in supercomputing is nothing new, but the HPC community is now operating in an expanded, more aggressive climate of global competitiveness. More countries understand how science and technology research and development are inextricably linked to economic prosperity, and they are aggressively pursuing ways to integrate HPC technologies into their native industrial and consumer products. In the interest of the nation's economic security and the science and technology that underpins it, LLNL is expanding its portfolio and forging new collaborations. We must ensure that HPC remains an asymmetric engine of innovation for the Laboratory and for the U.S. and, in doing so, protect our research and development dynamism and the prosperity it makes possible. One untapped area of opportunity LLNL is pursuing is to help U.S. industry understand how supercomputing can benefit their business. Industrial investment in HPC applications has historically been limited by the prohibitive cost of entry, the inaccessibility of software to run the powerful systems, and the years it takes to grow the expertise to develop codes and run them in an optimal way. LLNL is helping industry better compete in the global market place by providing access to some of the world's most powerful computing systems, the tools to run them, and the experts who are adept at using them. Our scientists are collaborating side by side with industrial partners to develop solutions to some of industry's toughest problems. The goal of the Livermore Valley Open Campus High Performance Computing Innovation Center is to allow American industry the opportunity to harness the power of supercomputing by leveraging the scientific and computational expertise at LLNL in order to gain a competitive advantage in the global economy.« less
44 CFR 8.3 - Senior FEMA official responsible for the information security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for the information security program. The Director of the Security...
Overview of the Biomass Scenario Model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Peterson, S.; Peck, C.; Stright, D.
2015-02-01
Biofuels are promoted in the United States through legislation, as one part of an overall strategy to lessen dependence on imported energy as well as to reduce the emissions of greenhouse gases (Office of the Biomass Program and Energy Efficiency and Renewable Energy, 2008). For example, the Energy Independence and Security Act of 2007 (EISA) mandates 36 billion gallons of renewable liquid transportation fuel in the U.S. marketplace by the year 2022 (U.S. Government, 2007). Meeting the volumetric targets has prompted an unprecedented increase in funding for biofuels research, much of it focused on producing ethanol and other fuel typesmore » from cellulosic feedstocks as well as additional biomass sources (such as oil seeds and algae feedstock). In order to help propel the biofuels industry, the U.S. government has enacted a variety of incentive programs (including subsidies, fixed capital investment grants, loan guarantees, vehicle choice credits, and corporate average fuel economy standards) -- the short-and long-term ramifications of which are not well understood. Efforts to better understand the impacts of incentive strategies can help policy makers to develop a policy suite which will foster industry development while reducing the financial risk associated with government support of the nascent biofuels industry.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Xu; Marnay, Chris; Feng, Wei
The Chinese government has paid growing attention to renewable energy development and has set ambitious goals for carbon dioxide (CO2) emissions reduction and energy savings. Smart grid (SG) technologies have been regarded as emerging ways to integrate renewable energy and to help achieve these climate and energy goals. This report first reviews completed SG demonstrations under the U.S. American Recovery and Reinvestment Act (ARRA); especially two key programs: the SG Investment Grant (SGIG) and the SG Demonstration Project (SGDP). Under the SGIG, the larger of the two programs, over $3.4 billion was used to help industry deploy existing advanced SGmore » technologies and tools to improve grid performance and reduce costs. Including industry investment, a total of $8 billion was spent on 99 cost-shared projects, which involved more than 200 participating electric utilities and other organizations. These projects aimed to modernize the electric grid, strengthen cyber security, improve interoperability, and collect comprehensive data on SG operations and benefits.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-04
... To Adopt FINRA Rules 4314 (Securities Loans and Borrowings), 4330 (Customer Protection--Permissible Use of Customers' Securities) and 4340 (Callable Securities) in the Consolidated FINRA Rulebook, as... loans and borrowings, permissible use of customers' securities, and callable securities as FINRA Rules...
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1983-01-01
The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... Price, Managing Director, Securities Industry and Financial Markets Association, dated October 4, 2012... other industry professionals will have difficulty pricing options during Limit States and Straddle... conditions have changed and (ii) gaming the obvious error rule to retroactively adjust market maker quotes by...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-20
... Securities Industry Automation Corporation as OPRA's Independent System Capacity Advisor October 14, 2010... would reflect the fact that OPRA has selected the Securities Industry Automation Corporation (``SIAC..., in that capacity, provided the data processing services needed to develop, operate and maintain the...
15 CFR 758.5 - Conformity of documents and unloading of items.
Code of Federal Regulations, 2010 CFR
2010-01-01
... disposition from BIS. (ii) Contact information. U.S. Department of Commerce, Bureau of Industry and Security... Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION... documents. When a license is issued by BIS, the information entered on related export control documents (e.g...
75 FR 75453 - Proposed Information Collection; Comment Request; Technical Data Letter of Explanation
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-03
... Request; Technical Data Letter of Explanation AGENCY: Bureau of Industry and Security. ACTION: Notice....gov . SUPPLEMENTARY INFORMATION: I. Abstract These technical data letters of explanation will assure the Bureau of Industry and Security that U.S.-origin technical data will be exported only for...
15 CFR 748.15 - Authorization Validated End-User (VEU).
Code of Federal Regulations, 2010 CFR
2010-01-01
..., Bureau of Industry and Security, U.S. Department of Commerce, 14th Street and Pennsylvania Avenue, NW... People's Republic of China. (2) India. (c) Item restrictions. Items controlled under the EAR for missile... Services, Bureau of Industry and Security, U.S. Department of Commerce, 14th Street and Constitution Avenue...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-14
... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Parts 740, 743, and 774 [Docket No. 110124056-1301-02] RIN 0694-AF11 Wassenaar Arrangement 2010 Plenary Agreements Implementation: Commerce Control List, Definitions, Reports; Correction AGENCY: Bureau of Industry and Security, Commerce. ACTION...
15 CFR 782.5 - Where to obtain APR report forms.
Code of Federal Regulations, 2010 CFR
2010-01-01
... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS GENERAL... forms required by the APR may be downloaded from the Internet at http://www.ap.gov. You also may obtain these forms by contacting: Treaty Compliance Division, Bureau of Industry and Security, U.S. Department...
15 CFR 782.5 - Where to obtain APR report forms.
Code of Federal Regulations, 2013 CFR
2013-01-01
... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS GENERAL... forms required by the APR may be downloaded from the Internet at http://www.ap.gov. You also may obtain these forms by contacting: Treaty Compliance Division, Bureau of Industry and Security, U.S. Department...
15 CFR 782.5 - Where to obtain APR report forms.
Code of Federal Regulations, 2011 CFR
2011-01-01
... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS GENERAL... forms required by the APR may be downloaded from the Internet at http://www.ap.gov. You also may obtain these forms by contacting: Treaty Compliance Division, Bureau of Industry and Security, U.S. Department...
15 CFR 782.5 - Where to obtain APR report forms.
Code of Federal Regulations, 2012 CFR
2012-01-01
... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS GENERAL... forms required by the APR may be downloaded from the Internet at http://www.ap.gov. You also may obtain these forms by contacting: Treaty Compliance Division, Bureau of Industry and Security, U.S. Department...
15 CFR 782.5 - Where to obtain APR report forms.
Code of Federal Regulations, 2014 CFR
2014-01-01
... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS GENERAL... forms required by the APR may be downloaded from the Internet at http://www.ap.gov. You also may obtain these forms by contacting: Treaty Compliance Division, Bureau of Industry and Security, U.S. Department...
15 CFR 700.73 - Notification of failure to comply.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Notification of failure to comply. 700.73 Section 700.73 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
... industry standard for processing and settling mutual fund transactions. Through automated, standardized... trend in the mutual fund industry toward omnibus processing, a practice where distribution firms bundle... to Fund/SERV[supreg] Fees November 20, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-01
... International Securities Exchange, LLC Amended and Restated Constitution January 28, 2013. Pursuant to Section... Restated Constitution \\3\\ (the ``Constitution'') to: (i) Declassify the Non- Industry Directors (including... Constitution requires, in part, that Non-Industry Directors (including the Public Directors) \\4\\ and Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
... entered into an order management system (including orders received via telephone or instant message) and... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69561; File No. SR-FINRA-2013-013] Self..., 2013, Financial Industry Regulatory Authority, Inc. (``FINRA'') filed with the Securities and Exchange...
15 CFR 700.54 - Instances where assistance will not be provided.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Instances where assistance will not be provided. 700.54 Section 700.54 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL...
15 CFR 700.54 - Instances where assistance will not be provided.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false Instances where assistance will not be provided. 700.54 Section 700.54 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL...
15 CFR 700.15 - Extension of priority ratings.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS... receipt of a DO-A3 rated order for a navigation system and needs to purchase semiconductors for its manufacture, that person must use a DO-A3 rated order to obtain the needed semiconductors. (b) The priority...
5 CFR 1312.12 - Security Program Review Committee.
Code of Federal Regulations, 2011 CFR
2011-01-01
... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Security Program Review Committee. 1312...
5 CFR 1312.12 - Security Program Review Committee.
Code of Federal Regulations, 2010 CFR
2010-01-01
... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security Program Review Committee. 1312...
1995-06-01
required, the Defense Technology Security Administration ( DTSA ) will make a determination on whether or not advanced technologies are being risked by the...sale or transfer of that product. DTSA has this role whether it is a commercial or government-to-government transfer. The Joint Chiefs of Staff also...Office of Defense Relations Security Assistance DSAA Defense Security Assistance Agency DTIB Defense Technological and Industrial Base DTSA Defense
Programmable Logic Controllers for Research on the Cyber Security of Industrial Power Plants
2017-02-12
group . 15. SUBJECT TERMS Industrial control systems, cyber security 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b. ABSTRACT c. THIS...currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (00-MM-YYYY) ,2. REPORT TYPE 3. DATES COVERED...From- To) 12/02/2017 Final 15 August 2015 - 12 February 2017 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Programmable Logic Controllers for Research
Computer Network Security: Best Practices for Alberta School Jurisdictions.
ERIC Educational Resources Information Center
Alberta Dept. of Education, Edmonton.
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-13
... Change Relating to Post-Trade Transparency for Agency Pass-Through Mortgage-Backed Securities Traded in... and dissemination of transactions in TRACE- Eligible Securities that are: (1) Agency Pass-Through... Security, Agency Pass-Through Mortgage-Backed Security, Specified Pool Transaction, Asset-Backed Security...
Code of Federal Regulations, 2010 CFR
2010-07-01
... continuation of assignment is not clearly consistent with the national interest. (d) Completed security forms (DD Form 398, Personnel Security Questionnaire (BI/SBI), or 398-2, Personnel Security Questionnaire (National Agency Check)) shall be forwarded to the Defense Industrial Security Clearance Office (DISCO...
NASA Astrophysics Data System (ADS)
Shuja Syed, Ahmed
2013-12-01
The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want to thank the Organizing Committee, the Institutions and Sponsors supporting the Conference, especially 'Centre for Emerging Sciences, Engineering & Technology (CESET), Islamabad', the IOP Publishers and everyone who contributed to the organization of this meeting, for their invaluable efforts to make this event a great success. Professor Dr Ahmed Shuja Syed Chief Editor The PDF also contains lists of the boards, committees and sponsors.
7 CFR 772.6 - Subordination of security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.6 Subordination of security. (a) Eligibility. The Agency shall grant a subordination of Minor Program loan security when the transaction will... still be adequately secured after the subordination, or the value of the loan security will be increased...
Security Classification Reform: The Waiting Agenda.
ERIC Educational Resources Information Center
Relyea, Harold C.
1993-01-01
Provides an overview of security classification reform for consideration by the Clinton administration and the 103rd Congress. Historical background and current issues related to the security classification of information, personnel security clearances, and industrial safeguarding of classified information are discussed. A checklist of basic…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-28
... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Parts 734, 738, 740, 742, 772, and... Based Upon a Systematic Review of the Commerce Control List: Additional Changes AGENCY: Bureau of Industry and Security, Commerce. ACTION: Final rule. SUMMARY: This rule amends the Export Administration...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-07
... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 [Docket No. 120320200-2296-01] RIN 0694-AF62 Editorial Corrections to the Commerce Control List of the Export Administration Regulations AGENCY: Bureau of Industry and Security, Commerce. ACTION: Final rule. SUMMARY: This final rule...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-22
... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Parts 730 and 744 [Docket No... Declared in Executive Orders 12947 and 13224 AGENCY: Bureau of Industry and Security, Commerce. ACTION... to assess all costs and benefits of available regulatory alternatives and, if regulation is necessary...
15 CFR 745.2 - End-Use Certificate reporting requirements under the Chemical Weapons Convention.
Code of Federal Regulations, 2010 CFR
2010-01-01
... by mail or courier delivery to the following address: Information Technology Team, Treaty Compliance Division, Bureau of Industry and Security, U.S. Department of Commerce, Room 4515, 14th Street and... Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE...
78 FR 76741 - Revisions to the Export Administration Regulations (EAR): Unverified List (UVL)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-19
... of Defense Trade Controls of the Department of State by: Precluding access to; refusing to provide... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Parts 730, 740, 744, 756, 758, and..., Bureau of Industry and Security, Department of Commerce, Phone: (202) 482-2385 or by email at Kevin...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-09
... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 748 [Docket No. 100826397-1059-02] RIN 0694-AE98 Simplified Network Application Processing System, On-line Registration and Account Maintenance AGENCY: Bureau of Industry and Security, Commerce. ACTION: Final rule. SUMMARY: The Bureau of...
Impact Upon U.S. Security of a South African Nuclear Weapons Capability.
1981-04-01
Simon Brand, dubbed the international companies as the " engine of growth" for the South African economy. The petroleum market, automobile industry , and...thereby halting the flow of metals key to high technology industries which in turn, are critical to U.S. national security. Should Washington’s...to produce nuclear weapons." * More specifically, we found that South Africa has: A sufficient scientific and industrial base on which to conduct
Security and Resilience | Grid Modernization | NREL
Security and Resilience Security and Resilience NREL develops tools and solutions to enable a more Consortium, NREL collaborates with industry, academia, and other research organizations to find solutions to
Karvetski, Christopher W; Lambert, James H; Linkov, Igor
2011-04-01
Military and industrial facilities need secure and reliable power generation. Grid outages can result in cascading infrastructure failures as well as security breaches and should be avoided. Adding redundancy and increasing reliability can require additional environmental, financial, logistical, and other considerations and resources. Uncertain scenarios consisting of emergent environmental conditions, regulatory changes, growth of regional energy demands, and other concerns result in further complications. Decisions on selecting energy alternatives are made on an ad hoc basis. The present work integrates scenario analysis and multiple criteria decision analysis (MCDA) to identify combinations of impactful emergent conditions and to perform a preliminary benefits analysis of energy and environmental security investments for industrial and military installations. Application of a traditional MCDA approach would require significant stakeholder elicitations under multiple uncertain scenarios. The approach proposed in this study develops and iteratively adjusts a scoring function for investment alternatives to find the scenarios with the most significant impacts on installation security. A robust prioritization of investment alternatives can be achieved by integrating stakeholder preferences and focusing modeling and decision-analytical tools on a few key emergent conditions and scenarios. The approach is described and demonstrated for a campus of several dozen interconnected industrial buildings within a major installation. Copyright © 2010 SETAC.
15 CFR 2008.16 - Security education program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16... REPRESENTATIVE Safeguards § 2008.16 Security education program. (a) The Office of the Special Representative for... charged with the implementation of this security education program and shall issue detailed procedures for...
2009-04-21
6 Intercity Passenger Rail Program (Amtrak) .....................................................................6... Intercity Bus Security Grant Program..............................................................................7 Trucking Security Program...continue security enhancements for its intercity rail services between high-risk urban areas. 20 U.S. Department of Homeland Security, Federal Emergency
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-16
... measure their effectiveness. Through its voluntary Corporate Security Review (CSR) Program, TSA's Highway... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent To Request Approval From OMB of One New Public Collection of Information: Security Program for Hazardous Materials Motor...
ERIC Educational Resources Information Center
Branstad, Dennis K., Ed.
The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…
Code of Federal Regulations, 2010 CFR
2010-01-01
... AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.2 Purpose. These regulations set forth the procedures by which the Department shall commence and conduct an investigation to determine the effect on the national security of...
FAA bulk technology overview for explosives detection
NASA Astrophysics Data System (ADS)
Novakoff, Alan K.
1993-04-01
The Federal Aviation Administration (FAA) is the leading federal agency responsible for encouraging and fostering the development of a safe, secure, and efficient national airspace system (NAS). Our goal is to establish an operating environment that ensures a threat-free system to preclude acts of terrorism and fatalities. As part of the process to meet this goal, our research and development activities continually search for technologies to ensure aviation security. Recent acts of terrorism against the aviation community have demonstrated an increasing level of sophistication in the design and deployment of explosive devices. In order to prevent the introduction of explosives onto an aircraft they must be detected prior to passenger and baggage loading. The Bulk Detection program is one method of developing a number of technologies that 'see' into and 'alarm' on suspect baggage. These detection devices must be capable of providing this serve with a confidence commensurate with the state-of-the- art available today. This program utilizes the expertise of government agencies, universities and industries working toward constructing their plans and executing their designs to produce the best available equipment.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sketchley, J A; Kotta, P; De Yoreo, J
The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Laboratory Science and Technology Office, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration in national security, energy security, environmental management, bioscience and technology to improve human health, and breakthroughs in fundamental science and technology. The accomplishments described in this Annual Report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals.more » The LDRD budget of $92 million for FY2006 sponsored 188 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest technical staff and for establishing collaborations with universities, industry, and other scientific and research institutions. By keeping the Laboratory at the forefront of science and technology, the LDRD Program enables us to meet our mission challenges, especially those of our ever-evolving national security mission.« less
The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Russell, J. W.; Ahumada, A. D.; Blanchard, T. A.
After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a “dirty bomb.” In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilianmore » sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRI’s Russia Orphan Source Recovery Project, managed at the Nevada National Security Site’s North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company “Isotope” has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.« less
NASA Astrophysics Data System (ADS)
Battalora, L.; Prasad, M.
2017-12-01
Context/PurposeThe typical oil and gas project lifecycle includes acquisition, exploration, drilling, production, and decommissioning phases. The oil and gas industry (Industry) has become proactive in identifying and mitigating health, safety, security, environment, and social responsibility risks during these phases as well as designing for sustainable development. With many fields reaching the end stages of the lifecycle, Industry is faced with the challenge of identifying and evaluating risks in the decommissioning phase. The level of challenge is increased when planning for the decommissioning of offshore wells. This paper describes tools that can be applied in the multidisciplinary design of the decommissioning program including use of the United Nations Sustainable Development Goals (SDGs). MethodsStakeholder engagement is key to a successful project. Typical stakeholders in an oil and gas project include the community, regulatory agencies, federal, state, and local governments, private investors, academia, and non-governmental organizations. Before engagement begins, stakeholders must be identified as well as their level of influence in the project. Relationships between stakeholders are "mapped" providing a better understanding of priorities and areas of concentration. Project risks are identified and ranked according to likelihood and impact. Mitigations are matched to risks. Sustainable development is implemented through acknowledgement of societal, economic, and environmental impacts in engineering design. InterpretationRecently, the United Nations Development Programme (UNDP), the International Finance Corporation (IFC) and IPIECA, the global oil and gas industry association for environmental and social issues, partnered to develop the publication, Mapping the oil and gas industry to the Sustainable Development Goals: An Atlas. SDGs have been linked to Industry operations and can serve as a guide for the offshore decommissioning phase ConclusionA multidisciplinary approach using stakeholder engagement and risk identification tools and the United Nations Sustainable Development Goals is recommended for designing the decommissioning program of offshore wells. This recommendation also applies to onshore decommissioning programs.
2010-12-01
relevant requirements, analyzed 2006 through 2009 security operations data, interviewed federal and industry officials, and made observations at five...warranted, acted on all findings and recommendations resulting from five agency- contracted studies on ferry security completed in 2005 and 2006 ...Figure 5: Security Deficiencies by Vessel Type, 2006 through 2009 27 Figure 6: Security Deficiencies by Facility Type, 2006 through 2009 28
The DISAM Journal of International Security Assistance Management. Volume 3, Number 4
2010-03-01
enough to help create jobs and build up the UAE industry . Still, for the near term, the United States stands to benefi t from several major projects ... PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Defense Institute of Security Assistance...it was amazing to see what industry brought to the table as far as platforms and capabilities. Industry has made it clear that they can build the
2017-06-09
revenue was generated from living resources such as fish, non-living resources such as oil, and ecosystems and ecosystem processes such as tourism ...however, based on the size of Jamaica’s tourism industry and other ocean economy related industries it is reasonable to conclude that it is a...and other marine resources eventually leads to damaged beaches and coastlines, and ultimately damages tourism and other industries. Though Jamaicans
The role of optics in secure credentials
NASA Astrophysics Data System (ADS)
Lichtenstein, Terri L.
2006-02-01
The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.
DOT National Transportation Integrated Search
2013-07-29
The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...
Solar thermal program summary. Volume 1: Overview, fiscal year 1988
NASA Astrophysics Data System (ADS)
1989-02-01
The goal of the solar thermal program is to improve overall solar thermal systems performance and provide cost-effective energy options that are strategically secure and environmentally benign. Major research activities include energy collection technology, energy conversion technology, and systems and applications technology for both CR and DR systems. This research is being conducted through research laboratories in close coordination with the solar thermal industry, utilities companies, and universities. The Solar Thermal Technology Program is pursuing the development of critical components and subsystems for improved energy collection and conversion devices. This development follows two basic paths: for CR systems, critical components include stretched membrane heliostats, direct absorption receivers (DARs), and transport subsystems for molten salt heat transfer fluids. These components offer the potential for a significant reduction in system costs; and for DR systems, critical components include stretched membrane dishes, reflux receivers, and Stirling engines. These components will significantly increase system reliability and efficiency, which will reduce costs. The major thrust of the program is to provide electric power. However, there is an increasing interest in the use of concentrated solar energy for applications such as detoxifying hazardous wastes and developing high-value transportable fuels. These potential uses of highly concentrated solar energy still require additional experiments to prove concept feasibility. The program goal of economically competitive energy reduction from solar thermal systems is being cooperatively addressed by industry and government.
Vaccine innovation: lessons from World War II.
Hoyt, Kendall
2006-01-01
World War II marked a watershed in the history of vaccine development as the military, in collaboration with academia and industry, achieved unprecedented levels of innovation in response to war-enhanced disease threats such as influenza and pneumococcal pneumonia. In the 1940s alone, wartime programs contributed to the development of new or significantly improved vaccines for 10 of the 28 vaccine-preventable diseases identified in the 20th century. This article examines the historical significance of military organizations and national security concerns for vaccine development in the United States.
ERIC Educational Resources Information Center
Warfield, Douglas L.
2011-01-01
The evolution of information technology has included new methodologies that use information technology to control and manage various industries and government activities. Information Technology has also evolved as its own industry with global networks of interconnectivity, such as the Internet, and frameworks, models, and methodologies to control…
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1984-04-13
AD-fl143 023 SEMIANNUAL REPORT TO CONGRESS ON THEUEFFECTIVENESS OF i/i THE CIVIL AVIATION SECURITY PROGRAM(U) FEDERAL AVIATION ADMINISTRATION...Semiannual Report to O Congress on the US Deportmnent of TrasEffectiveness ofi of TransportationFedewl Avkffim Avao The Civil Aviation - Security Program... Aviation Security Program 8. Performing OrgniaetioNi RePwt Us. Aviation Security Division 9. Performing Organistion Name and Address 10. Work Unit No
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2012 CFR
2012-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2014 CFR
2014-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2011 CFR
2011-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2013 CFR
2013-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
48 CFR 204.470-2 - National security exclusion.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false National security... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... associated with such activities, with direct national security significance. (b) In order to ensure that all...
Space Congress, 27th, Cocoa Beach, FL, Apr. 24-27, 1990, Proceedings
NASA Technical Reports Server (NTRS)
1990-01-01
The present symposium on aeronautics and space encompasses DOD research and development, science payloads, small microgravity carriers, the Space Station, technology payloads and robotics, commercial initiatives, STS derivatives, space exploration, and DOD space operations. Specific issues addressed include the use of AI to meet space requirements, the Astronauts Laboratory Smart Structures/Skins Program, the Advanced Liquid Feed Experiment, an overview of the Spacelab program, the Autonomous Microgravity Industrial Carrier Initiative, and the Space Station requirements and transportation options for a lunar outpost. Also addressed are a sensor-data display for telerobotic systems, the Pegasus and Taurus launch vehicles, evolutionary transportation concepts, the upgrade of the Space Shuttle avionics, space education, orbiting security sentinels, and technologies for improving launch-vehicle responsiveness.
Los Alamos Neutron Science Center
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kippen, Karen Elizabeth
For more than 30 years the Los Alamos Neutron Science Center (LANSCE) has provided the scientific underpinnings in nuclear physics and material science needed to ensure the safety and surety of the nuclear stockpile into the future. In addition to national security research, the LANSCE User Facility has a vibrant research program in fundamental science, providing the scientific community with intense sources of neutrons and protons to perform experiments supporting civilian research and the production of medical and research isotopes. Five major experimental facilities operate simultaneously. These facilities contribute to the stockpile stewardship program, produce radionuclides for medical testing, andmore » provide a venue for industrial users to irradiate and test electronics. In addition, they perform fundamental research in nuclear physics, nuclear astrophysics, materials science, and many other areas. The LANSCE User Program plays a key role in training the next generation of top scientists and in attracting the best graduate students, postdoctoral researchers, and early-career scientists. The U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA) —the principal sponsor of LANSCE—works with the Office of Science and the Office of Nuclear Energy, which have synergistic long-term needs for the linear accelerator and the neutron science that is the heart of LANSCE.« less
Analysis on the University’s Network Security Level System in the Big Data Era
NASA Astrophysics Data System (ADS)
Li, Tianli
2017-12-01
The rapid development of science and technology, the continuous expansion of the scope of computer network applications, has gradually improved the social productive forces, has had a positive impact on the increase production efficiency and industrial scale of China's different industries. Combined with the actual application of computer network in the era of large data, we can see the existence of influencing factors such as network virus, hacker and other attack modes, threatening network security and posing a potential threat to the safe use of computer network in colleges and universities. In view of this unfavorable development situation, universities need to pay attention to the analysis of the situation of large data age, combined with the requirements of network security use, to build a reliable network space security system from the equipment, systems, data and other different levels. To avoid the security risks exist in the network. Based on this, this paper will analyze the hierarchical security system of cyberspace security in the era of large data.
2010-04-30
5 Intercity Bus Security Grant Program...eligibility.22 This grant program includes funding for the Freight Rail Security Grant Program (FRSGP), and the Intercity Passenger Rail Program (IPR...eligible to receive funding to continue security enhancements for its intercity rail services between high-risk urban areas. 21 U.S. Department of
Security Assistance Dependence - Wielding American Power
2002-12-09
national security objectives. One vehicle of this power brokering is the well-developed international security assistance program – oftentimes...incorrectly referred to exclusively as foreign military sales. There is nothing simple about the security assistance program as it has developed today...For the USG, there are many agencies influencing today’s security assistance program to execute complex, integrated tasks directly impacting U.S
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2014 CFR
2014-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2011 CFR
2011-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2013 CFR
2013-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2012 CFR
2012-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2010 CFR
2010-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2014 CFR
2014-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2013 CFR
2013-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2012 CFR
2012-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2011 CFR
2011-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
Social Media Principles Applied to Critical Infrastructure Information Sharing
2013-12-01
shooters. The DHS works throughout the year to build partnerships with industries across a wide spectrum, to include commercial facilities. They...security professionals , industry association and security organizations, emergency managers, and planners and architects. Each of these stakeholder sets... Project Report.126 The DARPA SCP fellows identified 14 factors that affected the performance of any one team. Notable among the collection were
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-13
... Administration Regulations AGENCY: Bureau of Industry and Security, Commerce. ACTION: Final rule. SUMMARY: In this final rule, the Bureau of Industry and Security (BIS) amends the Export Administration Regulations (EAR) to add controls on exports and reexports of U.S.-origin dual-use items to a new nation, the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-01
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70764; File No. 4-443] Joint Industry Plan; Notice of Filing and Immediate Effectiveness of Amendment to the Plan for the Purpose of Developing and Implementing Procedures Designed To Facilitate the Listing and Trading of Standardized Options To Add Miami International Securities Exchange, LLC (...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-19
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Xvariant, Inc. (n/k/a China Bionanometer..., Inc. (n/k/a China Bionanometer Industries Corp.) because it has not filed any periodic reports since.... Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in...
NASA Astrophysics Data System (ADS)
Ali, Hatamirad; Hasan, Mehrjerdi
Automotive industry and car production process is one of the most complex and large-scale production processes. Today, information technology (IT) and ERP systems incorporates a large portion of production processes. Without any integrated systems such as ERP, the production and supply chain processes will be tangled. The ERP systems, that are last generation of MRP systems, make produce and sale processes of these industries easier and this is the major factor of development of these industries anyhow. Today many of large-scale companies are developing and deploying the ERP systems. The ERP systems facilitate many of organization processes and make organization to increase efficiency. The security is a very important part of the ERP strategy at the organization, Security at the ERP systems, because of integrity and extensive, is more important of local and legacy systems. Disregarding of this point can play a giant role at success or failure of this kind of systems. The IRANKHODRO is the biggest automotive factory in the Middle East with an annual production over 600.000 cars. This paper presents ERP security deployment experience at the "IRANKHODRO Company". Recently, by launching ERP systems, it moved a big step toward more developments.
Redefining Security. A Report by the Joint Security Commission
1994-02-28
security policies. This report offers recommendations on developing new strategies for achieving security within our infor-mation systems, including...better, and we outline methods of improving government and industry personnel security poli- cies. We offer recommendations on developing new strategies ... strategies , sufficient funding, and management attention if our comput- ers and networks are to protect the confidentiality, integrity, and availability of
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 1804.470-2 Policy. NASA IT security...) 2810, Security of Information Technology; NASA Procedural Requirements (NPR) 2810, Security of Information Technology; and interim policy updates in the form of NASA Information Technology Requirements...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
7 CFR 772.5 - Security maintenance.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security maintenance. 772.5 Section 772.5 Agriculture... SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.5 Security maintenance. (a) General. Borrowers are responsible for maintaining the collateral that is serving as security for their Minor Program loan in...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
7 CFR 772.5 - Security maintenance.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security maintenance. 772.5 Section 772.5 Agriculture... SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.5 Security maintenance. (a) General. Borrowers are responsible for maintaining the collateral that is serving as security for their Minor Program loan in...
Effectiveness of the Civil Aviation Security Program.
1980-05-22
SECURITY. - CONTINUED TRAINING OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. - SECURITY PROGRAMS IMPLEMENTED BY AIR FREIGHT...cooperation by all concerned. (See Exhibit 14) Airport Security - Ongoing activities which contributed significantly to airport security included full...implementation of the revised Federal Aviation Regulations (FAR) Part 107 governing airport security , training of law enforcement officers supporting
Safety and security of radioactive sources in industrial radiography in Bangladesh
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mollah, A. S.; Nazrul, M. Abdullah
2013-07-01
Malicious use of radioactive sources can involve dispersal of that material through an explosive device. There has been recognition of the threat posed by the potential malicious misuse of NDT radioactive source by terrorists. The dispersal of radioactive material using conventional explosives, referred to as a 'dirty bomb', could create considerable panic, disruption and area access denial in an urban environment. However, as it is still a relatively new topic among regulators, users, and transport and storage operators worldwide, international assistance and cooperation in developing the necessary regulatory and security infrastructure is required. The most important action in reducing themore » risk of radiological terrorism is to increase the security of radioactive sources. This paper presents safety and security considerations for the transport and site storage of the industrial radiography sources as per national regulations entitled 'Nuclear Safety and Radiation Control Rules-1997'.The main emphasis was put on the stages of some safety and security actions in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport and site storage of radioactive sources used in the practice of industrial radiography. (authors)« less
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2013-10-01 2013-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2011-10-01 2011-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2014 CFR
2014-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2014-10-01 2014-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...