Science.gov

Sample records for land security andplanetary

  1. Compact Neutron Generators for Medical Home Land Security andPlanetary Exploration

    SciTech Connect

    Reijonen, J.

    2005-05-11

    The Plasma and Ion Source Technology Group at Lawrence Berkeley National Laboratory has developed various types of advanced D-D (neutron energy 2.5 MeV), D-T (14 MeV) and T-T (0-9 MeV) neutron generators for wide range of applications. These applications include medical (Boron Neutron Capture Therapy), homeland security (Prompt Gamma Activation Analysis, Fast Neutron Activation Analysis and Pulsed Fast Neutron Transmission Spectroscopy) and planetary exploration with a sub-surface material characterization on Mars. These neutron generators utilize RF induction discharge to ionize the deuterium/tritium gas. This discharge method provides high plasma density for high output current, high atomic species from molecular gases, long life operation and versatility for various discharge chamber geometries. Four main neutron generator developments are discussed here: high neutron output co-axial neutron generator for BNCT applications, point neutron generator for security applications, compact and sub-compact axial neutron generator for elemental analysis applications. Current status of the neutron generator development with experimental data will be presented.

  2. Land Ecological Security Evaluation of Guangzhou, China

    PubMed Central

    Xu, Linyu; Yin, Hao; Li, Zhaoxue; Li, Shun

    2014-01-01

    As the land ecosystem provides the necessary basic material resources for human development, land ecological security (LES) plays an increasingly important role in sustainable development. Given the degradation of land ecological security under rapid urbanization and the urgent LES requirements of urban populations, a comprehensive evaluation method, named Double Land Ecological Security (DLES), has been introduced with the city of Guangzhou, China, as a case study, which evaluates the LES in regional and unit scales for reasonable and specific urban planning. In the evaluation process with this method, we have combined the material security with the spiritual security that is inevitably associated with LES. Some new coefficients of land-security supply/demand distribution and technology contribution for LES evaluation have also been introduced for different spatial scales, including the regional and the unit scales. The results for Guangzhou indicated that, temporally, the LES supply indices were 0.77, 0.84 and 0.77 in 2000, 2006 and 2009 respectively, while LES demand indices for the city increased in 2000, 2006 and 2009 from 0.57 to 0.95, which made the LES level decreased slowly in this period. Spatially, at the regional scale, the urban land ecological security (ULES) level decreased from 0.2 (marginal security) to −0.18 (marginal insecurity) as a whole; in unit scale, areas in the north and in parts of the east were relatively secure and the security area was shrinking with time, but the central and southern areas turned to be marginal insecurity, especially in 2006 and 2009. This study proposes that DLES evaluation should be conducted for targeted and efficient urban planning and management, which can reflect the LES level of study area in general and in detail. PMID:25321873

  3. Land ecological security evaluation of Guangzhou, China.

    PubMed

    Xu, Linyu; Yin, Hao; Li, Zhaoxue; Li, Shun

    2014-10-15

    As the land ecosystem provides the necessary basic material resources for human development, land ecological security (LES) plays an increasingly important role in sustainable development. Given the degradation of land ecological security under rapid urbanization and the urgent LES requirements of urban populations, a comprehensive evaluation method, named Double Land Ecological Security (DLES), has been introduced with the city of Guangzhou, China, as a case study, which evaluates the LES in regional and unit scales for reasonable and specific urban planning. In the evaluation process with this method, we have combined the material security with the spiritual security that is inevitably associated with LES. Some new coefficients of land-security supply/demand distribution and technology contribution for LES evaluation have also been introduced for different spatial scales, including the regional and the unit scales. The results for Guangzhou indicated that, temporally, the LES supply indices were 0.77, 0.84 and 0.77 in 2000, 2006 and 2009 respectively, while LES demand indices for the city increased in 2000, 2006 and 2009 from 0.57 to 0.95, which made the LES level decreased slowly in this period. Spatially, at the regional scale, the urban land ecological security (ULES) level decreased from 0.2 (marginal security) to -0.18 (marginal insecurity) as a whole; in unit scale, areas in the north and in parts of the east were relatively secure and the security area was shrinking with time, but the central and southern areas turned to be marginal insecurity, especially in 2006 and 2009. This study proposes that DLES evaluation should be conducted for targeted and efficient urban planning and management, which can reflect the LES level of study area in general and in detail.

  4. Climate change - Agricultural land use - Food security

    NASA Astrophysics Data System (ADS)

    Nagy, János; Széles, Adrienn

    2015-04-01

    In Hungary, plougland decreased to 52% of its area by the time of political restructuring (1989) in comparison with the 1950s. Forested areas increased significantly (18%) and lands withdrawn from agricultural production doubled (11%). For today, these proportions further changed. Ploughlands reduced to 46% and forested areas further increased (21%) in 2013. The most significat changes were observed in the proportion of lands withdrawn from agricultural production which increased to 21%. Temperature in Hungary increased by 1°C during the last century and predictions show a further 2.6 °C increase by 2050. The yearly amount of precipitation significantly decreased from 640 mm to 560 mm with a more uneven temporal distribution. The following aspects can be considered in the correlation between climate change and agriculture: a) impact of agriculture on climate, b) future impact of climate change on agriculture and food supply, c) impact of climate change on food security. The reason for the significant change of climate is the accumulation of greenhouse gases (GHG) which results from anthropological activities. Between 2008 and 2012, Hungary had to reduce its GHG emission by 6% compared to the base period between 1985-1987. At the end of 2011, Hungarian GHG emission was 43.1% lower than that of the base period. The total gross emission was 66.2 million CO2 equivalent, while the net emission which also includes land use, land use change and forestry was 62.8 million tons. The emission of agriculture was 8.8 million tons (OMSZ, 2013). The greatest opportunity to reduce agricultural GHG emission is dinitrogen oxides which can be significantly mitigated by the smaller extent and more efficient use of nitrogen-based fertilisers (precision farming) and by using biomanures produced from utilised waste materials. Plant and animal species which better adapt to extreme weather circumstances should be bred and maintained, thereby making an investment in food security. Climate

  5. Experiments in Globalisation, Food Security and Land Use Decision Making

    PubMed Central

    Brown, Calum; Murray-Rust, Dave; van Vliet, Jasper; Alam, Shah Jamal; Verburg, Peter H.; Rounsevell, Mark D.

    2014-01-01

    The globalisation of trade affects land use, food production and environments around the world. In principle, globalisation can maximise productivity and efficiency if competition prompts specialisation on the basis of productive capacity. In reality, however, such specialisation is often constrained by practical or political barriers, including those intended to ensure national or regional food security. These are likely to produce globally sub-optimal distributions of land uses. Both outcomes are subject to the responses of individual land managers to economic and environmental stimuli, and these responses are known to be variable and often (economically) irrational. We investigate the consequences of stylised food security policies and globalisation of agricultural markets on land use patterns under a variety of modelled forms of land manager behaviour, including variation in production levels, tenacity, land use intensity and multi-functionality. We find that a system entirely dedicated to regional food security is inferior to an entirely globalised system in terms of overall production levels, but that several forms of behaviour limit the difference between the two, and that variations in land use intensity and functionality can substantially increase the provision of food and other ecosystem services in both cases. We also find emergent behaviour that results in the abandonment of productive land, the slowing of rates of land use change and the fragmentation or, conversely, concentration of land uses following changes in demand levels. PMID:25437010

  6. Experiments in globalisation, food security and land use decision making.

    PubMed

    Brown, Calum; Murray-Rust, Dave; van Vliet, Jasper; Alam, Shah Jamal; Verburg, Peter H; Rounsevell, Mark D

    2014-01-01

    The globalisation of trade affects land use, food production and environments around the world. In principle, globalisation can maximise productivity and efficiency if competition prompts specialisation on the basis of productive capacity. In reality, however, such specialisation is often constrained by practical or political barriers, including those intended to ensure national or regional food security. These are likely to produce globally sub-optimal distributions of land uses. Both outcomes are subject to the responses of individual land managers to economic and environmental stimuli, and these responses are known to be variable and often (economically) irrational. We investigate the consequences of stylised food security policies and globalisation of agricultural markets on land use patterns under a variety of modelled forms of land manager behaviour, including variation in production levels, tenacity, land use intensity and multi-functionality. We find that a system entirely dedicated to regional food security is inferior to an entirely globalised system in terms of overall production levels, but that several forms of behaviour limit the difference between the two, and that variations in land use intensity and functionality can substantially increase the provision of food and other ecosystem services in both cases. We also find emergent behaviour that results in the abandonment of productive land, the slowing of rates of land use change and the fragmentation or, conversely, concentration of land uses following changes in demand levels.

  7. Land system change and food security: towards multi-scale land system solutions☆

    PubMed Central

    Verburg, Peter H; Mertz, Ole; Erb, Karl-Heinz; Haberl, Helmut; Wu, Wenbin

    2013-01-01

    Land system changes are central to the food security challenge. Land system science can contribute to sustainable solutions by an integrated analysis of land availability and the assessment of the tradeoffs associated with agricultural expansion and land use intensification. A land system perspective requires local studies of production systems to be contextualised in a regional and global context, while global assessments should be confronted with local realities. Understanding of land governance structures will help to support the development of land use policies and tenure systems that assist in designing more sustainable ways of intensification. Novel land systems should be designed that are adapted to the local context and framed within the global socio-ecological system. Such land systems should explicitly account for the role of land governance as a primary driver of land system change and food production. PMID:24143158

  8. Land take and Food Security at Global Scale

    NASA Astrophysics Data System (ADS)

    Gardi, Ciro

    2015-04-01

    Soil is a limited, non-renewable natural resource, on which is based the 95the naturally fertile soils, suitable for a sustainable agriculture production, represent only a limited portion (13-18%) of the total land area of the Earth. On these areas are concentrated the majority of human presence and activities, leading to increasing pressures and degradation processes on soil. Land take and soil sealing, associated to urban expansion, is one of the most detrimental and irreversible degradation process, heavily affecting the food security at regional, national and global level. The current estimates of worldwide urban areas, with 1 km resolution, are ranging between 300,000 and 650,000 km2. In this research we present an estimate of urban area growth, between 2000 and 2010, of 160,000 km2. Urban growth was estimated by population and GDP, which represent the main drivers of the process. The global impact on food security was estimate in 59.9 millions of tons of cereals, corresponding at 2.49% of the cereals yearly world production.

  9. Urbanization, land tenure security and vector-borne Chagas disease

    PubMed Central

    Levy, Michael Z.; Barbu, Corentin M.; Castillo-Neyra, Ricardo; Quispe-Machaca, Victor R.; Ancca-Juarez, Jenny; Escalante-Mejia, Patricia; Borrini-Mayori, Katty; Niemierko, Malwina; Mabud, Tarub S.; Behrman, Jere R.; Naquira-Velarde, Cesar

    2014-01-01

    Modern cities represent one of the fastest growing ecosystems on the planet. Urbanization occurs in stages; each stage characterized by a distinct habitat that may be more or less susceptible to the establishment of disease vector populations and the transmission of vector-borne pathogens. We performed longitudinal entomological and epidemiological surveys in households along a 1900 × 125 m transect of Arequipa, Peru, a major city of nearly one million inhabitants, in which the transmission of Trypanosoma cruzi, the aetiological agent of Chagas disease, by the insect vector Triatoma infestans, is an ongoing problem. The transect spans a cline of urban development from established communities to land invasions. We find that the vector is tracking the development of the city, and the parasite, in turn, is tracking the dispersal of the vector. New urbanizations are free of vector infestation for decades. T. cruzi transmission is very recent and concentrated in more established communities. The increase in land tenure security during the course of urbanization, if not accompanied by reasonable and enforceable zoning codes, initiates an influx of construction materials, people and animals that creates fertile conditions for epidemics of some vector-borne diseases. PMID:24990681

  10. Urbanization, land tenure security and vector-borne Chagas disease.

    PubMed

    Levy, Michael Z; Barbu, Corentin M; Castillo-Neyra, Ricardo; Quispe-Machaca, Victor R; Ancca-Juarez, Jenny; Escalante-Mejia, Patricia; Borrini-Mayori, Katty; Niemierko, Malwina; Mabud, Tarub S; Behrman, Jere R; Naquira-Velarde, Cesar

    2014-08-22

    Modern cities represent one of the fastest growing ecosystems on the planet. Urbanization occurs in stages; each stage characterized by a distinct habitat that may be more or less susceptible to the establishment of disease vector populations and the transmission of vector-borne pathogens. We performed longitudinal entomological and epidemiological surveys in households along a 1900 × 125 m transect of Arequipa, Peru, a major city of nearly one million inhabitants, in which the transmission of Trypanosoma cruzi, the aetiological agent of Chagas disease, by the insect vector Triatoma infestans, is an ongoing problem. The transect spans a cline of urban development from established communities to land invasions. We find that the vector is tracking the development of the city, and the parasite, in turn, is tracking the dispersal of the vector. New urbanizations are free of vector infestation for decades. T. cruzi transmission is very recent and concentrated in more established communities. The increase in land tenure security during the course of urbanization, if not accompanied by reasonable and enforceable zoning codes, initiates an influx of construction materials, people and animals that creates fertile conditions for epidemics of some vector-borne diseases.

  11. Landscape ecological security response to land use change in the tidal flat reclamation zone, China.

    PubMed

    Zhang, Runsen; Pu, Lijie; Li, Jianguo; Zhang, Jing; Xu, Yan

    2016-01-01

    As coastal development becomes a national strategy in Eastern China, land use and landscape patterns have been affected by reclamation projects. In this study, taking Rudong County, China as a typical area, we analyzed land use change and its landscape ecological security responses in the tidal flat reclamation zone. The results show that land use change in the tidal flat reclamation zone is characterized by the replacement of natural tidal flat with agricultural and construction land, which has also led to a big change in landscape patterns. We built a landscape ecological security evaluation system, which consists of landscape interference degree and landscape fragile degree, and then calculated the landscape ecological security change in the tidal flat reclamation zone from 1990 to 2008 to depict the life cycle in tidal flat reclamation. Landscape ecological security exhibited a W-shaped periodicity, including the juvenile stage, growth stage, and maturation stage. Life-cycle analysis demonstrates that 37 years is required for the land use system to transform from a natural ecosystem to an artificial ecosystem in the tidal flat reclamation zone.

  12. Water security, global change and land-atmosphere feedbacks.

    PubMed

    Dadson, Simon; Acreman, Michael; Harding, Richard

    2013-11-13

    Understanding the competing pressures on water resources requires a detailed knowledge of the future water balance under uncertain environmental change. The need for a robust, scientifically rigorous evidence base for effective policy planning and practice has never been greater. Environmental change includes, but is not limited to, climate change; it also includes land-use and land-cover change, including deforestation for agriculture, and occurs alongside changes in anthropogenic interventions that are used in natural resource management such as the regulation of river flows using dams, which can have impacts that frequently exceed those arising in the natural system. In this paper, we examine the role that land surface models can play in providing a robust scientific basis for making resource management decisions against a background of environmental change. We provide some perspectives on recent developments in modelling in land surface hydrology. Among the range of current land surface and hydrology models, there is a large range of variability, which indicates that the specification and parametrization of several basic processes in the models can be improved. Key areas that require improvement in order to address hydrological applications include (i) the representation of groundwater in models, particularly at the scales relevant to land surface modelling, (ii) the representation of human interventions such as dams and irrigation in the hydrological system, (iii) the quantification and communication of uncertainty, and (iv) improved understanding of the impact on water resources availability of multiple use through treatment, recycling and return flows (and the balance of consumptive and conservative uses). Through a series of examples, we demonstrate that changes in water use could have important reciprocal impacts on climate over a wide area. The effects of water management decisions on climate feedbacks are only beginning to be investigated-they are

  13. Widows' land security in the era of HIV/AIDS: panel survey evidence from Zambia.

    PubMed

    Chapoto, Antony; Jayne, T S; Mason, Nicole M

    2011-01-01

    In areas of Africa hard hit by HIV/AIDS, there are growing concerns that many women lose access to land after the death of their husbands. However, there remains a dearth of quantitative evidence on the proportion of widows who lose access to their deceased husband's land, whether they lose all or part of that land, and whether there are factors specific to the widow, her family, or the broader community that influence her ability to maintain rights to land. This study examines these issues using average treatment effects models with propensity score matching applied to a nationally representative panel data of 5,342 rural households surveyed in 2001 and 2004. Results are highly variable, with roughly a third of households incurring the death of a male household head controlling less than 50% of the land they had prior to their husband's death, while over a quarter actually controlled as much or even more land than while their husbands were alive. Widows who were in relatively wealthy households prior to their husband's death lose proportionately more land than widows in households that were relatively poor. Older widows and widows related to the local headman enjoy greater land security. Women in matrilineal inheritance areas were no less likely to lose land than women in patrilineal areas.

  14. Global climate policy impacts on livestock, land use, livelihoods, and food security

    PubMed Central

    Golub, Alla A.; Henderson, Benjamin B.; Hertel, Thomas W.; Gerber, Pierre J.; Rose, Steven K.; Sohngen, Brent

    2013-01-01

    Recent research has shed light on the cost-effective contribution that agriculture can make to global greenhouse gas abatement; however, the resulting impacts on agricultural production, producer livelihoods, and food security remain largely unexplored. This paper provides an integrated assessment of the linkages between land-based climate policies, development, and food security, with a particular emphasis on abatement opportunities and impacts in the livestock sector. Targeting Annex I countries and exempting non-Annex I countries from land-based carbon policies on equity or food security grounds may result in significant leakage rates for livestock production and agriculture as a whole. We find that such leakage can be eliminated by supplying forest carbon sequestration incentives to non-Annex I countries. Furthermore, substantial additional global agricultural abatement can be attained by extending a greenhouse gas emissions tax to non-Annex I agricultural producers, while compensating them for their additional tax expenses. Because of their relatively large emissions intensities and limited abatement possibilities, ruminant meat producers face the greatest market adjustments to land-based climate policies. We also evaluate the impacts of climate policies on livelihoods and food consumption in developing countries. In the absence of non-Annex I abatement policies, these impacts are modest. However, strong income and food consumption impacts surface because of higher food costs after forest carbon sequestration is promoted at a global scale. Food consumption among unskilled labor households falls but rises for the representative farm households, because global agricultural supplies are restricted and farm prices rise sharply in the face of inelastic food demands. PMID:23019587

  15. [Assessment and early warning of land ecological security in rapidly urbanizing coastal area: A case study of Caofeidian new district, Hebei, China].

    PubMed

    Zhang, Li; Chen, Ying; Wang, Shu-tao; Men, Ming-xin; Xu, Hao

    2015-08-01

    Assessment and early warning of land ecological security (LES) in rapidly urbanizing coastal area is an important issue to ensure sustainable land use and effective maintenance of land ecological security. In this study, an index system for the land ecological security of Caofeidian new district was established based on the Pressure-State-Response (P-S-R) model. Initial assessment units of 1 km x 1 km created with the remote sensing data and GIS methods were spatially interpolated to a fine pixel size of 30 m x 30 m, which were combined with the early warning method (using classification tree method) to evaluate the land ecological security of Caofeidian in 2005 and 2013. The early warning level was classed into four categories: security with degradation potential, sub-security with slow degradation, sub-security with rapid degradation, and insecurity. Result indicated that, from 2005 to 2013, the average LES of Caofeidian dropped from 0.55 to 0.52, indicating a degradation of land ecological security from medium security level to medium-low security level. The areas at the levels of insecurity with rapid degradation were mainly located in the rapid urbanization areas, illustrating that rapid expansion of urban construction land was the key factor to the deterioration of the regional land ecological security. Industrial District, Shilihai town and Nanpu saltern, in which the lands at the levels of insecurity and sub-security with rapid degradation or slow degradation accounted for 58.3%, 98.9% and 81.2% of their respective districts, were at the stage of high early warning. Thus, land ecological security regulation for these districts should be strengthened in near future. The study could provide a reference for land use planning and ecological protection of Caofeidian new district.

  16. Agriculture and Energy: Implications for Food Security, Water, and Land Use

    NASA Astrophysics Data System (ADS)

    Tokgoz, S.; Zhang, W.; Msangi, S.; Bhandary, P.

    2011-12-01

    population under hunger and poverty. In light of these threats and opportunities facing the global food system, the proposed study takes a long-term perspective and addresses the main medium and long- term drivers of agricultural markets using the International Model for Policy Analysis of Agricultural Commodities and Trade developed by the Environment and Production Technology Division of IFPRI to project future production, consumption, and trade of key agricultural commodities. The main objective of the study is to analyze the link between energy and agricultural markets, focusing on the "new" role of agriculture as a supplier of energy for transportation through biofuels, and the subsequent impact on land use and demand for water from the agricultural sector. In this context, this study incorporates various scenarios of future energy demand and energy price impacts on global agricultural markets (food prices and food security), water use implications (irrigation water consumption by agricultural sector), and land use implications (changes in national and global crop area). The scenarios are designed to understand the impact of energy prices on biofuel production, cost of production for agricultural crops, conversion of rainfed area to irrigated area, and necessary levels of crop productivity growth to counter these effects.

  17. The Impact of Land Border Security on Terrorism Financing: Turkey’s Southeast Land Border and the PKK

    DTIC Science & Technology

    2013-12-01

    the concept of security by means of not only geopolitical, but also economic, social and other considerations. She also argues that global primacy...support the idea of strict and old- fashioned border policy in spite of the increasing interaction among nations, some scholars argue that there is a...and Murat Sever, “Convergence of Terrorism and Organized Crime: The Case of PKK,” in The PKK : Financial Source [Electronic Resource], Social and

  18. Land security and the challenges of realizing the human right to water and sanitation in the slums of Mumbai, India.

    PubMed

    Murthy, Sharmila L

    2012-12-15

    Addressing the human right to water and sanitation in the slums of Mumbai, India requires disentangling the provision of basic services from a more complicated set of questions around land security and land ownership. Millions of slum-dwellers in Mumbai lack adequate access to safe drinking water and sanitation, which places them at risk for waterborne diseases. Many slums are located in hazardous areas such as flood plains, increasing their susceptibility to climate change-related weather patterns. Access to water and sanitation in slums generally hinges on whether a dwelling was created prior to January 1, 1995, because those constructed created prior to that date have greater land security. Although the so-called "1995 cut-off rule" looms large in Mumbai slum policy, a closer reading of the relevant laws and regulations suggests that access to water and sanitation could be expanded to slums created after January 1, 1995. State and municipal governments already have the authority to expand access to water services; they just need to exercise their discretion. However, slums located on central government land are in a more difficult position. Central government agencies in Mumbai have often refused to allow the state and municipal governments to rehabilitate or improve access to services for slums located on their land. As a result, an argument could be made that by interfering with the efforts of sub-national actors to extend water and sanitation to services to slum-dwellers, the central government of India is violating its obligations to respect the human right to water and sanitation under international and national jurisprudence.

  19. From jhum to broom: Agricultural land-use change and food security implications on the Meghalaya Plateau, India.

    PubMed

    Behera, Rabi Narayan; Nayak, Debendra Kumar; Andersen, Peter; Måren, Inger Elisabeth

    2016-02-01

    Human population growth in the developing world drives land-use changes, impacting food security. In India, the dramatic change in demographic dynamics over the past century has reduced traditional agricultural land-use through increasing commercialization. Here, we analyze the magnitude and implications for the farming system by the introduction of cash-cropping, replacing the traditional slash and burn rotations (jhum), of the tribal people on the Meghalaya Plateau, northeast India, by means of agricultural census data and field surveys conducted in seven villages. Land-use change has brought major alterations in hill agricultural practices, enhanced cash-cropping, promoted mono-cropping, changed food consumption patterns, underpinned the emergence of a new food system, and exposed farmers and consumers to the precariousness of the market, all of which have both long- and short-term food security implications. We found dietary diversity to be higher under jhum compared to any of the cash-crop systems, and higher under traditional cash-cropping than under modern cash-cropping.

  20. How much land-based greenhouse gas mitigation can be achieved without compromising food security and environmental goals?

    PubMed

    Smith, Pete; Haberl, Helmut; Popp, Alexander; Erb, Karl-Heinz; Lauk, Christian; Harper, Richard; Tubiello, Francesco N; de Siqueira Pinto, Alexandre; Jafari, Mostafa; Sohi, Saran; Masera, Omar; Böttcher, Hannes; Berndes, Göran; Bustamante, Mercedes; Ahammad, Helal; Clark, Harry; Dong, Hongmin; Elsiddig, Elnour A; Mbow, Cheikh; Ravindranath, Nijavalli H; Rice, Charles W; Robledo Abad, Carmenza; Romanovskaya, Anna; Sperling, Frank; Herrero, Mario; House, Joanna I; Rose, Steven

    2013-08-01

    Feeding 9-10 billion people by 2050 and preventing dangerous climate change are two of the greatest challenges facing humanity. Both challenges must be met while reducing the impact of land management on ecosystem services that deliver vital goods and services, and support human health and well-being. Few studies to date have considered the interactions between these challenges. In this study we briefly outline the challenges, review the supply- and demand-side climate mitigation potential available in the Agriculture, Forestry and Other Land Use AFOLU sector and options for delivering food security. We briefly outline some of the synergies and trade-offs afforded by mitigation practices, before presenting an assessment of the mitigation potential possible in the AFOLU sector under possible future scenarios in which demand-side measures codeliver to aid food security. We conclude that while supply-side mitigation measures, such as changes in land management, might either enhance or negatively impact food security, demand-side mitigation measures, such as reduced waste or demand for livestock products, should benefit both food security and greenhouse gas (GHG) mitigation. Demand-side measures offer a greater potential (1.5-15.6 Gt CO2 -eq. yr(-1) ) in meeting both challenges than do supply-side measures (1.5-4.3 Gt CO2 -eq. yr(-1) at carbon prices between 20 and 100 US$ tCO2 -eq. yr(-1) ), but given the enormity of challenges, all options need to be considered. Supply-side measures should be implemented immediately, focussing on those that allow the production of more agricultural product per unit of input. For demand-side measures, given the difficulties in their implementation and lag in their effectiveness, policy should be introduced quickly, and should aim to codeliver to other policy agenda, such as improving environmental quality or improving dietary health. These problems facing humanity in the 21st Century are extremely challenging, and policy that

  1. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  2. Optimizing Land and Water Use at the Local Level to Enhance Global Food Security through Virtual Resources Trade in the World

    NASA Astrophysics Data System (ADS)

    Cai, X.; Zhang, X.; Zhu, T.

    2014-12-01

    Global food security is constrained by local and regional land and water availability, as well as other agricultural input limitations and inappropriate national and global regulations. In a theoretical context, this study assumes that optimal water and land uses in local food production to maximize food security and social welfare at the global level can be driven by global trade. It follows the context of "virtual resources trade", i.e., utilizing international trade of agricultural commodities to reduce dependency on local resources, and achieves land and water savings in the world. An optimization model based on the partial equilibrium of agriculture is developed for the analysis, including local commodity production and land and water resources constraints, demand by country, and global food market. Through the model, the marginal values (MVs) of social welfare for water and land at the level of so-called food production units (i.e., sub-basins with similar agricultural production conditions) are derived and mapped in the world. In this personation, we will introduce the model structure, explain the meaning of MVs at the local level and their distribution around the world, and discuss the policy implications for global communities to enhance global food security. In particular, we will examine the economic values of water and land under different world targets of food security (e.g., number of malnourished population or children in a future year). In addition, we will also discuss the opportunities on data to improve such global modeling exercises.

  3. A land data assimilation system for sub-Saharan Africa food and water security applications

    NASA Astrophysics Data System (ADS)

    McNally, Amy; Arsenault, Kristi; Kumar, Sujay; Shukla, Shraddhanand; Peterson, Pete; Wang, Shugong; Funk, Chris; Peters-Lidard, Christa D.; Verdin, James P.

    2017-02-01

    Seasonal agricultural drought monitoring systems, which rely on satellite remote sensing and land surface models (LSMs), are important for disaster risk reduction and famine early warning. These systems require the best available weather inputs, as well as a long-term historical record to contextualize current observations. This article introduces the Famine Early Warning Systems Network (FEWS NET) Land Data Assimilation System (FLDAS), a custom instance of the NASA Land Information System (LIS) framework. The FLDAS is routinely used to produce multi-model and multi-forcing estimates of hydro-climate states and fluxes over semi-arid, food insecure regions of Africa. These modeled data and derived products, like soil moisture percentiles and water availability, were designed and are currently used to complement FEWS NET's operational remotely sensed rainfall, evapotranspiration, and vegetation observations. The 30+ years of monthly outputs from the FLDAS simulations are publicly available from the NASA Goddard Earth Science Data and Information Services Center (GES DISC) and recommended for use in hydroclimate studies, early warning applications, and by agro-meteorological scientists in Eastern, Southern, and Western Africa.

  4. A land data assimilation system for sub-Saharan Africa food and water security applications.

    PubMed

    McNally, Amy; Arsenault, Kristi; Kumar, Sujay; Shukla, Shraddhanand; Peterson, Pete; Wang, Shugong; Funk, Chris; Peters-Lidard, Christa D; Verdin, James P

    2017-02-14

    Seasonal agricultural drought monitoring systems, which rely on satellite remote sensing and land surface models (LSMs), are important for disaster risk reduction and famine early warning. These systems require the best available weather inputs, as well as a long-term historical record to contextualize current observations. This article introduces the Famine Early Warning Systems Network (FEWS NET) Land Data Assimilation System (FLDAS), a custom instance of the NASA Land Information System (LIS) framework. The FLDAS is routinely used to produce multi-model and multi-forcing estimates of hydro-climate states and fluxes over semi-arid, food insecure regions of Africa. These modeled data and derived products, like soil moisture percentiles and water availability, were designed and are currently used to complement FEWS NET's operational remotely sensed rainfall, evapotranspiration, and vegetation observations. The 30+ years of monthly outputs from the FLDAS simulations are publicly available from the NASA Goddard Earth Science Data and Information Services Center (GES DISC) and recommended for use in hydroclimate studies, early warning applications, and by agro-meteorological scientists in Eastern, Southern, and Western Africa.

  5. A land data assimilation system for sub-Saharan Africa food and water security applications

    PubMed Central

    McNally, Amy; Arsenault, Kristi; Kumar, Sujay; Shukla, Shraddhanand; Peterson, Pete; Wang, Shugong; Funk, Chris; Peters-Lidard, Christa D.; Verdin, James P.

    2017-01-01

    Seasonal agricultural drought monitoring systems, which rely on satellite remote sensing and land surface models (LSMs), are important for disaster risk reduction and famine early warning. These systems require the best available weather inputs, as well as a long-term historical record to contextualize current observations. This article introduces the Famine Early Warning Systems Network (FEWS NET) Land Data Assimilation System (FLDAS), a custom instance of the NASA Land Information System (LIS) framework. The FLDAS is routinely used to produce multi-model and multi-forcing estimates of hydro-climate states and fluxes over semi-arid, food insecure regions of Africa. These modeled data and derived products, like soil moisture percentiles and water availability, were designed and are currently used to complement FEWS NET’s operational remotely sensed rainfall, evapotranspiration, and vegetation observations. The 30+ years of monthly outputs from the FLDAS simulations are publicly available from the NASA Goddard Earth Science Data and Information Services Center (GES DISC) and recommended for use in hydroclimate studies, early warning applications, and by agro-meteorological scientists in Eastern, Southern, and Western Africa. PMID:28195575

  6. Impacts of climate and land use change on ecosystem hydrology and net primary productivity: Linking water availability to food security in Asia

    NASA Astrophysics Data System (ADS)

    Dangal, S. R. S.; Tian, H.; Pan, S.; Zhang, B.; Yang, J.

    2015-12-01

    The nexus approach to food, water and energy security in Asia is extremely important and relevant as the region has to feed two-third of the world's population and accounts for 59% of the global water consumption. The distribution pattern of food, water and energy resources have been shaped by the legacy effect of both natural and anthropogenic disturbances and therefore are vulnerable to climate change and human activities including land use/cover change (LUCC) and land management (irrigation and nitrogen fertilization). In this study, we used the Dynamic Land Ecosystem Model (DLEM) to examine the effects of climate change, land use/cover change, and land management practices (irrigation and nitrogen fertilization) on the spatiotemporal trends and variability in water availability and its role in limiting net primary productivity (NPP) and food security in the 20th and early 21st centuries. Our specific objectives are to quantify how climate change, LUCC and other environmental changes have interactively affected carbon and water dynamics across the Asian region. In particular, we separated the Asian region into several sub-region based on the primary limiting factor - water, food and energy. We then quantified how changes in environmental factors have altered the water and food resources during the past century. We particularly focused on Net Primary Productivity (NPP) and water cycle (Evapotranspiration, discharge, and runoff) as a measure of available food and water resources, respectively while understanding the linkage between food and water resources in Asia.

  7. The role of Latin America's land and water resources for global food security: environmental trade-offs of future food production pathways.

    PubMed

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity's major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC's agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)-a global dynamic partial equilibrium model of the agricultural sector-to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths.

  8. The Role of Latin America’s Land and Water Resources for Global Food Security: Environmental Trade-Offs of Future Food Production Pathways

    PubMed Central

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D.; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity’s major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC’s agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)—a global dynamic partial equilibrium model of the agricultural sector—to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths. PMID:25617621

  9. Assessment of the potential enhancement of rural food security in Mexico using decision tree land use classification on medium resolution satellite imagery

    NASA Astrophysics Data System (ADS)

    Bermeo, A.; Couturier, S.

    2017-01-01

    Because of its renewed importance in international agendas, food security in sub-tropical countries has been the object of studies at different scales, although the spatial components of food security are still largely undocumented. Among other aspects, food security can be assessed using a food selfsufficiency index. We propose a spatial representation of this assessment in the densely populated rural area of the Huasteca Poblana, Mexico, where there is a known tendency towards the loss of selfsufficiency of basic grains. The main agricultural systems in this area are the traditional milpa (a multicrop practice with maize as the main basic crop) system, coffee plantations and grazing land for bovine livestock. We estimate a potential additional milpa - based maize production by smallholders identifying the presence of extensive coffee and pasture systems in the production data of the agricultural census. The surface of extensive coffee plantations and pasture land were estimated using the detailed coffee agricultural census data, and a decision tree combining unsupervised and supervised spectral classification techniques of medium scale (Landsat) satellite imagery. We find that 30% of the territory would benefit more than 50% increment in food security and 13% could theoretically become maize self-sufficient from the conversion of extensive systems to the traditional multicrop milpa system.

  10. Border Security: Observations on Costs, Benefits, and Challenges of a Department of Defense Role in Helping to Secure the Southwest Land Border

    DTIC Science & Technology

    2012-04-17

    BORDER SECURITY Observations on Costs, Benefits, and Challenges of a Department of Defense Role in Helping to Secure...Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of...information if it does not display a currently valid OMB control number. 1. REPORT DATE 17 APR 2012 2. REPORT TYPE 3. DATES COVERED 00-00-2012

  11. Xingu Project - Integrating Land Use Planning and Water Governance in Amazonia: Towards Improved Freshwater Security in the Agricultural Frontier of Mato Grosso.

    NASA Astrophysics Data System (ADS)

    Krusche, A. V.; Ballester, M. V.; Neill, C.; Elsenbeer, H.; Johnson, M. S.; Coe, M. T.; Garavello, M.; Molina, S. G.; Empinotti, V.; Reichardt, F.; Deegan, L.; Harris, L.

    2014-12-01

    The main goal of this project is to identify how impacts from land conversion, cropland expansion and intensification of both crop and animal production interact to affect regional evapotranspiration, rainfall generation, river flooding, and water quality and stream habitats, allowing us to identify thresholds of change that will endanger agricultural production, livelihoods of non-agricultural settlers and the region's new urban population and infrastructure. We will survey the effects of this on (1) soybean farmers, (2) cattle ranchers, (3) small-scale farm families, (4) rural non-agriculturists, including fishers, and (5) urban residents and map their roles as stakeholders. We will also conduct current water use surveys among the different stakeholder groups, accompanied by questions on desired aspects for future freshwater security to identify targets for desirable outcomes of water governance strategies. These targets, together with the information on land use drivers, water quantity and quality and predicted scenarios for global changes will be incorporated into a fully integrated and interactive geospatially oriented socio-ecological model that can serve as framework for future water governance that enhances Freshwater Security in such systems. This is an international cooperation initiative lead by Brazil and with the participation of Canada, Germany and United States of America.

  12. Transportation Secure Data Center: Real-World Data for Transportation Planning and Land Use Analysis (Fact Sheet)

    SciTech Connect

    Not Available

    2013-01-01

    The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database provides free-of-charge web-based access to valuable transportation data that can be used for: Transit planning, Travel demand modeling, Homeland Security evacuation planning, Alternative fuel station planning, and Validating transportation data from other sources. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

  13. Large-Scale Land Acquisitions in Sub-Saharan Africa: The Intersection of American Strategic Interests, Economics, Security, and Politics

    DTIC Science & Technology

    2012-05-01

    the Centre for Development and Environment (CDE) at the University of Bern , GIGA at the University of Hamburg, Deutsche Gesellschaft für...foreign entities. The press and NGOs have levied particular criticism on Ethiopia because of controversial land deals in the Gambella region in the

  14. Global Monitoring for Food Security and Sustainable Land Management - Recent Advances of Remote Sensing Applications to African and Siberian Show Cases

    NASA Astrophysics Data System (ADS)

    Komp, K. U.; Haub, C.

    2012-07-01

    After four decades of space borne remote sensing, the unmapped white patches have mostly disappeared. Those basic information give the foundations to the observation of changes and even the introduction of monitoring programmes for a various number of features in the natural and human landscape of our planet. Recent indicators for climatic change together with worrisome alterations in regional food production versus the constantly increase of human population demand the design and implementation of reliable land management tools which will serve the food security as well as the sustainable use of resources of the ecosystem in its respective regional context. The positive responses and convincing results of ESA service elements in the efforts towards food security in several African countries have been the basis for the transfer of the methods into another region, the Western Siberian corn-belt. The large extends of cropping schemes in West Siberia demand advanced remote sensing methods to be applied in order to compare the impacts of climatic change not only on the agricultural production but also on risks for the ecosystem. A multi scale approach of remote sensing methods is introduced in analogy to the African activities. An adopted monitoring concept is developed using a nearly daily product of medium resolution for wide areas, high resolution sensors for stratified sample areas and in-situ observations. Beyond methodological research, the ability of remote sensing is contributing to operational solutions that can ensure the nutritional and ecological future of our planet.

  15. 17 CFR 256.304 - Land and land rights.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Land and land rights. 256.304... COMPANY ACT OF 1935 Service Company Property Accounts § 256.304 Land and land rights. (a) This account shall include the cost of any right, title, or interest to land held by the service company,...

  16. 17 CFR 256.304 - Land and land rights.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Land and land rights. 256.304... COMPANY ACT OF 1935 Service Company Property Accounts § 256.304 Land and land rights. (a) This account shall include the cost of any right, title, or interest to land held by the service company,...

  17. Adapting to climate change for food security through supplementary irrigation and changing sowing dates in the Rift Valley dry lands of Ethiopia

    NASA Astrophysics Data System (ADS)

    Muluneh Bitew, Alemayehu; Stroosnijder, Leo; keesstra, Saskia

    2015-04-01

    Studies on climate impacts and related adaptation strategies are increasingly becoming important to counteract the negative effects of climate change. In Ethiopia, climate change is likely to affect crop yields negatively. However, quantitative evidence is lacking about the ability of farm level adaptation options to offset negative impacts on food security. The MarkSimGCM weather generator was used to generate projected daily rainfall and temperature data originally taken from ECHAM5 general circulation model and ensemble mean of six models under A2 (high) and B1 (low) emission scenarios. We validated the FAO AquaCrop model and subsequently used it to predict maize yields and explore three adaptations options. Increasing plant density has the least effect on maize yield so that the density that is currently used by 'good' farmers (30,000) is recommended. The optimum level of supplemental irrigation (SI), in combination with this plant density, is application of SI when the percentage of soil water depletion reached 75% of the maximum available water in the root zone. In the future, dry spells during the Belg season increase and this has a negative effect on maize production. The predicted lower maize production due to the changing rainfall is only partly compensated by the expected increase in CO2 concentration. The shifting of sowing period of maize from the current Belg season (mostly April or May) to the first month of Kiremt season (June) can offset the predicted yield reduction caused by climate change. SI has a marginal effect in good rainfall years but using 94-111 mm of SI can avoid total crop failure in drought years. Hence, SI is an interesting option to improve food security in the Rift Valley dry lands of Ethiopia. Key words: Adaptation; Climate change; Central Rift Valley; Dry spell; Supplemental irrigation.

  18. 49 CFR 1580.101 - Rail security coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY RAIL TRANSPORTATION... any of this information changes. (e) Each freight railroad carrier, rail hazardous materials...

  19. 49 CFR 1580.201 - Rail security coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY RAIL TRANSPORTATION... any of this information changes. (e) Each passenger railroad carrier and rail transit system...

  20. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 15 2011-01-01 2011-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it...

  1. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 15 2012-01-01 2012-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it...

  2. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 15 2013-01-01 2013-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it...

  3. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 15 2014-01-01 2014-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it...

  4. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it...

  5. Alternative security

    SciTech Connect

    Weston, B.H. )

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  6. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  7. Common Security and the Global War on Terror: USARCENT Land Forces Symposium 2007, Islamabad, Pakistan (Center for Strategic Leadership Issue Paper, Volume 3-07, May 2007)

    DTIC Science & Technology

    2007-05-01

    Security Concerns panel. LTG (R) Barno, NESA; LTG Safdar, Pakistan; and HRH BG Aisha Bint Al- Hussain, Jordan, discuss Capacity Building. CSL 3 behind...training. An example of such an effort was presented by Her Royal Highness Brigadier General Aisha Bint Al-Hussain, as she described the initiatives of the

  8. 12 CFR 161.26 - Land loan.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Land loan. 161.26 Section 161.26 Banks and... SAVINGS ASSOCIATIONS § 161.26 Land loan. The term land loan means a loan: (a) Secured by real estate upon... purchase of land and the accomplishment of all improvements required to convert it to developed...

  9. 12 CFR 561.26 - Land loan.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Land loan. 561.26 Section 561.26 Banks and... SAVINGS ASSOCIATIONS § 561.26 Land loan. The term land loan means a loan: (a) Secured by real estate upon... purchase of land and the accomplishment of all improvements required to convert it to developed...

  10. 12 CFR 561.26 - Land loan.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Land loan. 561.26 Section 561.26 Banks and... SAVINGS ASSOCIATIONS § 561.26 Land loan. The term land loan means a loan: (a) Secured by real estate upon... purchase of land and the accomplishment of all improvements required to convert it to developed...

  11. 12 CFR 561.26 - Land loan.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Land loan. 561.26 Section 561.26 Banks and... SAVINGS ASSOCIATIONS § 561.26 Land loan. The term land loan means a loan: (a) Secured by real estate upon... purchase of land and the accomplishment of all improvements required to convert it to developed...

  12. 12 CFR 161.26 - Land loan.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Land loan. 161.26 Section 161.26 Banks and... SAVINGS ASSOCIATIONS § 161.26 Land loan. The term land loan means a loan: (a) Secured by real estate upon... purchase of land and the accomplishment of all improvements required to convert it to developed...

  13. 12 CFR 161.26 - Land loan.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Land loan. 161.26 Section 161.26 Banks and... SAVINGS ASSOCIATIONS § 161.26 Land loan. The term land loan means a loan: (a) Secured by real estate upon... purchase of land and the accomplishment of all improvements required to convert it to developed...

  14. 12 CFR 561.26 - Land loan.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Land loan. 561.26 Section 561.26 Banks and... SAVINGS ASSOCIATIONS § 561.26 Land loan. The term land loan means a loan: (a) Secured by real estate upon... purchase of land and the accomplishment of all improvements required to convert it to developed...

  15. 12 CFR 561.26 - Land loan.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Land loan. 561.26 Section 561.26 Banks and... SAVINGS ASSOCIATIONS § 561.26 Land loan. The term land loan means a loan: (a) Secured by real estate upon... purchase of land and the accomplishment of all improvements required to convert it to developed...

  16. 49 CFR 1572.5 - Standards for security threat assessments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Standards for security threat assessments. 1572.5... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.5 Standards for...

  17. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  18. 7 CFR 770.7 - Security requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Security requirements. 770.7 Section 770.7 Agriculture... SPECIAL PROGRAMS INDIAN TRIBAL LAND ACQUISITION LOANS § 770.7 Security requirements. (a) The applicant will take appropriate action to obtain and provide security for the loan. (b) A mortgage or deed...

  19. 7 CFR 770.7 - Security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 7 2013-01-01 2013-01-01 false Security requirements. 770.7 Section 770.7 Agriculture... SPECIAL PROGRAMS INDIAN TRIBAL LAND ACQUISITION LOANS § 770.7 Security requirements. (a) The applicant will take appropriate action to obtain and provide security for the loan. (b) A mortgage or deed...

  20. 7 CFR 770.7 - Security requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Security requirements. 770.7 Section 770.7 Agriculture... SPECIAL PROGRAMS INDIAN TRIBAL LAND ACQUISITION LOANS § 770.7 Security requirements. (a) The applicant will take appropriate action to obtain and provide security for the loan. (b) A mortgage or deed...

  1. 7 CFR 770.7 - Security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 770.7 Section 770.7 Agriculture... SPECIAL PROGRAMS INDIAN TRIBAL LAND ACQUISITION LOANS § 770.7 Security requirements. (a) The applicant will take appropriate action to obtain and provide security for the loan. (b) A mortgage or deed...

  2. 7 CFR 770.7 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 770.7 Section 770.7 Agriculture... SPECIAL PROGRAMS INDIAN TRIBAL LAND ACQUISITION LOANS § 770.7 Security requirements. (a) The applicant will take appropriate action to obtain and provide security for the loan. (b) A mortgage or deed...

  3. Redefining security.

    PubMed

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  4. 8 CFR 234.2 - Landing requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false Landing requirements. 234.2 Section 234.2 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.2 Landing requirements. (a) Place of landing....

  5. 8 CFR 234.2 - Landing requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false Landing requirements. 234.2 Section 234.2 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.2 Landing requirements. (a) Place of landing....

  6. 8 CFR 234.2 - Landing requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false Landing requirements. 234.2 Section 234.2 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.2 Landing requirements. (a) Place of landing....

  7. 12 CFR 390.294 - Land loan.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Land loan. 390.294 Section 390.294 Banks and... Associations § 390.294 Land loan. The term land loan means a loan: (a) Secured by real estate upon which all..., so that it is entirely prepared for the erection of structures; (b) To finance the purchase of...

  8. 12 CFR 390.294 - Land loan.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Land loan. 390.294 Section 390.294 Banks and... Associations § 390.294 Land loan. The term land loan means a loan: (a) Secured by real estate upon which all..., so that it is entirely prepared for the erection of structures; (b) To finance the purchase of...

  9. 12 CFR 390.294 - Land loan.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Land loan. 390.294 Section 390.294 Banks and... Associations § 390.294 Land loan. The term land loan means a loan: (a) Secured by real estate upon which all..., so that it is entirely prepared for the erection of structures; (b) To finance the purchase of...

  10. 49 CFR 1580.105 - Reporting significant security concerns.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Reporting significant security concerns. 1580.105 Section 1580.105 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY...

  11. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  12. 76 FR 9227 - Safety Zone; Havasu Landing Regatta, Colorado River, Lake Havasu Landing, CA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-17

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Havasu Landing Regatta, Colorado River...; Havasu Landing Regatta, Colorado River, Lake Havasu Landing, CA. (a) Location. The limits of the...

  13. Land Grabbing and the Commodification of Agricultural Land in Africa

    NASA Astrophysics Data System (ADS)

    D'Odorico, P.; Rulli, M. C.

    2014-12-01

    The increasing global demand for farmland products is placing unprecedented pressure on the global agricultural system. The increasing demand can be met through either the intensification or the expansion of agricultural production at the expenses of other ecosystems. The ongoing escalation of large scale land acquisitions in the developing world may contribute to both of these two processes. Investments in agriculture have become a priority for a number of governments and corporations that are trying to expand their agricultural production while securing good profits. It is unclear however to what extent these investments are driving the intensification or the expansion of agriculture. In the last decade large scale land acquisitions by external investors have increased at unprecedented rates. This global land rush was likely enhanced by recent food crises, when prices skyrocketed in response to crop failure, new bioenergy policies, and the increasing demand for agricultural products by a growing and increasingly affluent human population. Corporations recognized the potential for high return investments in agricultural land, while governments started to enhance their food security by purchasing large tracts of land in foreign countries. It has been estimated that, to date, about 35.6 million ha of cropland - more than twice the agricultural land of Germany - have been acquired by foreign investors worldwide. As an effect of these land deals the local communities lose legal access to the land and its products. Here we investigate the effect of large scale land acquisition on agricultural intensification or expansion in African countries. We discuss the extent to which these investments in agriculture may increase crop production and stress how this phenomenon can greatly affect the local communities, their food security, economic stability and the long term resilience of their livelihoods, regardless of whether the transfer of property rights is the result of an

  14. 7 CFR 770.8 - Use of acquired land.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Use of acquired land. 770.8 Section 770.8 Agriculture... SPECIAL PROGRAMS INDIAN TRIBAL LAND ACQUISITION LOANS § 770.8 Use of acquired land. (a) General. Subject to § 770.5(d) land acquired with loan funds, or other property serving as the security for a...

  15. 7 CFR 770.8 - Use of acquired land.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 7 2013-01-01 2013-01-01 false Use of acquired land. 770.8 Section 770.8 Agriculture... SPECIAL PROGRAMS INDIAN TRIBAL LAND ACQUISITION LOANS § 770.8 Use of acquired land. (a) General. Subject to § 770.5(d) land acquired with loan funds, or other property serving as the security for a...

  16. 7 CFR 770.8 - Use of acquired land.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Use of acquired land. 770.8 Section 770.8 Agriculture... SPECIAL PROGRAMS INDIAN TRIBAL LAND ACQUISITION LOANS § 770.8 Use of acquired land. (a) General. Subject to § 770.5(d) land acquired with loan funds, or other property serving as the security for a...

  17. Land scarcity in Northern Namibia

    NASA Astrophysics Data System (ADS)

    Bloemertz, Lena; Dobler, Gregor; Graefe, Olivier; Kuhn, Nikolaus J.; Nghitevelekwa, Romie; Prudat, Brice; Weidmann, Laura

    2015-04-01

    Land access is a major topic in the Namibian population, which can also be seen in political discourses. In North-Central Namibia, the ongoing Communal Land Reform aims at improving tenure security and thereby also hopes to promote sustainable investment in land. Within this context, it is often argued that population growth is leading to an increased scarcity of land. However, this argument falls short of actual issues determining land scarcity in Namibia. In a context, where a large part of the population is still seen as depending on agricultural production, land scarcity has to be measured by different means to assess physical scarcity (population density, farm density, proportion of cultivated areas, or yield per person) as well as the perception of these different scarcities. This paper aims to discuss the different notions of land scarcity and argues that by focusing only on the physical realities of increasing pressure on land because of population growth, important other aspects are neglected. In order to scrutinize those measures, the study will further look at the distribution of different land uses, changing land use practices as connected to changing labour availability and mobility. Special attention will thereby be given to the difference between land scarcity and fertile soil scarcity and their relation to labour availability.

  18. A coastal perspective on security.

    PubMed

    Emerson, Steven D; Nadeau, John

    2003-11-14

    This paper examines security issues from the unique perspective of our nation's coastlines and associated infrastructure. It surveys ongoing efforts to secure offshore shipping lanes, as well as the transportation systems and huge capital investments on the narrow strip of land intersecting with coastal waters. The paper recounts the extraordinary demands recently placed on the Coast Guard, port authorities and other agencies charged with offshore security. New federal requirements such as port assessments continue to be mandated, while solutions to finding are still unfolding. An up-to-date summary of maritime security functions is provided. Those requirements are compared and contrasted with security guidelines and regulatory demands placed upon mobile and fixed assets of the Chemical Process Industry (CPI) in coastal environs. These span the gamut from recommendations by industry groups and professional organizations, to federal and state requirements, to insurance demands, to general duty obligations.

  19. Economic Aspects of Airport Security Measures

    DTIC Science & Technology

    1999-06-01

    Airport security measures use very expensive equipment, and may keep passengers in line for several minutes. The time passengers spend in those lines...can add up, and must be understood as time opportunity cost. In the 1970s, several airport security measures were adopted to help stop aircraft...associated with airport security measures. He concluded that the costs of the adopted measures were very high. While Landes concentrated on the

  20. Physical Security

    SciTech Connect

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  1. Social Security.

    ERIC Educational Resources Information Center

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  2. School Security.

    ERIC Educational Resources Information Center

    Bete, Tim, Ed.

    1998-01-01

    Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…

  3. 33 CFR 143.105 - Personnel landings.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Personnel landings. 143.105 Section 143.105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OUTER CONTINENTAL SHELF ACTIVITIES DESIGN AND EQUIPMENT OCS Facilities § 143.105 Personnel landings....

  4. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  5. Urban Fragility and Security in Africa (Africa Security Brief, Number 12, April 2011)

    DTIC Science & Technology

    2011-04-01

    transnational organized criminal syndicates , and political instability. The repercussions affect virtually every country on the continent. The slums of Kibera...activities and permanent land leases with construction of adequate housing, safety and security, electricity, street lighting, and formal schooling

  6. Secure PVM

    SciTech Connect

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  7. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    PubMed

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  8. Security Detail.

    ERIC Educational Resources Information Center

    Epstein, Marc A.

    2003-01-01

    Describes problems of maintaining discipline and security at Jamaica High School in Queens, New York. Argues that court decisions and school regulations have allowed minority of aggressive and disruptive students to destabilize the learning environment. (PKP)

  9. Secure portal.

    SciTech Connect

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal

  10. Global land and water grabbing

    PubMed Central

    Rulli, Maria Cristina; Saviori, Antonio; D’Odorico, Paolo

    2013-01-01

    Societal pressure on the global land and freshwater resources is increasing as a result of the rising food demand by the growing human population, dietary changes, and the enhancement of biofuel production induced by the rising oil prices and recent changes in United States and European Union bioethanol policies. Many countries and corporations have started to acquire relatively inexpensive and productive agricultural land located in foreign countries, as evidenced by the dramatic increase in the number of transnational land deals between 2005 and 2009. Often known as “land grabbing,” this phenomenon is associated with an appropriation of freshwater resources that has never been assessed before. Here we gather land-grabbing data from multiple sources and use a hydrological model to determine the associated rates of freshwater grabbing. We find that land and water grabbing are occurring at alarming rates in all continents except Antarctica. The per capita volume of grabbed water often exceeds the water requirements for a balanced diet and would be sufficient to improve food security and abate malnourishment in the grabbed countries. It is found that about 0.31 × 1012 m3⋅y−1 of green water (i.e., rainwater) and up to 0.14 × 1012 m3⋅y−1 of blue water (i.e., irrigation water) are appropriated globally for crop and livestock production in 47 × 106 ha of grabbed land worldwide (i.e., in 90% of the reported global grabbed land). PMID:23284174

  11. Global land and water grabbing.

    PubMed

    Rulli, Maria Cristina; Saviori, Antonio; D'Odorico, Paolo

    2013-01-15

    Societal pressure on the global land and freshwater resources is increasing as a result of the rising food demand by the growing human population, dietary changes, and the enhancement of biofuel production induced by the rising oil prices and recent changes in United States and European Union bioethanol policies. Many countries and corporations have started to acquire relatively inexpensive and productive agricultural land located in foreign countries, as evidenced by the dramatic increase in the number of transnational land deals between 2005 and 2009. Often known as "land grabbing," this phenomenon is associated with an appropriation of freshwater resources that has never been assessed before. Here we gather land-grabbing data from multiple sources and use a hydrological model to determine the associated rates of freshwater grabbing. We find that land and water grabbing are occurring at alarming rates in all continents except Antarctica. The per capita volume of grabbed water often exceeds the water requirements for a balanced diet and would be sufficient to improve food security and abate malnourishment in the grabbed countries. It is found that about 0.31 × 10(12) m(3) · y(-1) of green water (i.e., rainwater) and up to 0.14 × 10(12) m(3) · y(-1) of blue water (i.e., irrigation water) are appropriated globally for crop and livestock production in 47 × 10(6) ha of grabbed land worldwide (i.e., in 90% of the reported global grabbed land).

  12. 33 CFR 211.4 - Acquisition of land.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 3 2011-07-01 2011-07-01 false Acquisition of land. 211.4... Estate; General § 211.4 Acquisition of land. (a) Real property and interests therein may be acquired by...) Purchase. It is the policy of the Department of the Army to secure title to lands, or the desired...

  13. 76 FR 6688 - Land Border Carrier Initiative Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-08

    ... SECURITY U.S. Customs and Border Protection 19 CFR Parts 123, 142 and 178 RIN 1651-AA68 Land Border Carrier... to the Land Border Carrier Initiative Program (LBCIP). The LBCIP was established as a voluntary industry partnership program under which participating land and rail commercial carriers would agree...

  14. 33 CFR 211.4 - Acquisition of land.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Acquisition of land. 211.4... Estate; General § 211.4 Acquisition of land. (a) Real property and interests therein may be acquired by...) Purchase. It is the policy of the Department of the Army to secure title to lands, or the desired...

  15. Land Research

    EPA Pesticide Factsheets

    EPA is working to develop methods and guidance to manage and clean up contaminated land, groundwater and nutrient pollution as well as develop innovative approaches to managing materials and waste including energy recovery.

  16. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  17. Marginal Lands: Concept, Assessment and Management

    SciTech Connect

    Kang, Shujiang; Post, Wilfred M; West, Tristram O.; Bandaru, Vara Prasad; Izaurralde, Dr. R. Cesar; Wang, Dali; Nichols, Dr Jeff A

    2013-01-01

    Marginal lands have received wide attention for their potential to improve food security and support bioenergy production. However, environmental, ecosystem service, and sustainability concerns have been widely raised over the use of marginal land. Knowledge of the extent, location, and quality of marginal lands as well as their assessment and management are limited and diverse. This paper provides a review of the historical development of marginal concept, its application and assessment. Limitations and priority research needs of marginal land assessment and management were discussed.

  18. 7 CFR 1962.17 - Disposal of chattel security, use of proceeds and release of lien.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... agreement Rent on equipment, land, and buildings Feed for animals Seed Fertilizer Pesticides, herbicides... Agency on the old security. (vi) Proceeds can be used to preserve the security because of a...

  19. 7 CFR 1962.17 - Disposal of chattel security, use of proceeds and release of lien.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... agreement Rent on equipment, land, and buildings Feed for animals Seed Fertilizer Pesticides, herbicides... Agency on the old security. (vi) Proceeds can be used to preserve the security because of a...

  20. 7 CFR 1962.17 - Disposal of chattel security, use of proceeds and release of lien.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... agreement Rent on equipment, land, and buildings Feed for animals Seed Fertilizer Pesticides, herbicides... Agency on the old security. (vi) Proceeds can be used to preserve the security because of a...

  1. 7 CFR 1962.17 - Disposal of chattel security, use of proceeds and release of lien.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... agreement Rent on equipment, land, and buildings Feed for animals Seed Fertilizer Pesticides, herbicides... Agency on the old security. (vi) Proceeds can be used to preserve the security because of a...

  2. 77 FR 41688 - Security Zones; 2012 Republican National Convention, Captain of the Port St. Petersburg Zone...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-16

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA87 Security Zones; 2012 Republican National Convention.... SUMMARY: The Coast Guard is establishing seven temporary security zones on the waters and adjacent land 20... August 31, 2012. The Department of Homeland Security has designated the 2012 Republican...

  3. 75 FR 80841 - Notice of Realty Action: Direct Sale of Public Land in Kern County, CA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... direct sale because Kern County wishes to secure the land for a buffer zone for their existing landfill... appropriation under the public land laws, including the mining laws, except for the sale provisions of the...

  4. 33 CFR 149.693 - What are the requirements for personnel landings on manned deepwater ports?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: DESIGN, CONSTRUCTION, AND EQUIPMENT Design and Equipment Personnel Landings § 149.693 What are the requirements...

  5. Security system

    DOEpatents

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  6. Image Security

    DTIC Science & Technology

    2007-11-02

    popularity, contemplates the cru- cial needs for protecting intellectual property rights on multimedia content like images, video, audio , and oth- ers...protection for still images, audio , video, and multimedia products.’ The networking environment of the future will require tools that provide m secure and fast...technique known as steganography ? Steganography , or “covered writing,” George Voyatzis and Ioannis Pitas University of Thessaloniki has a long

  7. Security seal

    DOEpatents

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  8. Statistical security for Social Security.

    PubMed

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  9. Land-based approach to evaluate sustainable land management and adaptive capacity of ecosystems/lands

    NASA Astrophysics Data System (ADS)

    Kust, German; Andreeva, Olga

    2015-04-01

    A number of new concepts and paradigms appeared during last decades, such as sustainable land management (SLM), climate change (CC) adaptation, environmental services, ecosystem health, and others. All of these initiatives still not having the common scientific platform although some agreements in terminology were reached, schemes of links and feedback loops created, and some models developed. Nevertheless, in spite of all these scientific achievements, the land related issues are still not in the focus of CC adaptation and mitigation. The last did not grow much beyond the "greenhouse gases" (GHG) concept, which makes land degradation as the "forgotten side of climate change" The possible decision to integrate concepts of climate and desertification/land degradation could be consideration of the "GHG" approach providing global solution, and "land" approach providing local solution covering other "locally manifesting" issues of global importance (biodiversity conservation, food security, disasters and risks, etc.) to serve as a central concept among those. SLM concept is a land-based approach, which includes the concepts of both ecosystem-based approach (EbA) and community-based approach (CbA). SLM can serve as in integral CC adaptation strategy, being based on the statement "the more healthy and resilient the system is, the less vulnerable and more adaptive it will be to any external changes and forces, including climate" The biggest scientific issue is the methods to evaluate the SLM and results of the SLM investments. We suggest using the approach based on the understanding of the balance or equilibrium of the land and nature components as the major sign of the sustainable system. Prom this point of view it is easier to understand the state of the ecosystem stress, size of the "health", range of adaptive capacity, drivers of degradation and SLM nature, as well as the extended land use, and the concept of environmental land management as the improved SLM approach

  10. Nuclear security

    SciTech Connect

    Dingell, J.D.

    1991-02-01

    The Department of Energy's (DOE) Lawrence Livermore National Laboratory, located in Livermore, California, generates and controls large numbers of classified documents associated with the research and testing of nuclear weapons. Concern has been raised about the potential for espionage at the laboratory and the national security implications of classified documents being stolen. This paper determines the extent of missing classified documents at the laboratory and assesses the adequacy of accountability over classified documents in the laboratory's custody. Audit coverage was limited to the approximately 600,000 secret documents in the laboratory's custody. The adequacy of DOE's oversight of the laboratory's secret document control program was also assessed.

  11. The Energy and Security Nexus: A Strategic Dilemma

    DTIC Science & Technology

    2011-07-15

    that the use of nuclear power promises to alleviate some security problems. For example, it does not generate greenhouse gases which lead to global...seriously reduce U.S. crop yields. At the same time, he warned of the negative security ramifications of biofuels production. When land is cleared, greenhouse ... gasses are emitted. Moreover, by devoting an extensive portion of our arable land (currently 1/3) to biofuels production, we have already caused a

  12. Combining Sustainable Land Management Technologies to Combat Land Degradation and Improve Rural Livelihoods in Semi-arid Lands in Kenya.

    PubMed

    Mganga, K Z; Musimba, N K R; Nyariki, D M

    2015-12-01

    Drylands occupy more than 80% of Kenya's total land mass and contribute immensely to the national economy and society through agriculture, livestock production, tourism, and wild product harvesting. Dryland ecosystems are areas of high climate variability making them vulnerable to the threats of land degradation. Consequently, agropastoralists inhabiting these ecosystems develop mechanisms and technologies to cope with the impacts of climate variability. This study is aimed to; (1) determine what agropastoralists inhabiting a semi-arid ecosystem in Kenya attribute to be the causes and indicators of land degradation, (2) document sustainable land management (SLM) technologies being undertaken to combat land degradation, and (3) identify the factors that influence the choice of these SLM technologies. Vegetation change from preferred indigenous forage grass species to woody vegetation was cited as the main indicator of land degradation. Land degradation was attributed to recurrent droughts and low amounts of rainfall, overgrazing, and unsustainable harvesting of trees for fuelwood production. However, despite the challenges posed by climate variability and recurrent droughts, the local community is engaging in simple SLM technologies including grass reseeding, rainwater harvesting and soil conservation, and dryland agroforestry as a holistic approach combating land degradation and improving their rural livelihoods. The choice of these SLM technologies was mainly driven by their additional benefits to combating land degradation. In conclusion, promoting such simple SLM technologies can help reverse the land degradation trend, improve agricultural production, food security including access to food, and subsequently improve livelihoods of communities inhabiting dryland ecosystems.

  13. Combining Sustainable Land Management Technologies to Combat Land Degradation and Improve Rural Livelihoods in Semi-arid Lands in Kenya

    NASA Astrophysics Data System (ADS)

    Mganga, K. Z.; Musimba, N. K. R.; Nyariki, D. M.

    2015-12-01

    Drylands occupy more than 80 % of Kenya's total land mass and contribute immensely to the national economy and society through agriculture, livestock production, tourism, and wild product harvesting. Dryland ecosystems are areas of high climate variability making them vulnerable to the threats of land degradation. Consequently, agropastoralists inhabiting these ecosystems develop mechanisms and technologies to cope with the impacts of climate variability. This study is aimed to; (1) determine what agropastoralists inhabiting a semi-arid ecosystem in Kenya attribute to be the causes and indicators of land degradation, (2) document sustainable land management (SLM) technologies being undertaken to combat land degradation, and (3) identify the factors that influence the choice of these SLM technologies. Vegetation change from preferred indigenous forage grass species to woody vegetation was cited as the main indicator of land degradation. Land degradation was attributed to recurrent droughts and low amounts of rainfall, overgrazing, and unsustainable harvesting of trees for fuelwood production. However, despite the challenges posed by climate variability and recurrent droughts, the local community is engaging in simple SLM technologies including grass reseeding, rainwater harvesting and soil conservation, and dryland agroforestry as a holistic approach combating land degradation and improving their rural livelihoods. The choice of these SLM technologies was mainly driven by their additional benefits to combating land degradation. In conclusion, promoting such simple SLM technologies can help reverse the land degradation trend, improve agricultural production, food security including access to food, and subsequently improve livelihoods of communities inhabiting dryland ecosystems.

  14. Challenges and Responses to Asian Food Security

    NASA Astrophysics Data System (ADS)

    Teng, Paul P. S.; Oliveros, Jurise A. P.

    2015-10-01

    Food security is a complex phenomenon made up of multiple dimensions — food availability, physical access to food, economic access to food, food utilization — each of which has a stability dimension which underpins it. This review provides details on these dimensions and links them to two published indices which provide assessments of the state of food security in a country. The paper further provides analyses of the main supply and demand factors in the food security equation. Food security faces natural and anthropogenic threats such as loss of productive land and water, climate change and declining crop productivity, all of which are potentially amenable to solutions provided by science and technology. Demographic and accompanying diet changes further exacerbate the demands made on the natural resource base for food production. Finally, possible responses to the challenges confronting a secured food future are discussed from technological, policy and system level perspectives.

  15. National security

    SciTech Connect

    Not Available

    1992-04-01

    This paper summarizes the views presented on October 31, 1991, at a GAO-sponsored conference on worldwide threats to U.S. national security. The conference was designed to provide insight into potential military threats to U.S. security interests and necessary modifications to current and planned U.S. forces to meet those threats. Conference participants, including defense analysts and retired military officers, discussed and analyzed the possibility of U.S. and allied involvement in various regional contingencies in Europe and the Soviet Union, Eat Asia and the Pacific, and the Near East and South Asia. Topics ranged from the possibility of nuclear war to a general discussion of low-intensity conflict. To serve as a starting point for discussion, we asked several of the participants to provide papers representing a wide range of views. The participants agreed that for many years the Soviet/Warsaw Pact threat to Europe shaped U.S. force planning but that the Soviet union no longer posed a conventional threat. Nuclear weapons held by the former Soviet republics and other nations, however, remain a concern. There was no agreement of the methodology for sizing U.S. forces. Some argued for sizing based on specific threats; other argued for flexibility to meet any and all contingencies and cited the Gulf War as a example.

  16. 33 CFR 165.701 - Vicinity, Kennedy Space Center, Merritt Island, Florida-security zone.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... § 165.701 Vicinity, Kennedy Space Center, Merritt Island, Florida—security zone. (a) The water, land, and land and water within the following boundaries are a security zone—The perimeter of the Cape.... The closing of the area is signified by the display of a red ball from a 90-foot pole near...

  17. 33 CFR 165.701 - Vicinity, Kennedy Space Center, Merritt Island, Florida-security zone.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... § 165.701 Vicinity, Kennedy Space Center, Merritt Island, Florida—security zone. (a) The water, land, and land and water within the following boundaries are a security zone—The perimeter of the Cape.... The closing of the area is signified by the display of a red ball from a 90-foot pole near...

  18. 33 CFR 165.701 - Vicinity, Kennedy Space Center, Merritt Island, Florida-security zone.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... § 165.701 Vicinity, Kennedy Space Center, Merritt Island, Florida—security zone. (a) The water, land, and land and water within the following boundaries are a security zone—The perimeter of the Cape.... The closing of the area is signified by the display of a red ball from a 90-foot pole near...

  19. 33 CFR 165.701 - Vicinity, Kennedy Space Center, Merritt Island, Florida-security zone.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... § 165.701 Vicinity, Kennedy Space Center, Merritt Island, Florida—security zone. (a) The water, land, and land and water within the following boundaries are a security zone—The perimeter of the Cape.... The closing of the area is signified by the display of a red ball from a 90-foot pole near...

  20. 33 CFR 165.729 - Jacksonville Harbor, Florida-security zone.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Jacksonville Harbor, Florida—security zone. (a) The water, land, and land and water within the following boundaries are established as security zones during the specified conditions: (1) Zone A. 200 yards in all... entrance sea buoy (STJ) and its berth inside the Mayport Naval Basin (Ribault Bay), Mayport, Florida....

  1. Governing for Enterprise Security

    DTIC Science & Technology

    2005-06-01

    1 2 W hat Is Governing for Enterprise Security? ................................................ 5 3 W hat Are the Risks...23 4.3 Determ ining Adequate Security ........................................................ 25 5 What Are the...security. Section 4 lays the foundation for determining how much security is enough and further expands the definition of adequate security. Section 5

  2. Security for grids

    SciTech Connect

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  3. 49 CFR 1570.13 - False statements regarding security background checks by public transportation agency or railroad...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false False statements regarding security background... Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY GENERAL RULES § 1570.13 False...

  4. 49 CFR 1570.13 - False statements regarding security background checks by public transportation agency or railroad...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY GENERAL RULES § 1570.13 False statements... 49 Transportation 9 2011-10-01 2011-10-01 false False statements regarding security...

  5. Land Use and Land Cover Change

    SciTech Connect

    Brown, Daniel; Polsky, Colin; Bolstad, Paul V.; Brody, Samuel D.; Hulse, David; Kroh, Roger; Loveland, Thomas; Thomson, Allison M.

    2014-05-01

    A contribution to the 3rd National Climate Assessment report, discussing the following key messages: 1. Choices about land-use and land-cover patterns have affected and will continue to affect how vulnerable or resilient human communities and ecosystems are to the effects of climate change. 2. Land-use and land-cover changes affect local, regional, and global climate processes. 3. Individuals, organizations, and governments have the capacity to make land-use decisions to adapt to the effects of climate change. 4. Choices about land use and land management provide a means of reducing atmospheric greenhouse gas levels.

  6. Maritime Security Cooperation in the Strait of Malacca

    DTIC Science & Technology

    2008-06-01

    Banlaoi, “Maritime Security Outlook for Southeast Asia,” The Best of Time, the Worst of Times, ed. Joshua Ho and Catherine Zara Raymond (Singapore...Johor Straits, Singapore’s water supply and the territorial issue of Pedra Branca Islet.51 Singapore had begun to reclaim land through its land...lies first in the fact that Singapore’s primary source of water is Malaysia and in two agreements on the terms and pricing of the supply of untreated

  7. The Bureau of Refugees, Freedmen, and Abandoned Lands

    ERIC Educational Resources Information Center

    Chism, Kahlil

    2006-01-01

    This article discusses the Bureau of Refugees, Freedmen, and Abandoned Lands (Freedmen's Bureau), which was established by the Congress on March 3, 1865, to assist former slaves in acquiring land, securing employment, legalizing marriages, and pursuing education. After the bureau's abolition through an act of Congress approved on June 10, 1872,…

  8. 8 CFR 251.2 - Notification of illegal landings.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... the United States shall inform the immigration officer in charge of the port where the illegal landing... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false Notification of illegal landings. 251.2 Section 251.2 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS ARRIVAL...

  9. 8 CFR 251.2 - Notification of illegal landings.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... the United States shall inform the immigration officer in charge of the port where the illegal landing... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false Notification of illegal landings. 251.2 Section 251.2 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS ARRIVAL...

  10. 8 CFR 251.2 - Notification of illegal landings.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... the United States shall inform the immigration officer in charge of the port where the illegal landing... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false Notification of illegal landings. 251.2 Section 251.2 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS ARRIVAL...

  11. 8 CFR 251.2 - Notification of illegal landings.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... the United States shall inform the immigration officer in charge of the port where the illegal landing... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false Notification of illegal landings. 251.2 Section 251.2 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS ARRIVAL...

  12. 8 CFR 251.2 - Notification of illegal landings.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the United States shall inform the immigration officer in charge of the port where the illegal landing... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Notification of illegal landings. 251.2 Section 251.2 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS ARRIVAL...

  13. Transportation Security Administration

    MedlinePlus

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? ... form Search the Site Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  14. Food appropriation through large scale land acquisitions

    NASA Astrophysics Data System (ADS)

    Rulli, Maria Cristina; D'Odorico, Paolo

    2014-05-01

    The increasing demand for agricultural products and the uncertainty of international food markets has recently drawn the attention of governments and agribusiness firms toward investments in productive agricultural land, mostly in the developing world. The targeted countries are typically located in regions that have remained only marginally utilized because of lack of modern technology. It is expected that in the long run large scale land acquisitions (LSLAs) for commercial farming will bring the technology required to close the existing crops yield gaps. While the extent of the acquired land and the associated appropriation of freshwater resources have been investigated in detail, the amount of food this land can produce and the number of people it could feed still need to be quantified. Here we use a unique dataset of land deals to provide a global quantitative assessment of the rates of crop and food appropriation potentially associated with LSLAs. We show how up to 300-550 million people could be fed by crops grown in the acquired land, should these investments in agriculture improve crop production and close the yield gap. In contrast, about 190-370 million people could be supported by this land without closing of the yield gap. These numbers raise some concern because the food produced in the acquired land is typically exported to other regions, while the target countries exhibit high levels of malnourishment. Conversely, if used for domestic consumption, the crops harvested in the acquired land could ensure food security to the local populations.

  15. Security Force Assistance and Security Sector Reform

    DTIC Science & Technology

    2013-09-01

    development, and planning, 63 Shultz: Security Force Assistance and Security Sector Reform budgeting and management are critical in reforming a defense...and Security Sector Reform Richard H. Shultz, Jr. JSOU Report 13-5 September 2013 Joint Special Operations University 7701 Tampa Point Boulevard...Assistance and Security Sector Reform 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK

  16. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  17. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  18. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  19. 77 FR 47091 - Notice of Re-Establishment of the Secure Rural Schools Resource Advisory Committees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-07

    ... Bureau of Land Management Notice of Re-Establishment of the Secure Rural Schools Resource Advisory Committees AGENCY: Bureau of Land Management, Interior. ACTION: Notice. SUMMARY: This notice is published in... the Secretary of the Interior (Secretary) has re-established the Bureau of Land ] Management's...

  20. 75 FR 4418 - Notice of Reestablishment of the Secure Rural Schools Resource Advisory Committees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-27

    ... Bureau of Land Management Notice of Reestablishment of the Secure Rural Schools Resource Advisory Committees AGENCY: Bureau of Land Management, Interior. ACTION: Notice. SUMMARY: This notice is published in... the Secretary of the Interior (Secretary) has reestablished the Bureau of Land Management's...

  1. Sentinel-3 For Land Applications

    NASA Astrophysics Data System (ADS)

    Goryl, Philippe; Gobron, Nadine; Mecklenburg, Susanne; Donlon, Craig; Bouvet, Marc; Buongiorno, Alessandra; Wilson, Hilary

    2016-07-01

    The Copernicus Programme, being Europe's Earth Observation and Monitoring Programme led by the European Union, aims to provide, on a sustainable basis, reliable and timely services related to environmental and security issues. The Sentinel-3 mission forms part of the Copernicus Space Component. Its main objectives, building on the heritage and experience of the European Space Agency's (ESA) ERS and ENVISAT missions, are to measure sea-surface topography, sea- and land-surface temperature and ocean- and land-surface colour in support of ocean forecasting systems, and for environmental and climate monitoring. The series of Sentinel-3 satellites will ensure global, frequent and near-real time ocean, ice and land monitoring, with the provision of observation data in a routine, long-term (up to 20 years of operations) and continuous fashion, with a consistent quality and a high level of reliability and availability. The launch of Sentinel-3 was successful last February 2016. The Sentinel-3 missions are jointly operated by ESA and EUMETSAT. ESA will be responsible for the operations, maintenance and evolution of the Sentinel-3 ground segment on land related products and EUMETSAT on the marine products and the satellite monitoring and control. All facilities supporting the Sentinel-3 operations are in place. The Sentinel-3 ground segment systematically acquires, processes and distributes a set of pre-defined core data products to the users. For a detailed description of the core data products please see https://earth.esa.int/web/sentinel/missions/sentinel-3/data-products. On request from the European Commission, ESA and EUMETSAT are presently assessing the possibility to include further core data products, in particular on aerosol optical depth, fire monitoring and synergistic products over land. This paper will provide an update on the status of the mission operations after the initial months in orbit and provide in particular an overview on the status of the Sentinel-3

  2. Reusable Security Requirements

    DTIC Science & Technology

    2016-06-13

    terms of subfactor of security quality factor, asset, threat, attacker, and situation • Standard measures for security subfactors • Parameterized...2003 by Carnegie Mellon University page 5 Carnegie Mellon Software Engineering Institute Types of Security Requirements Use Quality Model of factors...subfactors, criteria, and measures. Small number of Security Quality Subfactors: • Access Control (Identification, Authentication, and Authorization

  3. Chapter 3: Energy Security

    SciTech Connect

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  4. Building Security into Schools.

    ERIC Educational Resources Information Center

    Kosar, John E.; Ahmed, Faruq

    2000-01-01

    Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…

  5. Unix Security Cookbook

    NASA Astrophysics Data System (ADS)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  6. School Security Roundtable, 2000.

    ERIC Educational Resources Information Center

    Agron, Joe, Ed.; Anderson, Larry, Ed.

    A roundtable discussion is presented revealing what experts say about school security problems and how they are being addressed. Also included are trend data from the School Security 2000 survey revealing top security concerns, strategies, and security equipment preferences; how site surveys can be used to keep schools safe; and how creating a…

  7. Abandoned Mine Lands

    EPA Pesticide Factsheets

    Abandoned Mine Lands are those lands, waters, and surrounding watersheds where extraction, beneficiation, or processing of ores and minerals (excluding coal) has occurred. These lands also include areas where mining or processing activity is inactive.

  8. Texting "boosts" felt security.

    PubMed

    Otway, Lorna J; Carnelley, Katherine B; Rowe, Angela C

    2014-01-01

    Attachment security can be induced in laboratory settings (e.g., Rowe & Carnelley, 2003) and the beneficial effects of repeated security priming can last for a number of days (e.g., Carnelley & Rowe, 2007). The priming process, however, can be costly in terms of time. We explored the effectiveness of security priming via text message. Participants completed a visualisation task (a secure attachment experience or neutral experience) in the laboratory. On three consecutive days following the laboratory task, participants received (secure or neutral) text message visualisation tasks. Participants in the secure condition reported significantly higher felt security than those in the neutral condition, immediately after the laboratory prime, after the last text message prime and one day after the last text prime. These findings suggest that security priming via text messages is an innovative methodological advancement that effectively induces felt security, representing a potential direction forward for security priming research.

  9. Helicopter acoustic alerting system for high-security facilities

    NASA Astrophysics Data System (ADS)

    Steadman, Robert L.; Hansen, Scott; Park, Chris; Power, Dennis

    2009-05-01

    Helicopters present a serious threat to high security facilities such as prisons, nuclear sites, armories, and VIP compounds. They have the ability to instantly bypass conventional security measures focused on ground threats such as fences, check-points, and intrusion sensors. Leveraging the strong acoustic signature inherent in all helicopters, this system would automatically detect, classify, and accurately track helicopters using multi-node acoustic sensor fusion. An alert would be generated once the threat entered a predefined 3-dimension security zone in time for security personnel to repel the assault. In addition the system can precisely identify the landing point on the facility grounds.

  10. Onboard pattern recognition for autonomous UAV landing

    NASA Astrophysics Data System (ADS)

    Sung, Chen-Ko; Segor, Florian

    2012-10-01

    The civil security and supervision system AMFIS was developed at the Fraunhofer IOSB as a mobile support system using multiple UAVs for rescue forces in accidents or disasters. To gain a higher level of autonomy for these UAVs, different onboard process chains of image exploitation for tracking landmarks and of control technologies for UAV navigation were implemented and examined to achieve a redundant and reliable UAV precision landing. First experiments have allowed to validate the process chains and to develop a demonstration system for the tracking of landmarks in order to prevent and to minimize any confusion on landing.

  11. Security system signal supervision

    SciTech Connect

    Chritton, M.R. ); Matter, J.C. )

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  12. Securing General Aviation

    DTIC Science & Technology

    2009-03-03

    ajor vulnerabilities still exist in ... general aviation security ,”3 the commission did not further elaborate on the nature of those vulnerabilities...commercial operations may make them an attractive alternative to terrorists seeking to identify and exploit vulnerabilities in aviation security . In this...3, 2003, p. A7. 2 See Report of the Aviation Security Advisory Committee Working Group on General Aviation Airport Security (October 1, 2003); and

  13. Land use and land cover digital data

    USGS Publications Warehouse

    ,

    1994-01-01

    Computer tapes derived from land use and land cover (LULC) data and associated maps at scales of 1 :250,000 and 1: 100,000 are available from the U.S. Geological Survey. This data can be used alone or combined with a base map or other supplemental data for a variety of applications, using commercially available software. You can produce area summary statistics, select specific portions of a map to study or display single classifications, such as bodies of water. LULC and associated digital data offer convenient, accurate, flexible, and cost-effective access to users who are involved in environmental studies, land use planning, land management, or resource planning.

  14. Homeland Security and Information.

    ERIC Educational Resources Information Center

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  15. Selecting Security Technology Providers

    ERIC Educational Resources Information Center

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  16. Filling a Security Gap

    ERIC Educational Resources Information Center

    Parks and Recreation, 1978

    1978-01-01

    A new type of public facility security system, utilizing a radio system and voice logging recorder, has effectively improved security at the John F. Kennedy Center for the Performing Arts. The system monitors security operations, provides a reliable record in the case of conflicting claims, and accurately pinpoints the time of events. (DS)

  17. School Violence: Physical Security.

    ERIC Educational Resources Information Center

    Utah State Office of Education, Salt Lake City.

    This booklet provides an overview of security technology product areas that might be appropriate and affordable for school applications. Topics cover security concepts and operational issues; security issues when designing for new schools; the role of maintenance; video camera use; walk-through metal detectors; duress alarm devices; and a partial…

  18. Lemnos interoperable security project.

    SciTech Connect

    Halbgewachs, Ronald D.

    2010-03-01

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

  19. Secure Database Management Study.

    DTIC Science & Technology

    1978-12-01

    3.1.2 McCauleYls Security Atoms Additional concepts are introduced in (MCCAES) which enhance the security aspects of the attribute- bar id model...sLgnificance. Physical access remains as an overriding factor of system security. Without protection of the physeal operating environment (computer

  20. Security: Progress and Challenges

    ERIC Educational Resources Information Center

    Luker, Mark A.

    2004-01-01

    The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…

  1. Structuring Homeland Security

    DTIC Science & Technology

    2002-04-09

    20 AIRPORT SECURITY .............................................................................................. 20...using an existing command and control structure. Since September 11, 2001 airport security has been of heightened importance to the American public...In order to use Reserves to provide airport security the airports themselves should be made federal property. This would allow greater flexibility for

  2. Land-use and land-cover sceneries in China: an application of Dinamica EGO model

    NASA Astrophysics Data System (ADS)

    Yi, Wei; Gao, Zhiqiang; Li, Zhihua; Chen, Maosi

    2012-10-01

    Land is an indispensable natural resource for human, without which we cannot survive and develop. Land-use change, influenced by both natural environment and human activity, has a close relationship with food security, resource utilization, biodiversity and climate change. In order to understand the process and driving mechanism of land-use change, dynamic models were developed in these years, among which Dinamica EGO is a practical one and has been widely used in the world. In this paper, we aim to use Dinamica EGO to simulate the land-use of China in 2005 with data extracted from SPOT VGT NDVI. The real land-use map was compared with the simulation result so as to verify the feasibility of Dinamica EGO. Then we supposed three sceneries under which we could analyze the land-use change of China in 2020. Results indicated that: on the basis of no extreme natural disasters or exceptional policy fluctuation, the grassland area would reduce by 22.21 million hectares averagely. However forest would increase by 19.81 billion hectares on average. Water and unused land would probably remain stable as there was little change in three sceneries. Farmland areas showed a good agreement under these sceneries whereas the greatest difference in land-use area estimations lies in built-up with an uncertainty accounting for 1.67%.

  3. Urban environment and health: food security.

    PubMed

    Galal, Osman; Corroon, Meghan; Tirado, Cristina

    2010-07-01

    The authors examine the impact of urbanization on food security and human health in the Middle East. Within-urban-population disparities in food security represent one of the most dramatic indicators of economic and health disparities. These disparities are reflected in a double burden of health outcomes: increasing levels of chronic disease as well as growing numbers of undernourished among the urban poor. These require further comprehensive solutions. Some of the factors leading to food insecurity are an overdependence on purchased food commodities, lack of sufficient livelihoods, rapid reductions in peripheral agricultural land, and adverse impacts of climate change. The Food and Agriculture Organization of the United Nations (FAO) Food Security Framework is used to examine and compare 2 cities in the Middle East: Amman, Jordan, and Manama, Bahrain.

  4. 18 CFR 367.55 - Land and land rights.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Land and land rights... Property Instructions § 367.55 Land and land rights. (a) The accounts for land and land rights must include the cost of land owned in fee by the service company and rights. Interests, and privileges held by...

  5. 18 CFR 367.55 - Land and land rights.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Land and land rights... Property Instructions § 367.55 Land and land rights. (a) The accounts for land and land rights must include the cost of land owned in fee by the service company and rights. Interests, and privileges held by...

  6. 18 CFR 367.55 - Land and land rights.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Land and land rights... Property Instructions § 367.55 Land and land rights. (a) The accounts for land and land rights must include the cost of land owned in fee by the service company and rights. Interests, and privileges held by...

  7. 18 CFR 367.55 - Land and land rights.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Land and land rights... Property Instructions § 367.55 Land and land rights. (a) The accounts for land and land rights must include the cost of land owned in fee by the service company and rights. Interests, and privileges held by...

  8. 18 CFR 367.55 - Land and land rights.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 18 Conservation of Power and Water Resources 1 2011-04-01 2011-04-01 false Land and land rights... Property Instructions § 367.55 Land and land rights. (a) The accounts for land and land rights must include the cost of land owned in fee by the service company and rights. Interests, and privileges held by...

  9. The Security-Stability-Sustainability Nexus: Environmental Considerations

    DTIC Science & Technology

    2009-05-01

    health and environmental security are often intertwined, and while not traditionally viewed as „threats‟ to U.S. national security, they will affect ...Intelligence Community for the Senate Select Committee on Intelligence, Feb 12, 2009 Instability and Fragile States (FM 3-0) Trends Affecting Ground Force...urbanization – highest rate for decades World’s highest rate of deforestation Land degradation leading to desertification Estimated 65% of agricultural

  10. Secure Transportation Management

    SciTech Connect

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  11. Medical database security evaluation.

    PubMed

    Pangalos, G J

    1993-01-01

    Users of medical information systems need confidence in the security of the system they are using. They also need a method to evaluate and compare its security capabilities. Every system has its own requirements for maintaining confidentiality, integrity and availability. In order to meet these requirements a number of security functions must be specified covering areas such as access control, auditing, error recovery, etc. Appropriate confidence in these functions is also required. The 'trust' in trusted computer systems rests on their ability to prove that their secure mechanisms work as advertised and cannot be disabled or diverted. The general framework and requirements for medical database security and a number of parameters of the evaluation problem are presented and discussed. The problem of database security evaluation is then discussed, and a number of specific proposals are presented, based on a number of existing medical database security systems.

  12. Securing collaborative environments

    SciTech Connect

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  13. Land Mine Options in Future Crisis and Conflicts

    DTIC Science & Technology

    1987-03-09

    EDITION OF INOVS IS OSSOLETE SECURITY CLASSIFICATION OF THIS PA;.E ("~en Cae. FnIr,,d) -. *A SECURITY CLASSIFICATION Or THIS PAGC(Whmf’ Data Eant*~d... energy . Yet such is the case, for there does exist a type of weapon which has determined the success or failure of military conflict in other and...the nuclear threshold - low intensity conflict emphasis then the question that naturally follows is - How can land mines contribute to strategic goals

  14. The water footprint of land grabbing

    NASA Astrophysics Data System (ADS)

    Rulli, Maria Cristina; D'Odorico, Paolo

    2013-12-01

    increasing global demand for food, fibers, and biofuels has made investments in agriculture a priority for some governments and corporations eager to expand their agricultural production while securing good profits. Here we calculate the water appropriation associated with land deals at different negotiation and implementation stages. Using estimates of actual and potential evapotranspiration for the crops planted in the acquired land, we calculate the green and blue water appropriated by land investors under a variety of irrigation scenarios. We also determine the grey water footprint as the amount of water required to dilute to allowable standards the pollution resulting from fertilizer applications. We found that about 380 × 109 m3 yr-1 of rainwater is appropriated with the 43 million ha of reported contract area acquired by agri-investors (>240 × 109 m3 yr-1 in the 29 million ha of foreign acquisitions only). This water would be sufficient to feed ≈ 300-390 million people.

  15. What is Security? A perspective on achieving security

    SciTech Connect

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  16. Land Revitalization Basics

    EPA Pesticide Factsheets

    EPA created the Land Revitalization Initiative to promote cross-program coordination on land reuse and revitalization projects to ensure that contaminated property is appropriately put back into productive use.

  17. Agriculture: Land Use

    EPA Pesticide Factsheets

    Land Use and agriculture. Information about land use restrictions and incentive programs.Agricultural operations sometimes involve activities regulated by laws designed to protect water supplies, threatened or endangered plants and animals, or wetlands.

  18. Lunar Landing Research Vehicle

    NASA Video Gallery

    The lunar lander, called a Lunar Excursion Module, or Lunar Module (LM), was designed for vertical landing and takeoff, and was able to briefly hover and fly horizontally before landing. At first g...

  19. Freight Containers in Intermodal and Land Bridge Commerce.

    DTIC Science & Technology

    1980-09-01

    r AD-AB95 861 NAVAL POSTGRADUATE SCHOOL MONTEREY CA FI 15/5 FREIGHT CONTAINERS IN INTER DAL AND LAND BRIDGE COMMERCE .(U) UNCLASSIFIED SE G... COMMERCE by *James Stephen Walters September 1980 4 .4 Thesis Advisor: Dan C. Boger Approved for public release; distribution unlimited 81 29 SECURITY...Approved for public release; distribution unlimited Freight Containers in Intermodal and Land Bridge Commerce by James Stephen Walters Lieutenant

  20. Land Cover Characterization Program

    USGS Publications Warehouse

    ,

    1997-01-01

    (2) identify sources, develop procedures, and organize partners to deliver data and information to meet user requirements. The LCCP builds on the heritage and success of previous USGS land use and land cover programs and projects. It will be compatible with current concepts of government operations, the changing needs of the land use and land cover data users, and the technological tools with which the data are applied.

  1. Adaptability of Land Forces to 21st Century Security Challenges

    DTIC Science & Technology

    2008-05-01

    Stability” panel. From left, Gen-Maj Latif Faiziyev, Tajikistan; MG Ali al - Kaabi , UAE; and MG Ali Taleb, Yemen, discuss the Tajik DDR program...developed by al -Qaida and other terrorist groups. Second, natural disasters such as Cyclone Nargis, the Indonesian tsunami, major earthquakes and floods

  2. Federal Lands Jobs and Energy Security Act of 2013

    THOMAS, 113th Congress

    Rep. Lamborn, Doug [R-CO-5

    2013-05-14

    12/09/2013 Read the second time. Placed on Senate Legislative Calendar under General Orders. Calendar No. 254. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  3. Land surface interaction

    NASA Technical Reports Server (NTRS)

    Dickinson, Robert E.

    1992-01-01

    The topics covered include the following: land and climate modeling; sensitivity studies; the process of a land model; model-specific parameterizations; water stress; within-canopy resistances; partial vegetation; canopy temperature; and present experience with a land model coupled to a general circulation model.

  4. Land and World Order.

    ERIC Educational Resources Information Center

    Mische, Patricia, Ed.; And Others

    1982-01-01

    The papers in this publication discuss the land and how what happens to the land affects us. The publication is one in a series of monographs that examine the linkages between local and global concerns and explore alternative world futures. Examples of topics discussed in the papers follow. The paper "Land and World Order" examines…

  5. Literature and the Land.

    ERIC Educational Resources Information Center

    McKee, James W.

    1979-01-01

    Describes an interdisciplinary course which focuses on the grassland area of the central United States. Study of the land is approached through: (1) literature dealing directly with land; (2) novels about land-dependent people; and (3) formal lectures on geology and natural history of grassland. (Author/MA)

  6. Alaska Natives & the Land.

    ERIC Educational Resources Information Center

    Arnold, Robert D.; And Others

    Pursuant to the Native land claims within Alaska, this compilation of background data and interpretive materials relevant to a fair resolution of the Alaska Native problem seeks to record data and information on the Native peoples; the land and resources of Alaska and their uses by the people in the past and present; land ownership; and future…

  7. Food Security: A Climatological Perspective

    NASA Astrophysics Data System (ADS)

    Beer, T.

    2013-05-01

    Drought affects human life and health as well as impacting dramatically on the sustainable development of society. It represents a pending danger for vulnerable agricultural systems that depend on the rainfall, water supply and reservoirs. Developed countries are affected, but the impact is disproportionate within the developing world. Drought, especially when it results in famine, can change the life and economic development of developing nations and stifle their development for decades. A holistic approach is required to understand the phenomena, to forecast catastrophic events such as drought and famine and to predict their societal consequences. In the Food Security recommendations of the Rio+20 Forum on Science, Technology and Innovation for Sustainable Development it states that "To understand fully how to measure, assess and reduce the impacts of production on the natural environment including climate change, recognizing that different measures of impact (e.g. water, land, biodiversity, carbon and other greenhouse gases, etc) may trade-off against each other..." The International Union of Geodesy and Geophysics (IUGG) is leading the WeatCliFS consortium of international scientific unions to examine weather, climate and food security as well as to look at the interaction of food security and geophysical phenomena. The following fundamental question underpins WeatCliFS: What technologies and methodologies are required to assess the vulnerability of people and places to hazards [such as famine] - and how might these be used at a variety of spatial scales? This talk will review the historical link between climate, drought and food supplies; examine the Australian and international situation; summarise the response of the scientific community and point out the direction for future research.

  8. Materialism and food security.

    PubMed

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  9. Landing gear noise attenuation

    NASA Technical Reports Server (NTRS)

    Moe, Jeffrey W. (Inventor); Whitmire, Julia (Inventor); Kwan, Hwa-Wan (Inventor); Abeysinghe, Amal (Inventor)

    2011-01-01

    A landing gear noise attenuator mitigates noise generated by airframe deployable landing gear. The noise attenuator can have a first position when the landing gear is in its deployed or down position, and a second position when the landing gear is in its up or stowed position. The noise attenuator may be an inflatable fairing that does not compromise limited space constraints associated with landing gear retraction and stowage. A truck fairing mounted under a truck beam can have a compliant edge to allow for non-destructive impingement of a deflected fire during certain conditions.

  10. Land Treatment Digital Library

    USGS Publications Warehouse

    Pilliod, David S.; Welty, Justin L.

    2013-01-01

    The Land Treatment Digital Library (LTDL) was created by the U.S. Geological Survey to catalog legacy land treatment information on Bureau of Land Management lands in the western United States. The LTDL can be used by federal managers and scientists for compiling information for data-calls, producing maps, generating reports, and conducting analyses at varying spatial and temporal scales. The LTDL currently houses thousands of treatments from BLM lands across 10 states. Users can browse a map to find information on individual treatments, perform more complex queries to identify a set of treatments, and view graphs of treatment summary statistics.

  11. National land cover dataset

    USGS Publications Warehouse

    ,

    2000-01-01

    The U.S. Geological Survey (USGS), in cooperation with the U.S. Environmental Protection Agency, has produced a land cover dataset for the conterminous United States on the basis of 1992 Landsat thematic mapper imagery and supplemental data. The National Land Cover Dataset (NLCD) is a component of the USGS Land Cover Characterization Program. The seamless NLCD contains 21 categories of land cover information suitable for a variety of State and regional applications, including landscape analysis, land management, and modeling nutrient and pesticide runoff. The NLCD is distributed by State as 30-meter resolution raster images in an Albers Equal-Area map projection.

  12. Vehicle Tracking and Security

    NASA Astrophysics Data System (ADS)

    Scorer, A. G.

    1998-09-01

    This paper covers the wide area and short range locational technologies that are available for vehicle tracking in particular and mobile user security in general. It also summarises the radio communications services that can deliver information to the user. It considers the use that can be made of these technologies, when combined with procedures for delivering a response, in the security field, notably in relation to personal security, high-value load protection and the after-theft tracking markets.

  13. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  14. A Social Infrastructure for Hometown Security: Advancing the Homeland Security Paradigm

    DTIC Science & Technology

    2009-05-01

    private and non- profit sectors; and regions, communities, and individual citizens – along with our partners in the international community – will...chastised previous efforts that failed to mobilize communities across the land . Referring to Americans’ readiness to serve after the 9/11 attacks, he...impressive efforts to stand-up a new federal bureaucracy, however, have created a vast divide between a homeland security enterprise, with all the

  15. Beyond grid security

    NASA Astrophysics Data System (ADS)

    Hoeft, B.; Epting, U.; Koenig, T.

    2008-07-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.

  16. Kaliningrad and Baltic Security

    DTIC Science & Technology

    2001-06-01

    impossible to solve. By shifting the paradigm toward regional development and regional cooperation to address common problems, the future security relationship of the Baltic littoral becomes more optimistic.

  17. Laser security systems

    NASA Astrophysics Data System (ADS)

    Kolev, Ivan S.; Stoeva, Ivelina S.

    2004-06-01

    This report presents the development of single-beam barrier laser security system. The system utilizes the near infrared (IR) range λ=(850-900)nm. The security system consists of several blocks: Transmitter; Receiver; Logical Unit; Indication; Power Supply. There are four individually software programmable security zones Z1 - Z4. The control logic is implemented on a PIC16F84 MCU. The infrared beam is a pulse pack, coded and modulated in the transmitter with frequency of 36 kHz. The receiver demodulates and decodes the beam. The software for the MCU is developed along with the electrical circuits of the security system.

  18. secureBLAST.

    PubMed

    Wiezer, Arnim; Merkl, Rainer

    2003-01-01

    secureBLAST supplements NCBI wwwblast with features necessary to control in an easy manageable way usage of BLAST data sets and their update. The concept we implemented allows to offer on a single BLAST server several data sets with individually configurable access rights. Security is provided by user authentication and encryption of the http traffic via SSL. By using secureBLAST, the administration of users and databases can be done via a web interface. Therefore, secureBLAST is valuable for institutions that have to restrict access to their datasets or just want to administer BLAST servers via a web interface.

  19. Sensing land pollution.

    NASA Technical Reports Server (NTRS)

    Bowden, L. W.

    1971-01-01

    Land pollution is described in numerous ways by various societies. Pollutants of land are material by-products of human activity and range from environmentally ineffective to positively toxic. The pollution of land by man is centuries old and correlates directly with economy, technology and population. In order to remotely sense land pollution, standards or thresholds must be established. Examples of the potential for sensing land pollution and quality are presented. The technological capabilities for remotely sensed land quality is far advanced over the judgment on how to use the sensed data. Until authoritative and directive decisions on land pollution policy are made, sensing of pollutants will be a random, local and academic affair.

  20. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  1. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  2. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  3. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  4. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  5. 33 CFR 165.106 - Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Specific Regulated Navigation Areas and Limited Access Areas First Coast...) Location. The following area is a security zone: All land and waters within 250 yards of the...

  6. 7 CFR 772.6 - Subordination of security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Subordination of security. 772.6 Section 772.6 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF... be used in such a way that will contribute to erosion of highly erodible land or conversion...

  7. Understanding the Role of Deterrence in Counterterrorism Security

    DTIC Science & Technology

    2009-11-01

    domestic threat assessments, domestic intelligence, and workforce and training. Information about the Home- land Security Program is available online (http...she walked up to a bus stop packed with shoppers hurrying home before the Sabbath and detonated her explosives, killing six and wounding seventy

  8. Center for Development of Security Excellence (CDSE) 2013 Year End Report

    DTIC Science & Technology

    2013-01-01

    National Industrial Security Program (NISP) Understanding FOCI Personnel Clearances in the NISP NISP Reporting Requirements NISP Self Inspections Visits...E D U CA TI O N - YEAR END REPORT Defense Security Service | Center for Development of Security Excellence | 938 Elkridge Landing Rd...YEAR END REPORT Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to

  9. National Information Systems Security (INFOSEC) Glossary

    DTIC Science & Technology

    2000-09-01

    Systems Security Engineering ISSM Information Systems Security Manager ISSO Information Systems Security Officer IT Information Technology ITAR ...Digital Net Radio Interface Unit SDNS Secure Data Network System SDR System Design Review SFA Security Fault Analysis SHA Secure Hash Algorithm

  10. Privacy and Security: A Bibliography.

    ERIC Educational Resources Information Center

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  11. Addressing Information Security Risk

    ERIC Educational Resources Information Center

    Qayoumi, Mohammad H.; Woody, Carol

    2005-01-01

    Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…

  12. Incidents of Security Concern

    SciTech Connect

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  13. Security in the cloud.

    PubMed

    Degaspari, John

    2011-08-01

    As more provider organizations look to the cloud computing model, they face a host of security-related questions. What are the appropriate applications for the cloud, what is the best cloud model, and what do they need to know to choose the best vendor? Hospital CIOs and security experts weigh in.

  14. Hydrological extremes and security

    NASA Astrophysics Data System (ADS)

    Kundzewicz, Z. W.; Matczak, P.

    2015-04-01

    Economic losses caused by hydrological extremes - floods and droughts - have been on the rise. Hydrological extremes jeopardize human security and impact on societal livelihood and welfare. Security can be generally understood as freedom from threat and the ability of societies to maintain their independent identity and their functional integrity against forces of change. Several dimensions of security are reviewed in the context of hydrological extremes. The traditional interpretation of security, focused on the state military capabilities, has been replaced by a wider understanding, including economic, societal and environmental aspects that get increasing attention. Floods and droughts pose a burden and serious challenges to the state that is responsible for sustaining economic development, and societal and environmental security. The latter can be regarded as the maintenance of ecosystem services, on which a society depends. An important part of it is water security, which can be defined as the availability of an adequate quantity and quality of water for health, livelihoods, ecosystems and production, coupled with an acceptable level of water-related risks to people, environments and economies. Security concerns arise because, over large areas, hydrological extremes - floods and droughts - are becoming more frequent and more severe. In terms of dealing with water-related risks, climate change can increase uncertainties, which makes the state's task to deliver security more difficult and more expensive. However, changes in population size and development, and level of protection, drive exposure to hydrological hazards.

  15. Secure video communications system

    DOEpatents

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  16. Technology's Role in Security.

    ERIC Educational Resources Information Center

    Day, C. William

    1999-01-01

    Examines the use of technology to bolster the school security system, tips on selecting a security consultant, and several basic strategies to make buildings and grounds safer. Technological ideas discussed include the use of telephones in classrooms to expedite care in emergency situations, surveillance cameras to reduce crime, and metal…

  17. NSI security task: Overview

    NASA Technical Reports Server (NTRS)

    Tencati, Ron

    1991-01-01

    An overview is presented of the NASA Science Internet (NSI) security task. The task includes the following: policies and security documentation; risk analysis and management; computer emergency response team; incident handling; toolkit development; user consulting; and working groups, conferences, and committees.

  18. EU Research for Security

    DTIC Science & Technology

    2004-10-25

    biometrics, smart card , IPv6, Economic, business and social aspects of security in Information Society Research and Technology FP6, FP7 (Security...wireless and reconfigurability – Next generation networks and computing models – Smart Cards and Access technologies – Biometrics – Pre-normative/standards

  19. Network Security Is Manageable

    ERIC Educational Resources Information Center

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  20. School Security Technologies

    ERIC Educational Resources Information Center

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  1. School Safety and Security.

    ERIC Educational Resources Information Center

    California State Dept. of Education, Sacramento.

    This document offers additional guidelines for school facilities in California in the areas of safety and security, lighting, and cleanliness. It also offers a description of technology resources available on the World Wide Web. On the topic of safety and security, the document offers guidelines in the areas of entrances, doors, and controlled…

  2. International Nuclear Security

    SciTech Connect

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  3. Network systems security analysis

    NASA Astrophysics Data System (ADS)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  4. Indirection and computer security.

    SciTech Connect

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  5. Wireless physical layer security

    NASA Astrophysics Data System (ADS)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  6. Wireless physical layer security

    PubMed Central

    Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments. PMID:28028211

  7. Wireless physical layer security.

    PubMed

    Poor, H Vincent; Schaefer, Rafael F

    2017-01-03

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  8. Conceiving Land Grant University Community Engagement as Adaptive Leadership

    ERIC Educational Resources Information Center

    Stephenson, Max, Jr.

    2011-01-01

    This article asks land grant university leaders and faculty to think of their role in community engagement not simply as the provision of technical assistance or of research and development prowess, but as an opportunity for social leadership. It explores the case of Virginia Tech's effort to develop a regionally based model to secure long-term…

  9. 76 FR 31353 - Agency Information Collection Activities: Crewman's Landing Permit

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-31

    ... hours or to this collection of information. Type of Review: Extension (without change). Affected Public... SECURITY U.S. Customs And Border Protection Agency Information Collection Activities: Crewman's Landing... and request for comments; extension of an existing collection of information: 1651-0114. SUMMARY:...

  10. 44 CFR 9.15 - Planning programs affecting land use.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY GENERAL FLOODPLAIN MANAGEMENT AND PROTECTION OF WETLANDS § 9.15 Planning programs affecting land use. The Agency shall take floodplain management into account when formulating or... flood hazards and floodplain management and wetlands protection; and (b) Prescribes planning...

  11. 44 CFR 9.15 - Planning programs affecting land use.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY GENERAL FLOODPLAIN MANAGEMENT AND PROTECTION OF WETLANDS § 9.15 Planning programs affecting land use. The Agency shall take floodplain management into account when formulating or... flood hazards and floodplain management and wetlands protection; and (b) Prescribes planning...

  12. 44 CFR 9.15 - Planning programs affecting land use.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY GENERAL FLOODPLAIN MANAGEMENT AND PROTECTION OF WETLANDS § 9.15 Planning programs affecting land use. The Agency shall take floodplain management into account when formulating or... flood hazards and floodplain management and wetlands protection; and (b) Prescribes planning...

  13. 44 CFR 9.15 - Planning programs affecting land use.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY GENERAL FLOODPLAIN MANAGEMENT AND PROTECTION OF WETLANDS § 9.15 Planning programs affecting land use. The Agency shall take floodplain management into account when formulating or... flood hazards and floodplain management and wetlands protection; and (b) Prescribes planning...

  14. 44 CFR 9.15 - Planning programs affecting land use.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY GENERAL FLOODPLAIN MANAGEMENT AND PROTECTION OF WETLANDS § 9.15 Planning programs affecting land use. The Agency shall take floodplain management into account when formulating or... flood hazards and floodplain management and wetlands protection; and (b) Prescribes planning...

  15. 30 CFR 740.15 - Bonds on Federal lands.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Management. (b) Performance bonds. Where the State is the regulatory authority under a cooperative agreement, the performance bonds required for operations on Federal lands shall be made payable to the United... that covers reclamation requirements if: (i) The lessee has secured a suitable performance...

  16. 76 FR 2917 - Agency Information Collection Activities: Canadian Border Boat Landing Permit (CBP Form I-68)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-18

    ... Landing Permit (CBP Form I-68) AGENCY: U.S. Customs and Border Protection, Department of Homeland Security... (CBP Form I-68). This is a proposed extension of an information collection that was previously approved... Landing Permit. OMB Number: 1651-0108. Form Number: CBP Form I-68. Abstract: The Canadian Border...

  17. 77 FR 3257 - Transfer of Land Tracts Located at Los Alamos National Laboratory, New Mexico

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-23

    ... Doc No: 2012-1208] DEPARTMENT OF ENERGY Transfer of Land Tracts Located at Los Alamos National Laboratory, New Mexico AGENCY: National Nuclear Security Administration, U.S. Department of Energy. ACTION... for the Conveyance and Transfer of Certain Land Tracts Administered by the Department of Energy...

  18. Pilot land data system

    NASA Technical Reports Server (NTRS)

    Cressy, P. J.; Estes, J. E.

    1984-01-01

    During the fall of 1983, the Information Systems Office of NASA's Office of Space Science and Applications assembled a Working Group to develop initial plans for a Pilot Land Data System (PLDS). Workshops coordinated planning and concept development activities between land-related and computer science disciplines, and examined land research requirements, information science technology requirements, PLDS architecture, and methodologies for system evaluation. The PLDS will be a limited-scale distributed information system to explore scientific, technical and management approaches to satisfy land science research needs. PLDS will pave the way for a Land Data System to improve data access, processing, transfer and analysis, fostering an environment in which land science information synthesis can occur on a scale not previously possible owing to limits to data assembly and access and efficiency of processing.

  19. Risk assessment for sustainable food security in China according to integrated food security--taking Dongting Lake area for example.

    PubMed

    Qi, Xiaoxing; Liu, Liming; Liu, Yabin; Yao, Lan

    2013-06-01

    Integrated food security covers three aspects: food quantity security, food quality security, and sustainable food security. Because sustainable food security requires that food security must be compatible with sustainable development, the risk assessment of sustainable food security is becoming one of the most important issues. This paper mainly focuses on the characteristics of sustainable food security problems in the major grain-producing areas in China. We establish an index system based on land resources and eco-environmental conditions and apply a dynamic assessment method based on status assessments and trend analysis models to overcome the shortcomings of the static evaluation method. Using fuzzy mathematics, the risks are categorized into four grades: negligible risk, low risk, medium risk, and high risk. A case study was conducted in one of China's major grain-producing areas: Dongting Lake area. The results predict that the status of the sustainable food security in the Dongting Lake area is unsatisfactory for the foreseeable future. The number of districts at the medium-risk range will increase from six to ten by 2015 due to increasing population pressure, a decrease in the cultivated area, and a decrease in the effective irrigation area. Therefore, appropriate policies and measures should be put forward to improve it. The results could also provide direct support for an early warning system-which could be used to monitor food security trends or nutritional status so to inform policy makers of impending food shortages-to prevent sustainable food security risk based on some classical systematic methods. This is the first research of sustainable food security in terms of risk assessment, from the perspective of resources and the environment, at the regional scale.

  20. Land Treatment Digital Library

    USGS Publications Warehouse

    Pilliod, David S.

    2009-01-01

    Across the country, public land managers make hundreds of decisions each year that influence landscapes and ecosystems within the lands they manage. Many of these decisions involve vegetation manipulations known as land treatments. Land treatments include activities such as removal or alteration of plant biomass, seeding burned areas, and herbicide applications. Data on these land treatments are usually stored at local offices, and gathering information across large spatial areas can be difficult. There is a need to centralize and store treatment data for Federal agencies involved in land treatments because these data are useful to land managers for policy and management and to scientists for developing sampling designs and studies. The Land Treatment Digital Library (LTDL) was created by the U.S. Geological Survey (USGS) to catalog information about land treatments on Federal lands in the western United States for all interested parties. The flexible framework of the library allows for the storage of a wide variety of data in different formats. The LTDL currently stores previously established land treatments or what often are called legacy data. The project was developed and has been refined based on feedback from partner agencies and stakeholders, with opportunity for the library holdings to expand as new information becomes available. The library contains data in text, tabular, spatial, and image formats. Specific examples include project plans and implementation reports, monitoring data, spatial data files from geographic information systems, digitized paper maps, and digital images of land treatments. The data are entered by USGS employees and are accessible through a searchable web site. The LTDL can be used to respond to information requests, conduct analyses and other forms of information syntheses, produce maps, and generate reports for DOI managers and scientists and other authorized users.

  1. Land use planning

    NASA Technical Reports Server (NTRS)

    1975-01-01

    The organization, objectives, and accomplishments of the panel on Land Use Planning are reported. Technology developments, and projected developments are discussed along with anticipated information requirements. The issues for users, recommended remote sensing programs, and space systems are presented. It was found that remote sensing systems are useful in future land use planning. It is recommended that a change detection system for monitoring land use and critical environmental areas be developed by 1979.

  2. Land-use and alternative bioenergy pathways for waste biomass.

    PubMed

    Campbell, J E; Block, E

    2010-11-15

    Rapid escalation in biofuels consumption may lead to a trade regime that favors exports of food-based biofuels from tropical developing countries to developed countries. There is growing interest in mitigating the land-use impacts of these potential biofuels exports by converting biorefinery waste streams into cellulosic ethanol, potentially reducing the amount of land needed to meet production goals. This increased land-use efficiency for ethanol production may lower the land-use greenhouse gas emissions of ethanol but would come at the expense of converting the wastes into bioelectricity which may offset fossil fuel-based electricity and could provide a vital source of domestic electricity in developing countries. Here we compare these alternative uses of wastes with respect to environmental and energy security outcomes considering a range of electricity production efficiencies, ethanol yields, land-use scenarios, and energy offset assumptions. For a given amount of waste biomass, we found that using bioelectricity production to offset natural gas achieves 58% greater greenhouse gas reductions than using cellulosic ethanol to offset gasoline but similar emissions when cellulosic ethanol is used to offset the need for more sugar cane ethanol. If bioelectricity offsets low-carbon energy sources such as nuclear power then the liquid fuels pathway is preferred. Exports of cellulosic ethanol may have a small impact on the energy security of importing nations while bioelectricity production may have relatively large impacts on the energy security in developing countries.

  3. Landing Hazard Avoidance Display

    NASA Technical Reports Server (NTRS)

    Abernathy, Michael Franklin (Inventor); Hirsh, Robert L. (Inventor)

    2016-01-01

    Landing hazard avoidance displays can provide rapidly understood visual indications of where it is safe to land a vehicle and where it is unsafe to land a vehicle. Color coded maps can indicate zones in two dimensions relative to the vehicles position where it is safe to land. The map can be simply green (safe) and red (unsafe) areas with an indication of scale or can be a color coding of another map such as a surface map. The color coding can be determined in real time based on topological measurements and safety criteria to thereby adapt to dynamic, unknown, or partially known environments.

  4. Competition for land

    PubMed Central

    Smith, Pete; Gregory, Peter J.; van Vuuren, Detlef; Obersteiner, Michael; Havlík, Petr; Rounsevell, Mark; Woods, Jeremy; Stehfest, Elke; Bellarby, Jessica

    2010-01-01

    A key challenge for humanity is how a future global population of 9 billion can all be fed healthily and sustainably. Here, we review how competition for land is influenced by other drivers and pressures, examine land-use change over the past 20 years and consider future changes over the next 40 years. Competition for land, in itself, is not a driver affecting food and farming in the future, but is an emergent property of other drivers and pressures. Modelling studies suggest that future policy decisions in the agriculture, forestry, energy and conservation sectors could have profound effects, with different demands for land to supply multiple ecosystem services usually intensifying competition for land in the future. In addition to policies addressing agriculture and food production, further policies addressing the primary drivers of competition for land (population growth, dietary preference, protected areas, forest policy) could have significant impacts in reducing competition for land. Technologies for increasing per-area productivity of agricultural land will also be necessary. Key uncertainties in our projections of competition for land in the future relate predominantly to uncertainties in the drivers and pressures within the scenarios, in the models and data used in the projections and in the policy interventions assumed to affect the drivers and pressures in the future. PMID:20713395

  5. Water security-National and global issues

    USGS Publications Warehouse

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  6. Secure steganography designed for mobile platforms

    NASA Astrophysics Data System (ADS)

    Agaian, Sos S.; Cherukuri, Ravindranath; Sifuentes, Ronnie R.

    2006-05-01

    Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data hiding concepts with established cryptographic protocols in wireless communication would greatly increase the security and privacy of transmitting sensitive information. We present an algorithm which will address the following problems: 1) low embedding capacity in mobile devices due to fixed image dimensions and memory constraints, 2) compatibility between mobile and land based desktop computers, and 3) detection of stego images by widely available steganalysis software [1-3]. Consistent with the smaller available memory, processor capabilities, and limited resolution associated with mobile devices, we propose a more magnified approach to steganography by focusing adaptive efforts at the pixel level. This deeper method, in comparison to the block processing techniques commonly found in existing adaptive methods, allows an increase in capacity while still offering a desired level of security. Based on computer simulations using high resolution, natural imagery and mobile device captured images, comparisons show that the proposed method securely allows an increased amount of embedding capacity but still avoids detection by varying steganalysis techniques.

  7. West Africa land use and land cover time series

    USGS Publications Warehouse

    Cotillon, Suzanne E.

    2017-02-16

    Started in 1999, the West Africa Land Use Dynamics project represents an effort to map land use and land cover, characterize the trends in time and space, and understand their effects on the environment across West Africa. The outcome of the West Africa Land Use Dynamics project is the production of a three-time period (1975, 2000, and 2013) land use and land cover dataset for the Sub-Saharan region of West Africa, including the Cabo Verde archipelago. The West Africa Land Use Land Cover Time Series dataset offers a unique basis for characterizing and analyzing land changes across the region, systematically and at an unprecedented level of detail.

  8. Environmental Land Management in Tajikistan

    NASA Astrophysics Data System (ADS)

    Makhmudov, Zafar; Ergashev, Murod

    2015-04-01

    Tackling Environmental Land Management in Tajikistan "Project approach" Khayrullo Ibodzoda, Zafar Mahmoudov, Murod Ergashev, Kamoliddin Abdulloev Among 28 countries in Europe and Central Asia, Tajikistan is estimated to be the most vulnerable to the climate change impacts depending on its high exposure and sensitivity combined with a very low adaptive capacity. The agricultural sector of Tajikistan is subject to lower and more erratic rainfalls, as well as dryness of water resources due to the possible temperature rising in the region, high evaporation, reducing the accumulation of snow in the mountain glaciers and increased frequency of extreme events. Climate change and variability are likely to pose certain risks, especially for those who prefer natural agriculture or pasture management that just reinforces the need for sound, adapted to new climatic conditions and improved principles of land management. Adoption of new strategies and best practices on sustainable land and water management for agricultural ecosystems will help the farmers and communities in addressing the abovementioned problems, adapt and become more resilient to changing climate by increasing wellbeing of local population, and contributing to food security and restoring productive natural resources. The Environmental Land Management and Rural Livelihoods Project is being financed by the Pilot Program for Climate Resilience (PPCR) and Global Environment Facility (GEF). The Project goal is to enable the rural population to increase their productive assets by improving management of natural resources and building resilience to climate change in selected climate vulnerable sites. The project will facilitate introduction of innovative measures on land use and agricultural production by providing small grants at the village level and grants for the Pasture User Groups (PUGs) at jamoat level in order to implement joint plans of pasture management and wellbred livestock, also for the Water User

  9. Hierarchical Marginal Land Assessment for Land Use Planning

    SciTech Connect

    Kang, Shujiang; Post, Wilfred M; Wang, Dali; Nichols, Dr Jeff A; Bandaru, Vara Prasad

    2013-01-01

    Marginal land provides an alternative potential for food and bioenergy production in the face of limited land resources; however, effective assessment of marginal lands is not well addressed. Concerns over environmental risks, ecosystem services and sustainability for marginal land have been widely raised. The objective of this study was to develop a hierarchical marginal land assessment framework for land use planning and management. We first identified major land functions linking production, environment, ecosystem services and economics, and then classified land resources into four categories of marginal land using suitability and limitations associated with major management goals, including physically marginal land, biologically marginal land, environmental-ecological marginal land, and economically marginal land. We tested this assessment framework in south-western Michigan, USA. Our results indicated that this marginal land assessment framework can be potentially feasible on land use planning for food and bioenergy production, and balancing multiple goals of land use management. We also compared our results with marginal land assessment from the Conservation Reserve Program (CRP) and land capability classes (LCC) that are used in the US. The hierarchical assessment framework has advantages of quantitatively reflecting land functions and multiple concerns. This provides a foundation upon which focused studies can be identified in order to improve the assessment framework by quantifying high-resolution land functions associated with environment and ecosystem services as well as their criteria are needed to improve the assessment framework.

  10. 78 FR 32214 - Land Acquisitions: Appeals of Land Acquisition Decisions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-29

    ...; Docket ID: BIA-2013-0005] RIN 1076-AF15 Land Acquisitions: Appeals of Land Acquisition Decisions AGENCY... of regulations governing decisions by the Secretary to approve or deny applications to acquire land...'s decision to take the land into trust. The Supreme Court has since held that the Quiet Title...

  11. Secure Reliable Processing Systems

    DTIC Science & Technology

    1981-07-01

    UCLA-ENG-7854), August 1978. Popek, G.J. and D.A. Farber. "A Model for Verification of Data Security in Operating Systems," Communications of the ACM...via covert channels is a data security problem. On the other hand, the unauthorized use of the system to communicate is a confinement problem. The...point here is that if there exists a communication channel, it may be accidentally used by a user and information leaked. For a system to be data secure

  12. Airplane landing gear

    NASA Technical Reports Server (NTRS)

    Maiorca, Salvatore

    1931-01-01

    This report presents an investigation of the design and construction of various types of landing gears. Some of the items discussed include: chassises, wheels, shock absorbers (rubber disk and rubber cord), as well as oleopneumatic shock absorbers. Various types of landing gears are also discussed such as the Messier, Bendix, Vickers, and Bleriot.

  13. [Complexity of land ecosystem].

    PubMed

    Wu, Cifang; Chen, Meiqiu

    2002-06-01

    In recent years, complexity studies has become a new research region and been widely applied in engineering, biology, economy, management, military, police and sociology. In this paper, from the view of complex science, the main complexity characteristics of land ecosystem were described, furthermore, the application of fractal, chaos, and artificial neural network on the complexity of land ecosystem were also discussed.

  14. Petroleum lands and leasing

    SciTech Connect

    Burk, J.

    1984-01-01

    This is a reference book for the lessor, lessee, royalty owner, PLM student and landman. Contents: A historical background; Rights of ownership; Instruments of conveyance; Who owns this land. The oil and gas lease and leasing procedures; Curing titles; Pooling and utilization; Contracts and agreements; Lease maintenance; Land measurements and descriptions; Code of ethics; American Association of Petroleum Landmen; Glossary.

  15. Airport Land Banking.

    DTIC Science & Technology

    1977-08-01

    the Secretary of Transportation to conduct a study with respect to the feasibility, practicability, and cost of land bank planning and development...1977. Airport land banking was studied and analyzed from several different perspectives, including legal, economic, and financial, and the results of this study are reported in this document. (Author)

  16. Land Combat Systems

    DTIC Science & Technology

    2001-01-01

    LAND COMBAT SYSTEMS It is not the strongest species that survive, nor the most intelligent, but the ones most responsive to change. — Charles ... Darwin ABSTRACT: The Land Combat Systems (LCS) industry has significantly changed over the last decade. The days when production lines and factories

  17. Seasat land experiments

    NASA Technical Reports Server (NTRS)

    Estes, J. E.; Barath, F.; Bryant, N.; Cannon, P. J.; Elachi, C.; Goetz, A.; Krishen, K.; Macdonald, H. C.; Marmelstein, A.; Miller, L. J.

    1978-01-01

    An overview of the Seasat land experiments is presented. The potential roles for active microwave imaging systems on board satellites were reviewed with particular emphasis on the Seasat Synthetic Aperture Radar (SAR). Recommendations were made concerning the type of experiments that could most profitably be conducted over land with the Seasat SAR system capabilities available.

  18. All That Unplowed Land

    ERIC Educational Resources Information Center

    MOSAIC, 1975

    1975-01-01

    Potentially arable lands either do not yield well or are too expensive to farm. Aimed with a better knowledge of the ecologies involved plus fertilizer and water, some of the marginal lands can be forced to produce food, but not soon enough to alleviate food shortages in this decade. (BT)

  19. Tales From Silver Lands.

    ERIC Educational Resources Information Center

    Finger, Charles J.

    In 1925, "Tales From Silver Lands" was awarded the Newbery medal as the most distinguished contribution to American children's literature for the year. The book contains a collection of 19 short stories learned from the Indians of South America as the author traveled to different lands. As described on the dust jacket, the tales are…

  20. Land Remote Sensing Overview

    NASA Technical Reports Server (NTRS)

    Byrnes, Ray

    2007-01-01

    A general overview of the USGS land remote sensing program is presented. The contents include: 1) Brief overview of USGS land remote sensing program; 2) Highlights of JACIE work at USGS; 3) Update on NASA/USGS Landsat Data Continuity Mission; and 4) Notes on alternative data sources.

  1. Yankee Lands: A Land Use Curriculum Project.

    ERIC Educational Resources Information Center

    Antioch/New England Graduate School, Keene, NH.

    In response to issues surrounding the acquisition and planning of Pisgah State Park, New Hampshire, the Antioch/New England Graduate School has produced this set of activities related to land use decisions. Contained are learning experiences designed to help students appreciate New England's natural and cultural history in order to encourage a…

  2. Land use and land cover digital data

    USGS Publications Warehouse

    Fegeas, Robin G.; Claire, Robert W.; Guptill, Stephen C.; Anderson, K. Eric; Hallam, Cheryl A.

    1983-01-01

    The discipline of cartography is undergoing a number of profound changesthat center on the emerging influence ofdigital manipulation and analysis ofdata for the preparation of cartographic materials and for use in geographic information systems. Operational requirements have led to the development by the USGS National Mapping Division of several documents that establish in-house digital cartographic standards. In an effort to fulfill lead agency requirements for promulgation of Federal standards in the earth sciences, the documents have been edited and assembled with explanatory text into a USGS Circular. This Circular describes some of the pertinent issues relative to digital cartographic data standards, documents the digital cartographic data standards currently in use within the USGS, and details the efforts of the USGS related to the definition of national digital cartographic data standards. It consists of several chapters; the first is a general overview, and each succeeding chapter is made up from documents that establish in-house standards for one of the various types of digital cartographic data currently produced. This chapter 895-E, describes the Geographic Information Retrieval and Analysis System that is used in conjunction with the USGS land use and land cover classification system to encode, edit, manipuate, and analyze land use and land cover digital data.

  3. Global land cover mapping using Earth observation satellite data: Recent progresses and challenges

    NASA Astrophysics Data System (ADS)

    Ban, Yifang; Gong, Peng; Giri, Chandra

    2015-05-01

    Land cover is an important variable for many studies involving the Earth surface, such as climate, food security, hydrology, soil erosion, atmospheric quality, conservation biology, and plant functioning. Land cover not only changes with human caused land use changes, but also changes with nature. Therefore, the state of land cover is highly dynamic. In winter snow shields underneath various other land cover types in higher latitudes. Floods may persist for a long period in a year over low land areas in the tropical and subtropical regions. Forest maybe burnt or clear cut in a few days and changes to bare land. Within several months, the coverage of crops may vary from bare land to nearly 100% crops and then back to bare land following harvest. The highly dynamic nature of land cover creates a challenge in mapping and monitoring which remains to be adequately addressed. As economic globalization continues to intensify, there is an increasing trend of land cover/land use change, environmental pollution, land degradation, biodiversity loss at the global scale, timely and reliable information on global land cover and its changes is urgently needed to mitigate the negative impact of global environment change.

  4. Social Security Administration

    MedlinePlus

    ... Closings & Emergencies Podcasts Webinars Ticket to Work helps Disability beneficiaries return to work Need information about benefits for same-sex couples? Open Government at Social Security myRA - Retirement Savings Made Easy Plain Writing ...

  5. Security vs. Safety.

    ERIC Educational Resources Information Center

    Sturgeon, Julie

    1999-01-01

    Provides administrative advice on how some safety experts have made college campuses safer and friendlier without breaking the budget. Tips on security and advice on safety management that encompasses the whole environment are highlighted. (GR)

  6. Teaching Secure Programming

    SciTech Connect

    Bishop, Matt; Frincke, Deb A.

    2005-09-01

    This article discusses issues in teaching secure coding in the context of both academic institutions and training organizations. The emphasis is on the importance of assurance. There is also some discussion of the role of checklists.

  7. Intelligent Sensors Security

    PubMed Central

    Bialas, Andrzej

    2010-01-01

    The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC) related security design patterns and to improve the effectiveness of the sensor development process. PMID:22315571

  8. Secure Chemical Facilities Act

    THOMAS, 111th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2010-07-15

    07/15/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Secure Chemical Facilities Act

    THOMAS, 112th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2011-03-31

    03/31/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Secure Chemical Facilities Act

    THOMAS, 113th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2013-01-23

    01/23/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Air Cargo Security Act

    THOMAS, 111th Congress

    Rep. Markey, Edward J. [D-MA-7

    2010-11-16

    11/23/2010 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Cognitive Computing for Security.

    SciTech Connect

    Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley; Marinella, Matthew; Evans, Brian Robert; Warrender, Christina E.; Mickel, Patrick

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  13. The Key to Security.

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2001-01-01

    Provides tips on using low-tech, traditional key and lock systems for effectively securing university and college facilities. Discusses providing keys with utility patents as well as the need to design doors that offer greater deterrence to vandalism. (GR)

  14. Measuring Job Security.

    ERIC Educational Resources Information Center

    Nardone, Thomas; And Others

    1997-01-01

    Discusses issues in measuring job security and presents a comparison of data from the National Longitudinal Survey of Youth and the Current Population Survey on job tenure and contingent employment. (SK)

  15. Portable appliance security apparatus

    NASA Technical Reports Server (NTRS)

    Kerley, J. J. (Inventor)

    1981-01-01

    An apparatus for securing a small computer, or other portable appliance, against theft is described. It is comprised of a case having an open back through which the computer is installed or removed. Guide members in the form of slots are formed in a rear portion of opposite walls of the case for receiving a back plate to cover the opening and thereby secure the computer within the case. An opening formed in the top wall of the case exposes the keyboard and display of the computer. The back plate is locked in the closed position by a key-operated plug type lock. The lock is attached to one end of a hold down cable, the opposite end thereof being secured to a desk top or other stationary object. Thus, the lock simultaneously secures the back plate to the case and retains the case to the stationary object.

  16. Securing Cabin Baggage Act

    THOMAS, 111th Congress

    Rep. Lipinski, Daniel [D-IL-3

    2009-06-15

    06/17/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. Enhancing medical database security.

    PubMed

    Pangalos, G; Khair, M; Bozios, L

    1994-08-01

    A methodology for the enhancement of database security in a hospital environment is presented in this paper which is based on both the discretionary and the mandatory database security policies. In this way the advantages of both approaches are combined to enhance medical database security. An appropriate classification of the different types of users according to their different needs and roles and a User Role Definition Hierarchy has been used. The experience obtained from the experimental implementation of the proposed methodology in a major general hospital is briefly discussed. The implementation has shown that the combined discretionary and mandatory security enforcement effectively limits the unauthorized access to the medical database, without severely restricting the capabilities of the system.

  18. Secure Visas Act

    THOMAS, 111th Congress

    Rep. Smith, Lamar [R-TX-21

    2010-03-04

    04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Keep America Secure Act

    THOMAS, 112th Congress

    Rep. Slaughter, Louise McIntosh [D-NY-28

    2012-08-02

    09/05/2012 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Land Cover Trends Project

    USGS Publications Warehouse

    Acevedo, William

    2006-01-01

    The Land Cover Trends Project is designed to document the types, rates, causes, and consequences of land cover change from 1973 to 2000 within each of the 84 U.S. Environmental Protection Agency (EPA) Level III ecoregions that span the conterminous United States. The project's objectives are to: * Develop a comprehensive methodology using probability sampling and change analysis techniques and Landsat Multispectral Scanner (MSS), Thematic Mapper (TM), and Enhanced Thematic Mapper (ETM) data for estimating regional land cover change. * Characterize the spatial and temporal characteristics of conterminous U.S. land cover change for five periods from 1973 to 2000 (nominally 1973, 1980, 1986, 1992, and 2000). * Document the regional driving forces and consequences of change. * Prepare a national synthesis of land cover change.

  1. Energy Security in Yemen

    DTIC Science & Technology

    2009-09-01

    entreprises de construction et de service pour les faire participer à l‘exploitation des ressources pétrolières. Des membres de tribus assurent aussi...army units to Yemen to help suppress the Monarchists rebellion while Saudis financed and armed the Monarchists. However, Egypt‘s defeat in the...revenue curtail the government‘s ability to finance its security operations, likely worsening the security situation in Yemen

  2. Using Secure Coprocessors

    DTIC Science & Technology

    1994-05-01

    to/from the host. The entire disk image provided by c i t in the host is encrypted , and my code uses encryption / decryption DMA transfers to access it...uses an encrypted file system image supplied by the host to load system servers and applications (the decryption key is kept in secure RAM). This... encryption / decryption hardware may be used. Secure coprocessors must be packaged so that physical attempts to gain access to the internal state of the

  3. Security, Capacity, and Literacy

    DTIC Science & Technology

    2011-01-01

    An Afghan instructor works with two Afghan National Police of- ficers during literacy training in Kabul, 5 June 2010. (Courtesy of the author...challenges that we face in every training course we provide to the Afghan National Security Forces (ANSF). The reason I care about literacy ... literacy . When I took command of NATO Training Mission-Afghanistan (NTM-A) almost a year ago, the overall literacy rate of the Afghan National Security

  4. Secure Sensor Platform

    SciTech Connect

    Troy Ross, Barry Schoeneman

    2010-08-25

    The Secure Sensor Platform (SSP) software provides a framework of functionality to support the development of low-power autonomous sensors for nuclear safeguards. This framework provides four primary functional blocks of capabilities required to implement autonomous sensors. The capabilities are: communications, security, power management, and cryptography. Utilizing this framework establishes a common set of functional capabilities for seamless interoperability of any sensor based upon the SSP concept.

  5. Data port security lock

    DOEpatents

    Quinby, Joseph D.; Hall, Clarence S.

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  6. Variable contour securing system

    NASA Technical Reports Server (NTRS)

    Zebus, P. P.; Packer, P. N.; Haynie, C. C. (Inventor)

    1978-01-01

    A variable contour securing system has a retaining structure for a member whose surface contains a variable contour. The retaining mechanism includes a spaced array of adjustable spindles mounted on a housing. Each spindle has a base member support cup at one end. A vacuum source is applied to the cups for seating the member adjacent to the cups. A locking mechanism sets the spindles in a predetermined position once the member has been secured to the spindle support cups.

  7. Lemnos Interoperable Security Program

    SciTech Connect

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  8. Library Code Security Analysis

    DTIC Science & Technology

    2013-11-01

    to identify previously unknown vulnerabilities in Java libraries. This technology will give previously unavailable insight into the security posture...researchers from Aspect Security have created a new approach to analyzing third party Java libraries for vulnerabilities and potential hazards. This...report documents the challenges in this endeavor, the tasks performed to create such a tool, and the results from analyzing thirty of the most common

  9. Secure quantum key distribution

    NASA Astrophysics Data System (ADS)

    Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi

    2014-08-01

    Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.

  10. Applying Security Patches

    DTIC Science & Technology

    2007-11-02

    http://www.lynuxworks.com/ Caldera OpenLinux http://www.calderasystems.com/ ChainSaw Linux http://www.chainsawlinux.com/ Conectiva Linux http...www.slackware.com/getslack/ Slackware Support http://www.slackware.com/support/ Slackware Mailing Lists http://www.slackware.com/lists/ Caldera Caldera ...OpenLinux Security Information http://www.caldera.com/support/security/ Caldera OpenLinux Distribution http://www.caldera.com/download/ 38

  11. The fertility incentive of land tenure in Mexico.

    PubMed

    Soberon-ferrer, H; Whittington, L A

    1993-12-01

    Ejidos are communal holding groups of redistributed land expropriated (generally without compensation) from large private landowners during Mexico's post-1910 land reform. The model in this study of the "ejidal" system's influence on fertility differs from DeVany and Sanchez in providing more current data and including the following more detailed variables: the land area of ejidos and the number of ejidos, the need for children, male income, female income share, and social security coverage. The data pertains to states rather than municipalities. DeVany and Sanchez found that the ejidal system encouraged fertility, because having more children helped an ejido family retain land rights, increased its chances of gaining additional productive land, and gave it increased political power. Children also provided a means of intergenerational transfer of resources. The estimation results of this study revealed that the total proportion of land held as ejidos had a positive, significant effect on fertility. The ratio of ejidos to total number of farms was negative and significant. There was support for the hypothesis that the impact of ejidos land holdings and area was diminished when ejidos were dominant in the state. Fertility declined with the increase in unpaid workers per hectare of land. Elasticity functions were small: 0.075 on ejidal land, -0.222 on ejidal farms, and -0.045 on workers. A positive significant demographic effect on fertility was illiteracy. Infant mortality and female income share each had a negative, significant effect on fertility. Insignificant variables were male income, social security coverage, and the dummy for northern states. There have been changes in the Mexican ejidal system. These changes and the availability of farm labor are expected to reduce urban and rural fertility differentials.

  12. 78 FR 37164 - Land Acquisitions: Appeals of Land Acquisition Decisions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-20

    ...; Docket ID: BIA-2013-0005] RIN 1076-AF15 Land Acquisitions: Appeals of Land Acquisition Decisions AGENCY... applications to acquire land in trust under 25 CFR part 151. This document makes corrections to the...

  13. [Food security in Mexico].

    PubMed

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  14. Security systems engineering overview

    SciTech Connect

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  15. Security extensions to DICOM

    NASA Astrophysics Data System (ADS)

    Thiel, Andreas; Bernarding, Johannes; Schaaf, Thorsten; Bellaire, Gunter; Tolxdorff, Thomas

    1999-07-01

    To ensure the acceptance of telemedical applications several obstacles must be overcome: the transfer of huge amounts of data over heterogeneous hard- and software platforms must be optimized; extended data post-processing is often required; and data security must be taken into consideration; post- processing based on secured data exchange must retain the relationship between original and post-processed images. To analyze and solve these problems, applications of distributed medical services were integrated. Data transfer and management was based on the Digital Imaging and Communications (DICOM) standard. To account for platform- independence of remote users, a novel DICOM server and viewer as implemented in JAVA. Different DICOM-conform data security concepts were analyzed. Encryption of the complete data stream using secure socket layers as well as a partial encryption concepts were tested. The best result was attained by a DICOM-conform encryption of patient-relevant data. The implementation medical services, which used newly develop techniques of magnetic resonance imaging, allowed a much earlier diagnosis of the human brain infarct. The integrated data security enabled remote segmentation within the unsecured internet, followed by storing the data back into the secured network.

  16. Security systems engineering overview

    NASA Astrophysics Data System (ADS)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  17. The Sand Land Soil System and Society

    NASA Astrophysics Data System (ADS)

    Mahjoory, R. A.

    Worldwide arid soils such as Latterites from African Savannas to the Xeralfs and Xererts of the Mediterranean Basin Ortents and Orthids of Asian Deserts are uniquely different in their strategic roles for utilizing the land in places where a delicate balance between annual climatic cycles and general trends toward desertification predominate Arid lands cover 1 3 of global land surface and contain irreplaceable natural resources with potential productivity of meeting the demands of more than two billion people and serving as sources and sinks of atmospheric CO2 to combat global warming The soil system in these arid areas are being degraded underutilized and kept in a stage of obliviousness due to inadequate public literacy and most importantly in-sufficient scientific evaluations based on pedology and soil taxonomy standards Implementation of food security projects and sustainable development programs on randomly selected sites and assessment of land degradation worldwide by powerful computers and satellite imagery techniques without field work and identification of Representative Soil Units are data producing and grant attracting but counter productive We live in a world in which there is an order out there and things are precisely measured and categorized for efficient utilization Why not the soils mainly in arid areas How we could generalize the world of soils under our feet by concept of soils are the same Expansion of educational programs quantification of multiple ecosystems within the arid regions through detailed and correlated

  18. Waste Isolation Pilot Plant land management plan

    SciTech Connect

    1996-05-01

    On October 30, 1992, the WIPP Land Withdrawal Act became law. This Act transferred the responsibility for the management of the WIPP Land Withdrawal Area (WILWA) from the Secretary of the Interior to the Secretary of Energy. In accordance with sections 3(a)(1) and (3) of the Act, these lands {open_quotes}{hor_ellipsis}are withdrawn from all forms of entry, appropriation, and disposal under the public land laws{hor_ellipsis}{close_quotes}and are reserved for the use of the Secretary of Energy {open_quotes}{hor_ellipsis}for the construction, experimentation, operation, repair and maintenance, disposal, shutdown, monitoring, decommissioning, and other activities, associated with the purposes of WIPP as set forth in the Department of Energy National Security and Military Applications of Nuclear Energy Act of 1980 and this Act.{close_quotes}. As a complement to this LMP, a MOU has been executed between the DOE and the BLM, as required by section 4(d) of the Act. The state of New Mexico was consulted in the development of the MOU and the associated Statement of Work (SOW).

  19. Land Use and land cover and associated maps

    USGS Publications Warehouse

    ,

    1982-01-01

    The Geological Survey is compiling land use and land cover and associated maps for the entire United States. Land use refers to man's activities which are directly related to the land. Land cover describes the vegetation, water, natural surface, and artificial constructions at the land surface. These maps will help satisfy a longstanding need for a consistent level of detail, standardization of categories, and appropriate use of scales of compilation for a type of data frequently used by land use planners, land managers, resource management planners, and others.

  20. Roadmap on optical security

    NASA Astrophysics Data System (ADS)

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections

  1. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  2. EPICS: Channel Access security design

    SciTech Connect

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer`s interface is given. Security protocol is described and finally aids for reading the access security code are provided.

  3. Building a Secure Library System.

    ERIC Educational Resources Information Center

    Benson, Allen C.

    1998-01-01

    Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…

  4. Wireless Network Security Using Randomness

    DTIC Science & Technology

    2012-06-19

    REPORT WIRELESS NETWORK SECURITY USING RANDOMNESS 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: The present invention provides systems and methods for... securing communications in a wireless network by utilizing the inherent randomness of propagation errors to enable legitimate users to dynamically...Box 12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Patent, security , wireless networks, randomness Sheng Xiao, Weibo Gong

  5. Algorithm for Autonomous Landing

    NASA Technical Reports Server (NTRS)

    Kuwata, Yoshiaki

    2011-01-01

    Because of their small size, high maneuverability, and easy deployment, micro aerial vehicles (MAVs) are used for a wide variety of both civilian and military missions. One of their current drawbacks is the vast array of sensors (such as GPS, altimeter, radar, and the like) required to make a landing. Due to the MAV s small payload size, this is a major concern. Replacing the imaging sensors with a single monocular camera is sufficient to land a MAV. By applying optical flow algorithms to images obtained from the camera, time-to-collision can be measured. This is a measurement of position and velocity (but not of absolute distance), and can avoid obstacles as well as facilitate a landing on a flat surface given a set of initial conditions. The key to this approach is to calculate time-to-collision based on some image on the ground. By holding the angular velocity constant, horizontal speed decreases linearly with the height, resulting in a smooth landing. Mathematical proofs show that even with actuator saturation or modeling/ measurement uncertainties, MAVs can land safely. Landings of this nature may have a higher velocity than is desirable, but this can be compensated for by a cushioning or dampening system, or by using a system of legs to grab onto a surface. Such a monocular camera system can increase vehicle payload size (or correspondingly reduce vehicle size), increase speed of descent, and guarantee a safe landing by directly correlating speed to height from the ground.

  6. Land-Breeze Forecasting

    NASA Technical Reports Server (NTRS)

    Case, Jonathan L.; Wheeler, Mark M.; Merceret, Francis J. (Technical Monitor)

    2002-01-01

    The nocturnal land breeze at the Kennedy Space Center (KSC) and Cape Canaveral Air Force Station (CCAFS) is both operationally significant and challenging to forecast. The occurrence and timing of land breezes impact low-level winds, atmospheric stability, low temperatures, and fog development. Accurate predictions of the land breeze are critical for toxic material dispersion forecasts associated with space launch missions, since wind direction and low-level stability can change noticeably with the onset of a land breeze. This report presents a seven-year observational study of land breezes over east-central Florida from 1995 to 2001. This comprehensive analysis was enabled by the high-resolution tower observations over KSC/CCAFS. Five-minute observations of winds, temperature, and moisture along with 9 15-MHz Doppler Radar Wind Profiler data were used to analyze specific land-breeze cases, while the tower data were used to construct a composite climatology. Utilities derived from this climatology were developed to assist forecasters in determining the land-breeze occurrence, timing, and movement based on predicted meteorological conditions.

  7. Ambient ion soft landing.

    PubMed

    Badu-Tawiah, Abraham K; Wu, Chunping; Cooks, R Graham

    2011-04-01

    Ambient ion soft landing, a process in which polyatomic ions are deposited from air onto a surface at a specified location under atmospheric pressure, is described. Ions generated by electrospray ionization are passed pneumatically through a heated metal drying tube, their ion polarity is selected using ion deflectors, and the dry selected ions are soft-landed onto a selected surface. Unlike the corresponding vacuum soft-landing experiment, where ions are mass-selected and soft-landed within a mass spectrometer, here the ions to be deposited are selected through the choice of a compound that gives predominantly one ionic species upon ambient ionization; no mass analysis is performed during the soft landing experiment. The desired dry ions, after electrical separation from neutrals and counterions, are deposited on a surface. Characterization of the landed material was achieved by dissolution and analysis using mass spectrometry or spectrofluorimetry. The treated surface was also characterized using fluorescence microscopy, which allowed surfaces patterned with fluorescent compounds to be imaged. The pure dry ions were used as reagents in heterogeneous ion/surface reactions including the reaction of pyrylium cations with d-lysine to form the N-substituted pyridinium cation. The charged microdroplets associated with incompletely dried ions could be selected for soft landing or surface reaction by choice of the temperature of a drying tube inserted between the ion source and the electrical ion deflectors.

  8. The land and its people

    NASA Astrophysics Data System (ADS)

    D'Odorico, Paolo; Rulli, Maria Cristina

    2014-05-01

    Large tracts of agricultural land are being bought up by external investors. Turning the land into a commodity can have detrimental effects, for generations to come, on the local communities that sell or lease the land.

  9. Gross anatomy of network security

    NASA Technical Reports Server (NTRS)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  10. Estimation of Croplands in West Africa using Global Land Cover and Land Use Datasets: Preliminary Results

    NASA Astrophysics Data System (ADS)

    Adhikari, P.; de Beurs, K.

    2013-12-01

    Africa is vulnerable to the effects of global climate change resulting in reduced agricultural production and worsening food security. Studies show that Africa has the lowest cereal yield compared to other regions of the world. The situation is particularly dire in East, Central and West Africa. Despite their low cereal yield, the population of East, Central and West Africa has doubled between 1980 and 2007. Furthermore, West Africa has a history of severe and long droughts which have occasionally caused widespread famine. To understand how global climate change and land cover change have impacted crop production (yield) it is important to estimate croplands in the region. The objective of this study is to compare ten publicly available land cover and land use datasets, covering different time periods, to estimate croplands in West Africa. The land cover and land use data sets used cover the period from early 1990s to 2010. Preliminary results show a high variability in cropland estimates. For example, in Benin, the estimated cropland area varies from 2.5 to 21% of the total area, while it varies from 3 to 8% in Niger. Datasets with a finer resolution (≤ 1,000 m) have consistently estimated comparable cropland areas across all countries. Several categorical verification statistics such as probability of detection (POD), false alarm ratio (FAR) and critical success index are also used to analyze the correspondence between estimated and observed cropland pixels at the scales of 1 Km and 10 Km.

  11. Salinity on irrigated lands

    SciTech Connect

    Westmore, R.A.; Manbeck, D.M.

    1984-02-01

    The technology for controlling salinity on irrigated lands is relatively simple, involving both minor and major changes in current land-management practices. Minor changes include more frequent irrigation, the use of salt-tolerant crops, preplanning irrigation, and seed placement. The major changes require a shift from gravity to sprinkler or drip systems, increased water supply and quality, soil modification, land grading, and improved drainage. Some of the major changes are difficult, and some impossible, to accomplish. Examples of reclamation include the Mardan Salinity Control and Reclamation Project (SCARP) in Pakistan. 5 references, 2 figures, 2 tables

  12. 76 FR 39884 - Aviation Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-07

    ... SECURITY Aviation Security Advisory Committee AGENCY: Transportation Security Administration, DHS. ACTION... Security Administration (TSA) announces the re-establishment of the Aviation Security Advisory Committee...-governmental organizations (NGOs) and stakeholder representatives concerning potential risks to...

  13. 2014 land cover land use horseshoe bend

    USGS Publications Warehouse

    Hanson, Jenny L.; Hoy, Erin E.; Robinson, Larry R.

    2016-01-01

    This collection of conservation areas consists of the floodplain of the combined streams of the Iowa River and the Cedar River. The study area begins just southeast of Wapello, IA, and continues southeast until the Horseshoe Bend Division, Port Louisa NWR. The area is currently managed to maintain meadow or grassland habitat which requires intensive management due to vegetative succession. In addition, this floodplain area contains a high proportion of managed lands and private lands in the Wetland Reserve Program and is a high priority area for cooperative conservation actions. This project provides a late-summer baseline vegetation inventory to assess future management actions in an adaptive process. Changes in levees, in addition to increased water flows and flood events due to climate change and land use practices, make restoration of floodplain processes more complex. Predictive models could help determine more efficient and effective restoration and management techniques. Successful GIS tools developed for this project would be applicable to other floodplain refuges and conservation areas.

  14. Biological and Chemical Security

    SciTech Connect

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  15. Securing Europe's future

    SciTech Connect

    Flanagan, S.J.; Hampson, F.O.

    1986-01-01

    The book provides a comprehensive review of the major political, social and economic issues that will shape the course of European security in the coming decade. It offers a thorough assessment of such critical questions as European views of the U.S. Strategic Defense Initiative, the likely contribution of new technologies and tactics to NATO's conventional defense capabilities, and domestic factors that influence security policy. It also provides original analysis of a number of issues, such as economic dimensions of security, the quest for a European defense identity, protection of Western interests outside the NATO area, and the role of the European neutral states in the security sphere, that have not received the attention they deserve. It provides a fresh review of the nuclear question and of the German security debate in the aftermath of the initial U.S. INF missile deployments. The final chapter is a careful synthesis of the various contributions that advances a framework for assessing NATO's policy alternatives.

  16. Energy and national security.

    SciTech Connect

    Karas, Thomas H.

    2003-09-01

    On May 19 and 20, 2003, thirty-some members of Sandia staff and management met to discuss the long-term connections between energy and national security. Three broad security topics were explored: I. Global and U.S. economic dependence on oil (and gas); II. Potential security implications of global climate change; and III. Vulnerabilities of the U.S. domestic energy infrastructure. This report, rather than being a transcript of the workshop, represents a synthesis of background information used in the workshop, ideas that emerged in the discussions, and ex post facto analysis of the discussions. Each of the three subjects discussed at this workshop has significant U.S. national security implications. Each has substantial technology components. Each appears a legitimate area of concern for a national security laboratory with relevant technology capabilities. For the laboratory to play a meaningful role in contributing to solutions to national problems such as these, it needs to understand the political, economic, and social environments in which it expects its work to be accepted and used. In addition, it should be noted that the problems of oil dependency and climate change are not amenable to solution by the policies of any one nation--even the one that is currently the largest single energy consumer. Therefore, views, concerns, policies, and plans of other countries will do much to determine which solutions might work and which might not.

  17. Practical secure quantum communications

    NASA Astrophysics Data System (ADS)

    Diamanti, Eleni

    2015-05-01

    We review recent advances in the field of quantum cryptography, focusing in particular on practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping. The former allows two parties to share secret messages with information-theoretic security, even in the presence of a malicious eavesdropper in the communication channel, which is impossible with classical resources alone. The latter enables two distrustful parties to agree on a random bit, again with information-theoretic security, and with a cheating probability lower than the one that can be reached in a classical scenario. Our implementations rely on continuous-variable technology for quantum key distribution and on a plug and play discrete-variable system for coin flipping, and necessitate a rigorous security analysis adapted to the experimental schemes and their imperfections. In both cases, we demonstrate the protocols with provable security over record long distances in optical fibers and assess the performance of our systems as well as their limitations. The reported advances offer a powerful toolbox for practical applications of secure communications within future quantum networks.

  18. NASA's Mars Landings

    NASA Video Gallery

    This video shows the landing sites of all six NASA spacecraft to reachMars—Viking 1, Viking 2, Pathfinder, Spirit, Opportunity, Phoenix—and thetarget location where Curiosity will touch down ...

  19. Land Product Validation (LPV)

    NASA Technical Reports Server (NTRS)

    Schaepman, Gabriela; Roman, Miguel O.

    2013-01-01

    This presentation will discuss Land Product Validation (LPV) objectives and goals, LPV structure update, interactions with other initiatives during report period, outreach to the science community, future meetings and next steps.

  20. Air cushion landing system

    NASA Technical Reports Server (NTRS)

    Boghami, K. M.; Captain, K. M.; Fish, R. B.

    1978-01-01

    Static and dynamic performance of air cushion landing system is simulated in computer program that treats four primary ACLS subsystems: fan, feeding system, trunk, and cushion. Configuration of systems is sufficiently general to represent variety of practical designs.

  1. Shuttle Landing Facility

    NASA Video Gallery

    The Shuttle Landing Facility at NASA's Kennedy Space Center in Florida marked the finish line for space shuttle missions since 1984. It is also staffed by a group of air traffic controllers who wor...

  2. Land Reuse Program

    SciTech Connect

    Rebekah Buckles

    1997-09-22

    The intent of this cooperative agreement was to establish a conduit and infrastructure that would allow for the transfer of DOE developed environmental technologies within land restoration activities first in the State of California and ultimately nationwide.

  3. Maritime security laboratory for maritime security research

    NASA Astrophysics Data System (ADS)

    Bunin, Barry J.; Sutin, Alexander; Bruno, Michael S.

    2007-04-01

    Stevens Institute of Technology has established a new Maritime Security Laboratory (MSL) to facilitate advances in methods and technologies relevant to maritime security. MSL is designed to enable system-level experiments and data-driven modeling in the complex environment of an urban tidal estuary. The initial focus of the laboratory is on the threats posed by divers and small craft with hostile intent. The laboratory is, however, evolvable to future threats as yet unidentified. Initially, the laboratory utilizes acoustic, environmental, and video sensors deployed in and around the Hudson River estuary. Experimental data associated with boats and SCUBA divers are collected on a computer deployed on board a boat specifically designed and equipped for these experiments and are remotely transferred to a Visualization Center on campus. Early experiments utilizing this laboratory have gathered data to characterize the relevant parameters of the estuary, acoustic signals produced by divers, and water and air traffic. Hydrophones were deployed to collect data to enable the development of passive acoustic methodologies for maximizing SCUBA diver detection distance. Initial results involving characteristics of the estuary, acoustic signatures of divers, ambient acoustic noise in an urban estuary, and transmission loss of acoustic signals in a wide frequency band are presented. These results can also be used for the characterization of abnormal traffic and improvement of underwater communication in a shallow water estuary.

  4. Landing-shock Recorder

    NASA Technical Reports Server (NTRS)

    Brevoort, M J

    1934-01-01

    A description of a special type of seismograph, called a "landing-shock recorder," to be used for measuring the acceleration during impacts such as are experienced in airplane landings, is given . The theory, together with the assumptions made, is discussed in its relation to calculating the acceleration experienced in impact. Calculations are given from records obtained for two impacts of known acceleration. In one case the impact was very severe and in the other it was only moderately severe.

  5. Viking landing sites

    NASA Technical Reports Server (NTRS)

    Panagakos, N.

    1973-01-01

    A valley near the mouth of the 20,000-foot-deep Martian Grand Canyon has been chosen by NASA as the site of its first automated landing on the planet Mars. The landing site for the second mission of the 1975-76 Viking spacecraft will probably be an area about 1,000 miles northeast of the first site, where the likelihood of water increases the chances of finding evidence of life.

  6. Global land-use allocation model linked to an integrated assessment model.

    PubMed

    Hasegawa, Tomoko; Fujimori, Shinichiro; Ito, Akihiko; Takahashi, Kiyoshi; Masui, Toshihiko

    2017-02-15

    We developed a global land-use allocation model that can be linked to integrated assessment models (IAMs) with a coarser spatial resolution. Using the model, we performed a downscaling of the IAMs' regional aggregated land-use projections to obtain a spatial land-use distribution, which could subsequently be used by Earth system models for global environmental assessments of ecosystem services, food security, and climate policies. Here we describe the land-use allocation model, discuss the verification of the downscaling technique, and explain the influences of the downscaling on estimates of land-use carbon emissions. A comparison of the emissions estimated with and without downscaling suggested that the land-use downscaling would help capture the spatial distribution of carbon stock density and regional heterogeneity of carbon emissions caused by cropland and pasture land expansion.

  7. [Land layout for lake tourism based on ecological restraint].

    PubMed

    Wang, Jian-Ying; Li, Jiang-Feng; Zou, Li-Lin; Liu, Shi-Bin

    2012-10-01

    To avoid the decrease and deterioration of lake wetlands and the other ecological issues such as lake water pollution that were caused by the unreasonable exploration of lake tourism, a land layout for the tourism development of Liangzi Lake with the priority of ecological security pattern was proposed, based on the minimal cumulative resistance model and by using GIS technology. The study area was divided into four ecological function zones, i. e., core protection zone, ecological buffer zone, ecotone zone, and human activity zone. The core protection zone was the landscape region of ecological source. In the protection zone, new tourism land was forbidden to be increased, and some of the existing fundamental tourism facilities should be removed while some of them should be upgraded. The ecological buffer zone was the landscape region with resistance value ranged from 0 to 4562. In the buffer zone, expansion of tourism land should be forbidden, the existing tourism land should be downsized, and human activities should be isolated from ecological source by converting the human environment to the natural environment as far as possible. The ecotone zone was the landscape region with resistance value ranged from 4562 to 30797. In this zone, the existing tourism land was distributed in patches, tourism land could be expanded properly, and the lake forestry ecological tourism should be developed widely. The human activity zone was the landscape region with resistance value ranged from 30797 to 97334, which would be the key area for the land layout of lake tourism. It was suggested that the land layout for tourism with the priority of landscape ecological security pattern would be the best choice for the lake sustainable development.

  8. Unfalsifiability of security claims.

    PubMed

    Herley, Cormac

    2016-06-07

    There is an inherent asymmetry in computer security: Things can be declared insecure by observation, but not the reverse. There is no observation that allows us to declare an arbitrary system or technique secure. We show that this implies that claims of necessary conditions for security (and sufficient conditions for insecurity) are unfalsifiable. This in turn implies an asymmetry in self-correction: Whereas the claim that countermeasures are sufficient is always subject to correction, the claim that they are necessary is not. Thus, the response to new information can only be to ratchet upward: Newly observed or speculated attack capabilities can argue a countermeasure in, but no possible observation argues one out. Further, when justifications are unfalsifiable, deciding the relative importance of defensive measures reduces to a subjective comparison of assumptions. Relying on such claims is the source of two problems: once we go wrong we stay wrong and errors accumulate, and we have no systematic way to rank or prioritize measures.

  9. Port and Harbor Security

    SciTech Connect

    Saito, T; Guthmuller, H; DeWeert, M

    2004-12-15

    Port and Harbor Security is a daunting task to which optics and photonics offers significant solutions. We are pleased to report that the 2005 Defense and Security Symposium (DSS, Orlando, FL) will include reports on active and passive photonic systems operating from both airborne and subsurface platforms. In addition to imaging techniques, there are various photonic applications, such as total internal reflection fluorescence (TIRF), which can be used to ''sniff'' for traces of explosives or contaminants in marine. These non-imaging technologies are beyond the scope of this article, but will also be represented at DSS 2005. We encourage colleagues to join our technical group to help us to make our ports and harbors safer and more secure.

  10. Secure content objects

    DOEpatents

    Evans, William D.

    2009-02-24

    A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.

  11. Secure medical digital libraries.

    PubMed

    Papadakis, I; Chrissikopoulos, V; Polemi, D

    2001-12-01

    In this paper, a secure medical digital library is presented. It is based on the CORBA specifications for distributed systems. The described approach relies on a three-tier architecture. Interaction between the medical digital library and its users is achieved through a Web server. The choice of employing Web technology for the dissemination of medical data has many advantages compared to older approaches, but also poses extra requirements that need to be fulfilled. Thus, special attention is paid to the distinguished nature of such medical data, whose integrity and confidentiality should be preserved at all costs. This is achieved through the employment of Trusted Third Parties (TTP) technology for the support of the required security services. Additionally, the proposed digital library employs smartcards for the management of the various security tokens that are used from the above services.

  12. 78 FR 49990 - Land Acquisitions: Appeals of Land Acquisition Decisions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-16

    ...; Docket ID: BIA-2013-0005] RIN 1076-AF15 Land Acquisitions: Appeals of Land Acquisition Decisions AGENCY... governing decisions by the Secretary to approve or deny applications to acquire land in trust. The public... articulating the process for issuing decisions to acquire land in trust under 25 CFR part 151. The...

  13. Employment security and health

    PubMed Central

    Virtanen, P; Vahtera, J; Kivimaki, M; Pentti, J; Ferrie, J

    2002-01-01

    Design: Cross sectional survey. Setting: Municipal sector employees in eight Finnish towns. Participants: 5981 employees with a permanent contract and 2786 employees with a non-permanent contract (2194 fixed term contract, 682 government subsidised contract). Outcome measures: Poor self rated health, chronic disease, and psychological distress. Results: Compared with permanent employees, fixed term men and women had better self rated health (men odds ratio 0.70; 95% confidence intervals 0.50 to 0.98, women 0.70 (0.60 to 0.82) and less chronic disease (men 0.69; 0.52 to 0.91; women 0.89; 0.79 to 1.02), but women had more psychological distress (1.26; 1.09 to 1.45). The only difference between subsidised employees and permanent employees was the high level of psychological distress in women (1.35; 1.09 to 1.68). Low perceived employment security was associated with poor health across all three indicators. The association of low perceived security with psychological distress was significantly stronger in permanent employees than among fixed term and subsidised employees, indicating that perceived security is more important for mental health among employees with a permanent contract. Conclusions: Contractual security and perceived security of employment are differently associated with health. It is therefore important to distinguish between these aspects of employment security in studies of labour market status and health. Such studies will also need to control for health selection, which is unlikely to operate in the same way among permanent and non-permanent employees. PMID:12118045

  14. Design for Security Workshop

    DTIC Science & Technology

    2014-09-30

    volume of ICs at the cost needed. Such trends have raised concerns regarding the reliance of U.S. defense systems 1. REPORT DATE (DD-MM-YYYY) 4. TITLE...concerns regarding the reliance of U.S. defense systems on high-performance ICs and the potential vulnerabilities of these systems if fabricated and/or...increase the security of a system has not received equal attention. This workshop discussed how to incorporate security as a first-rate metric during the

  15. Cyber Security Evaluation Tool

    SciTech Connect

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  16. Security System Software

    NASA Technical Reports Server (NTRS)

    1993-01-01

    C Language Integration Production System (CLIPS), a NASA-developed expert systems program, has enabled a security systems manufacturer to design a new generation of hardware. C.CURESystem 1 Plus, manufactured by Software House, is a software based system that is used with a variety of access control hardware at installations around the world. Users can manage large amounts of information, solve unique security problems and control entry and time scheduling. CLIPS acts as an information management tool when accessed by C.CURESystem 1 Plus. It asks questions about the hardware and when given the answer, recommends possible quick solutions by non-expert persons.

  17. Strategy for IT Security

    NASA Technical Reports Server (NTRS)

    Santiago, S. Scott; Moyles, Thomas J. (Technical Monitor)

    2001-01-01

    This viewgraph presentation provides information on the importance of information technology (IT) security (ITS) to NASA's mission. Several points are made concerning the subject. In order for ITS to be successful, it must be supported by management. NASA, while required by law to keep the public informed of its pursuits, must take precautions due to possible IT-based incursions by computer hackers and other malignant persons. Fear is an excellent motivation for establishing and maintaining a robust ITS policy. The ways in which NASA ITS personnel continually increase security are manifold, however a great deal relies upon the active involvement of the entire NASA community.

  18. ESDP -- Security or Consequences

    DTIC Science & Technology

    2006-03-01

    Macmillan, 2003), 203. 9 Leslie Lebl , “European Union Defense Policy An American Perspective,” Policy Analysis 516 (June 24, 2004): 3. 10 North Atlantic...15 December 1999, available from http:/www.nato.int/ docu/speech/1999/s991215c.htm; Internet; accessed 26 October 2005. 12 Lebl , 3. 13 Millen, 8. 14... Lebl , 3. 15 Javier Solana, A Secure Europe in a Better World - The European Security Strategy (Brussels, 12 December 2003), 6. 16 Ibid, 3. 17 Ibid, 4

  19. Quantum-secured imaging

    NASA Astrophysics Data System (ADS)

    Malik, Mehul; Magaña-Loaiza, Omar S.; Boyd, Robert W.

    2012-12-01

    We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

  20. [Biofuels, food security and transgenic crops].

    PubMed

    Acosta, Orlando; Chaparro-Giraldo, Alejandro

    2009-01-01

    Soaring global food prices are threatening to push more poor people back below the poverty line; this will probably become aggravated by the serious challenge that increasing population and climate changes are posing for food security. There is growing evidence that human activities involving fossil fuel consumption and land use are contributing to greenhouse gas emissions and consequently changing the climate worldwide. The finite nature of fossil fuel reserves is causing concern about energy security and there is a growing interest in the use of renewable energy sources such as biofuels. There is growing concern regarding the fact that biofuels are currently produced from food crops, thereby leading to an undesirable competition for their use as food and feed. Nevertheless, biofuels can be produced from other feedstocks such as lingo-cellulose from perennial grasses, forestry and vegetable waste. Biofuel energy content should not be exceeded by that of the fossil fuel invested in its production to ensure that it is energetically sustainable; however, biofuels must also be economically competitive and environmentally acceptable. Climate change and biofuels are challenging FAO efforts aimed at eradicating hunger worldwide by the next decade. Given that current crops used in biofuel production have not been domesticated for this purpose, transgenic technology can offer an enormous contribution towards improving biofuel crops' environmental and economic performance. The present paper critically presents some relevant relationships between biofuels, food security and transgenic plant technology.

  1. Marginal land-based biomass energy production in China.

    PubMed

    Tang, Ya; Xie, Jia-Sui; Geng, Shu

    2010-01-01

    Fast economic development in China has resulted in a significant increase in energy demand. Coal accounts for 70% of China's primary energy consumption and its combustion has caused many environmental and health problems. Energy security and environmental protection requirements are the main drivers for renewable energy development in China. Small farmland and food security make bioenergy derived from corn or sugarcane unacceptable to China: the focus should be on generating bioenergy from ligno-cellulosic feedstock sources. As China cannot afford biomass energy production from its croplands, marginal lands may play an important role in biomass energy production. Although on a small scale, marginal land has already been used for various purposes. It is estimated that some 45 million hm(2) of marginal land could be brought into high potential biomass energy production. For the success of such an initiative, it will likely be necessary to develop multipurpose plants. A case study, carried out on marginal land in Ningnan County, Sichuan Province with per capita cropland of 0.07 ha, indicated that some 380,000 tons of dry biomass could be produced each year from annual pruning of mulberry trees. This study supports the feasibility of producing large quantities of biomass from marginal land sources.

  2. Security Verification of Secure MANET Routing Protocols

    DTIC Science & Technology

    2012-03-22

    Approved: L1 FEB 12.. Maj Todd R . Andel, PhD (Chairman) Date ~~ Rb 12 Date Date Abstract Secure mobile ad hoc network (MANET) routing protocols are...topology, T=5. 17 Listing 2.1: MPR Selection Algorithm [16]. 1 s e t N2 [ n ] , n e i g h b o r ; 2 3 s e t MPR Selec t ion ( s e t ans , i n t s r c...4 s e l e c t e e = ∅ ; / ∗ ( i ) Remove a l l e n t r i e s from s e l e c t e e ∗ / 5 ans = ans \\ i d ; / ∗ ( i i ) Exc lude y o u r s e l f from

  3. Water Security - science and management challenges

    NASA Astrophysics Data System (ADS)

    Wheater, H. S.

    2015-04-01

    This paper briefly reviews the contemporary issues of Water Security, noting that current and prospective pressures represent major challenges for society. It is argued that, given the complex interdependencies and multi-faceted nature of these challenges, new trans-disciplinary science is needed to support the development of science-based policy and management. The effects of human society on land and water are now large and extensive. Hence we conclude that: (a) the management of water involves the management of a complex human-natural system, and (b) potential impacts of the human footprint on land and water systems can influence not only water quantity and quality, but also local and regional climate. We note, however, that research to quantify impacts of human activities is, in many respects, in its infancy. The development of the science base requires a trans-disciplinary place-based focus that must include the natural sciences, social sciences and engineering, and address management challenges at scales that range from local to large river basin scale, and may include trans-boundary issues. Large basin scale studies can provide the focus to address these science and management challenges, including the feedbacks associated with man's impact from land and water management on regional climate systems.

  4. Land use land cover change detection using remote sensing application for land sustainability

    NASA Astrophysics Data System (ADS)

    Balakeristanan, Maha Letchumy; Md Said, Md Azlin

    2012-09-01

    Land falls into the category of prime resources. Land use and land cover changes are identified as the prime issue in global environmental changes. Thus, it is necessary to initiate the land change detection process for land sustainability as well as to develop a competent land use planning. Tropical country like Malaysia has been experiencing land use and land cover changes rapidly for the past few decades. Thus, an attempt was made to detect the land use and land cover changes in the capital of the Selangor, Malaysia, Shah Alam over 20 years period (1990 - 2010). The study has been done through remote sensing approach using Earth Sat imagery of December 1990 and SPOT satellite imageries of March 2000 and December 2010. The current study resulted that the study area experienced land cover changes rapidly where the forest area occupied about 24.4% of Shah Alam in 1990 has decreased to 13.6% in 2010. Built up land have increased to 29.18% in 2010 from 12.47% in 1990. Other land cover classes such as wet land, wasteland and agricultural land also have undergone changes. Efficient land management and planning is necessary for land sustainability in Shah Alam.

  5. Water System Security and Resilience in Homeland Security Research

    EPA Pesticide Factsheets

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  6. Learning with Security

    ERIC Educational Resources Information Center

    Jokela, Paivi; Karlsudd, Peter

    2007-01-01

    The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…

  7. Metaphors for cyber security.

    SciTech Connect

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  8. Securing smart grid technology

    NASA Astrophysics Data System (ADS)

    Chaitanya Krishna, E.; Kosaleswara Reddy, T.; Reddy, M. YogaTeja; Reddy G. M., Sreerama; Madhusudhan, E.; AlMuhteb, Sulaiman

    2013-03-01

    In the developing countries electrical energy is very important for its all-round improvement by saving thousands of dollars and investing them in other sector for development. For Growing needs of power existing hierarchical, centrally controlled grid of the 20th Century is not sufficient. To produce and utilize effective power supply for industries or people we should have Smarter Electrical grids that address the challenges of the existing power grid. The Smart grid can be considered as a modern electric power grid infrastructure for enhanced efficiency and reliability through automated control, high-power converters, modern communications infrastructure along with modern IT services, sensing and metering technologies, and modern energy management techniques based on the optimization of demand, energy and network availability and so on. The main objective of this paper is to provide a contemporary look at the current state of the art in smart grid communications as well as critical issues on smart grid technologies primarily in terms of information and communication technology (ICT) issues like security, efficiency to communications layer field. In this paper we propose new model for security in Smart Grid Technology that contains Security Module(SM) along with DEM which will enhance security in Grid. It is expected that this paper will provide a better understanding of the technologies, potential advantages and research challenges of the smart grid and provoke interest among the research community to further explore this promising research area.

  9. Public eye security system

    NASA Astrophysics Data System (ADS)

    Aviv, David G.

    1999-01-01

    The recently patented system is a software engine that is connected to a television camera that is used for security applications. It will detect in near real time any physical criminal acts occurring within the field of view of the camera. It then instantaneously transmits an alarm to law enforcement and turns on a VCR and other crime deterrent systems, without human involvement.

  10. Transmission Line Security Monitor

    ScienceCinema

    None

    2016-07-12

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  11. Application Security Automation

    ERIC Educational Resources Information Center

    Malaika, Majid A.

    2011-01-01

    With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…

  12. Reasoning About Security Models

    DTIC Science & Technology

    1987-01-01

    surely an imperative task to investigate it more closely until those difficultiesare overcome ... Frege [2,p. II] 1. Introduction Security is an...References L. Wittgenstein, Philosophical Investigations (translated by G. E. M. Anscombe), The Macmillan Company, New York, 1953. G. Frege , The

  13. Update: Science and security

    NASA Astrophysics Data System (ADS)

    Richman, Barbara T.

    Although ‘a substantial and serious technology transfer [to the Soviet Union] exists,’ open communication of federally funded research does not damage our national security, according to Dale R. Corson, president emeritus of Cornell University and chairman of the National Academy of Sciences' Panel on Scientific Communication and National Security. Corson characterized those technology transfers at a recent press conference on the panel's findings, which are summarized in their report, ‘Science Communications and National Security’ (Eos, October 5, p. 801).‘A net flow of products, processes, and ideas is continually moving from the United States and its allies to the Soviet Union, through both overt and covert means,’ Corson said. While some of this technology transfer has not compromised national security (‘in part because a technology in question had little or no military significance’), a ‘substantial portion of the transfer has been damaging to national security,’ Corson explained. The ‘damaging transfers’ occur through the ‘legal as well as illegal sale of products, through transfers via third countries, and through a highly organized espionage operation.’

  14. Campus [in] Security

    ERIC Educational Resources Information Center

    Collett, Stacy

    2007-01-01

    Community colleges, while safe, are not immune to violence. In the wake of the Virginia Tech shootings, community colleges are committed to making campuses safer. From training first responders to understanding and identifying potential threats, the author describes what schools are doing to eradicate their so-called [in] securities and improve…

  15. Cryptographic Combinatorial Securities Exchanges

    NASA Astrophysics Data System (ADS)

    Thorpe, Christopher; Parkes, David C.

    We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information about the securities in the baskets from being exploited, enhancing trust. Our exchange offers institutions who wish to trade large positions a new alternative to existing methods of block trading: they can reduce transaction costs by taking advantage of other institutions’ available liquidity, while third party liquidity providers guarantee execution—preserving their desired portfolio composition at all times. In our exchange, institutions submit encrypted orders which are crossed, leaving a “remainder”. The exchange proves facts about the portfolio risk of this remainder to third party liquidity providers without revealing the securities in the remainder, the knowledge of which could also be exploited. The third parties learn either (depending on the setting) the portfolio risk parameters of the remainder itself, or how their own portfolio risk would change if they were to incorporate the remainder into a portfolio they submit. In one setting, these third parties submit bids on the commission, and the winner supplies necessary liquidity for the entire exchange to clear. This guaranteed clearing, coupled with external price discovery from the primary markets for the securities, sidesteps difficult combinatorial optimization problems. This latter method of proving how taking on the remainder would change risk parameters of one’s own portfolio, without revealing the remainder’s contents or its own risk parameters, is a useful protocol of independent interest.

  16. Mastering Mobile Security

    ERIC Educational Resources Information Center

    Panettieri, Joseph C.

    2007-01-01

    Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…

  17. Enhancing European security

    SciTech Connect

    Cuthbertson, I.M.; Robertson, D.

    1990-01-01

    This book looks beyond the current national security debate to envisage a Europe in which conventional forces have been substantially reduced and nuclear weapons no longer perform a significant deterrent role. Means through which this goal can be achieved are discussed.

  18. Transmission Line Security Monitor

    SciTech Connect

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  19. Energy and National Security

    ERIC Educational Resources Information Center

    Abelson, Philip H.

    1973-01-01

    Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)

  20. Today's School Security

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2012-01-01

    Outbreaks of violence at education institutions typically do not rise to the horrific levels of Virginia Tech, Columbine High School, or Oikos University. But incidents that threaten school security--bullying, hazing, online harassment--take place in every month of the year and may occur in any classroom or campus from coast to coast. Schools and…

  1. What Price Security?

    ERIC Educational Resources Information Center

    Corson, Dale

    1983-01-01

    A National Academy panel evaluates trade-offs between dangers to national security that arise from technology transfers and threats to the openness of scientific communication that are caused by too much secrecy. Major conclusions/suggestions are discussed. A list of acquisitions from the West affecting Soviet military technology is included.…

  2. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  3. Identity security awareness.

    PubMed

    Philipsen, Nayna C

    2004-01-01

    Identity theft is an increasing concern when organizations, businesses, and even childbirth educators ask for a client's Social Security number for identification purposes. In this column, the author suggests ways to protect one's identity and, more importantly, decrease the opportunities for identity theft.

  4. Unconditionally Secure Electronic Voting

    NASA Astrophysics Data System (ADS)

    Otsuka, Akira; Imai, Hideki

    In this chapter, we will show how to achieve unconditional or information-theoretic security in electronic voting with the following property: 1 Even all voters and tallying authorities have unbounded computing power, the distorted integrity of the voting results can be detected and proved incorrect by every honest voter,

  5. Nuclear Security Futures Scenarios.

    SciTech Connect

    Keller, Elizabeth James Kistin; Warren, Drake Edward; Hayden, Nancy Kay; Passell, Howard D.; Malczynski, Leonard A.; Backus, George A.

    2017-01-01

    This report provides an overview of the scenarios used in strategic futures workshops conducted at Sandia on September 21 and 29, 2016. The workshops, designed and facilitated by analysts in Center 100, used scenarios to enable thought leaders to think collectively about the changing aspects of global nuclear security and the potential implications for the US Government and Sandia National Laboratories.

  6. Security: Step by Step

    ERIC Educational Resources Information Center

    Svetcov, Eric

    2005-01-01

    This article provides a list of the essential steps to keeping a school's or district's network safe and sound. It describes how to establish a security architecture and approach that will continually evolve as the threat environment changes over time. The article discusses the methodology for implementing this approach and then discusses the…

  7. Designing Secure Library Networks.

    ERIC Educational Resources Information Center

    Breeding, Michael

    1997-01-01

    Focuses on designing a library network to maximize security. Discusses UNIX and file servers; connectivity to campus, corporate networks and the Internet; separation of staff from public servers; controlling traffic; the threat of network sniffers; hubs that eliminate eavesdropping; dividing the network into subnets; Switched Ethernet;…

  8. Land Use and Mapping

    NASA Technical Reports Server (NTRS)

    Lindgren, D. T.; Simpson, R. B.

    1973-01-01

    From the standpoint of technology, the most encouraging thing about ERTS has been the level of land-use identification. Land-use detail has exceeded the expectations of the Interagency Steering Committee and the requirements of land-use classification proposed by the Department of Interior. Whereas in the latter instance it was anticipated that only nine classes of land use would probably be identifiable, in fact some 14 to 18 classes have been identified. The success in the level of land-use identification results primarily from the various attributes of the ERTS system. These include the ability to provide repetitive coverage, and in particular seasonal coverage; the ability to image in four bands of the electromagnetic spectrum (green, red, and two near-infrared), which allows for manipulation of various combinations of bands; and the provision by the ERTS system of computer-compatible tapes for machine processing of data. Furthermore, the resolution of ERTS imagery has been better than expected. Although there is some question as to its exact resolving power, it is safe to say objects as small as 100 meters (300 feet) in diameter have been identified. Linear features as narrow as 16 meters (50 feet) can be detected (Figure 1).

  9. Future land use plan

    SciTech Connect

    1995-08-31

    The US Department of Energy`s (DOE) changing mission, coupled with the need to apply appropriate cleanup standards for current and future environmental restoration, prompted the need for a process to determine preferred Future Land Uses for DOE-owned sites. DOE began the ``Future Land Use`` initiative in 1994 to ensure that its cleanup efforts reflect the surrounding communities` interests in future land use. This plan presents the results of a study of stakeholder-preferred future land uses for the Brookhaven National Laboratory (BNL), located in central Long Island, New York. The plan gives the Laboratory`s view of its future development over the next 20 years, as well as land uses preferred by the community were BNL ever to cease operations as a national laboratory (the post-BNL scenario). The plan provides an overview of the physical features of the site including its history, topography, geology/hydrogeology, biological inventory, floodplains, wetlands, climate, and atmosphere. Utility systems and current environmental operations are described including waste management, waste water treatment, hazardous waste management, refuse disposal and ground water management. To complement the physical descriptions of the site, demographics are discussed, including overviews of the surrounding areas, laboratory population, and economic and non-economic impacts.

  10. Energy and land use

    SciTech Connect

    Not Available

    1981-12-01

    This report addresses the land use impacts of past and future energy development and summarizes the major federal and state legislation which influences the potential land use impacts of energy facilities and can thus influence the locations and timing of energy development. In addition, this report describes and presents the data which are used to measure, and in some cases, predict the potential conflicts between energy development and alternative uses of the nation's land resources. The topics section of this report is divided into three parts. The first part describes the myriad of federal, state and local legislation which have a direct or indirect impact upon the use of land for energy development. The second part addresses the potential land use impacts associated with the extraction, conversion and combustion of energy resources, as well as the disposal of wastes generated by these processes. The third part discusses the conflicts that might arise between agriculture and energy development as projected under a number of DOE mid-term (1990) energy supply and demand scenarios.

  11. Land-use Leakage

    SciTech Connect

    Calvin, Katherine V.; Edmonds, James A.; Clarke, Leon E.; Bond-Lamberty, Benjamin; Kim, Son H.; Wise, Marshall A.; Thomson, Allison M.; Kyle, G. Page

    2009-12-01

    Leakage occurs whenever actions to mitigate greenhouse gas emissions in one part of the world unleash countervailing forces elsewhere in the world so that reductions in global emissions are less than emissions mitigation in the mitigating region. While many researchers have examined the concept of industrial leakage, land-use policies can also result in leakage. We show that land-use leakage is potentially as large as or larger than industrial leakage. We identify two potential land-use leakage drivers, land-use policies and bioenergy. We distinguish between these two pathways and run numerical experiments for each. We also show that the land-use policy environment exerts a powerful influence on leakage and that under some policy designs leakage can be negative. International “offsets” are a potential mechanism to communicate emissions mitigation beyond the borders of emissions mitigating regions, but in a stabilization regime designed to limit radiative forcing to 3.7 2/m2, this also implies greater emissions mitigation commitments on the part of mitigating regions.

  12. Anticipating land surface change.

    PubMed

    Streeter, Richard; Dugmore, Andrew J

    2013-04-09

    The interplay of human actions and natural processes over varied spatial and temporal scales can result in abrupt transitions between contrasting land surface states. Understanding these transitions is a key goal of sustainability science because they can represent abrupt losses of natural capital. This paper recognizes flickering between alternate land surface states in advance of threshold change and critical slowing down in advance of both threshold changes and noncritical transformation. The early warning signals we observe are rises in autocorrelation, variance, and skewness within millimeter-resolution thickness measurements of tephra layers deposited in A.D. 2010 and A.D. 2011. These signals reflect changing patterns of surface vegetation, which are known to provide early warning signals of critical transformations. They were observed toward migrating soil erosion fronts, cryoturbation limits, and expanding deflation zones, thus providing potential early warning signals of land surface change. The record of the spatial patterning of vegetation contained in contemporary tephra layers shows how proximity to land surface change could be assessed in the widespread regions affected by shallow layers of volcanic fallout (those that can be subsumed within the existing vegetation cover). This insight shows how we could use tephra layers in the stratigraphic record to identify "near misses," close encounters with thresholds that did not lead to tipping points, and thus provide additional tools for archaeology, sustainability science, and contemporary land management.

  13. Anticipating land surface change

    PubMed Central

    Streeter, Richard; Dugmore, Andrew J.

    2013-01-01

    The interplay of human actions and natural processes over varied spatial and temporal scales can result in abrupt transitions between contrasting land surface states. Understanding these transitions is a key goal of sustainability science because they can represent abrupt losses of natural capital. This paper recognizes flickering between alternate land surface states in advance of threshold change and critical slowing down in advance of both threshold changes and noncritical transformation. The early warning signals we observe are rises in autocorrelation, variance, and skewness within millimeter-resolution thickness measurements of tephra layers deposited in A.D. 2010 and A.D. 2011. These signals reflect changing patterns of surface vegetation, which are known to provide early warning signals of critical transformations. They were observed toward migrating soil erosion fronts, cryoturbation limits, and expanding deflation zones, thus providing potential early warning signals of land surface change. The record of the spatial patterning of vegetation contained in contemporary tephra layers shows how proximity to land surface change could be assessed in the widespread regions affected by shallow layers of volcanic fallout (those that can be subsumed within the existing vegetation cover). This insight shows how we could use tephra layers in the stratigraphic record to identify “near misses,” close encounters with thresholds that did not lead to tipping points, and thus provide additional tools for archaeology, sustainability science, and contemporary land management. PMID:23530230

  14. Land Mines Removal

    NASA Technical Reports Server (NTRS)

    1999-01-01

    The same rocket fuel that helps power the Space Shuttle as it thunders into orbit will now be taking on a new role, with the potential to benefit millions of people worldwide. Leftover rocket fuel from NASA is being used to make a flare that destroys land mines where they were buried, without using explosives. The flare is safe to handle and easy to use. People working to deactivate the mines simply place the flare next to the uncovered land mine and ignite it from a safe distance using a battery-triggered electric match. The flare burns a hole in the land mine's case and ignites its explosive contents. The explosive burns away, disabling the mine and rendering it harmless. Using leftover rocket fuel to help destroy land mines incurs no additional costs to taxpayers. To ensure enough propellant is available for each Shuttle mission, NASA allows for a small percentage of extra propellant in each batch. Once mixed, surplus fuel solidifies and carnot be saved for use in another launch. In its solid form, it is an ideal ingredient for new the flare. The flare was developed by Thiokol Propulsion in Brigham City, Utah, the NASA contractor that designs and builds rocket motors for the Solid Rocket Booster Space Shuttle. An estimated 80 million or more active land mines are scattered around the world in at least 70 countries, and kill or maim 26,000 people a year. Worldwide, there is one casualty every 22 minutes.

  15. Land Mines Removal

    NASA Technical Reports Server (NTRS)

    1999-01-01

    The same rocket fuel that helps power the Space Shuttle as it thunders into orbit will now be taking on a new role, with the potential to benefit millions of people worldwide. Leftover rocket fuel from NASA is being used to make a flare that destroys land mines where they were buried, without using explosives. The flare is safe to handle and easy to use. People working to deactivate the mines simply place the flare next to the uncovered land mine and ignite it from a safe distance using a battery-triggered electric match. The flare burns a hole in the land mine's case and ignites its explosive contents. The explosive burns away, disabling the mine and rendering it harmless. Using leftover rocket fuel to help destroy land mines incurs no additional costs to taxpayers. To ensure enough propellant is available for each Shuttle mission, NASA allows for a small percentage of extra propellant in each batch. Once mixed, surplus fuel solidifies and carnot be saved for use in another launch. In its solid form, it is an ideal ingredient for the new flare. The flare was developed by Thiokol Propulsion in Brigham City, Utah, the NASA contractor that designs and builds rocket motors for the Solid Rocket Booster Space Shuttle. An estimated 80 million or more active land mines are scattered around the world in at least 70 countries, and kill or maim 26,000 people a year. Worldwide, there is one casualty every 22 minutes

  16. Understanding International Environmental Security: A Strategic Military Perspective

    DTIC Science & Technology

    2000-11-01

    occurring in countries with high population growth rates.) Geo- graphic areas of greatest concern in terms of environmental security are: the Sahel and... Sahel and southern Africa. Acute con- cern in many already water scarce countries of the region. Reduce water could be criti- cal in drought prone...area. The African Sahel is the most striking example of desertification or land degradation seen in modern times. The Sahel is the belt that extends

  17. After the Election: Fundamental Security Challenges Nigeria Must Face

    DTIC Science & Technology

    2015-07-01

    and largest economy . Key among these is security. Nigeria has increasingly been in the global spotlight in recent years because of the rise in...extended over most of northern and northeastern Nigeria, modern -day Burkina Faso, and Cameroon, Niger, western Sudan, and southern Libya. Most of...leaders in modern Nigeria. Presently, this community of about 10 mil- lion, which still inhabits the lands of this former caliphate and mostly

  18. Secure DoD Software: Considerations for the Vulnerability Market

    DTIC Science & Technology

    2013-12-01

    2013 REAL-TIME INFORMATION ASSURANCE In the civilian sector, costs can be enumerated by the number of credit card numbers stolen, intellectual... hacking into some of the most popular computer applica- tions. During the 2013 Pwn2Own challenge, researchers were awarded $480,000 for cracking...security-ecosystem>. 7. Thomson, I. (2013, March 8). Pwn2Own: IE10, Firefox, Chrome, Reader, Java hacks land $500k. Retrieved March 13, 2013, from

  19. Deteriorating food security in India

    NASA Astrophysics Data System (ADS)

    Milesi, C.; Samanta, A.; Hashimoto, H.; Kumar, K.; Ganguly, S.; Thenkabail, P. S.; Srivastava, A. N.; Nemani, R. R.; Myneni, R. B.

    2009-12-01

    One of the major challenges we face on our planet is increasing agricultural production to meet the dietary requirements of an additional 2.5 billion people by the mid of the century while limiting cropland expansion and other damages to natural resources. This problem is even more so challenging given that nearly all the population growth will take place where the majority of the hungry live today and where ongoing and future climate changes are projected to most negatively impact agricultural production, the semi-arid tropics (SAT). The SAT contain 40% of the global irrigated and rainfed croplands in over 50 developing countries and a growing population of over a billion and half people, many of which live in absolute poverty and strongly depend on agriculture that is constrained by chronic water shortages. Rates of food grain production in many of the countries of the SAT have progressively increased since the mid 1960s aided by the Green Revolution and relatively favourable climatic conditions. However, aggregated agricultural production statistics indicate that the rate of food grain production has recently stalled or declined in several of the countries in this region, escalating the concerns over matters of food security, that is availability of food and one’s access to it, in a region where many people live in extreme poverty, depend on an agrarian economy and are expected to face increasingly worse climatic conditions in the near future. In this paper we analyze the agricultural deceleration and its drivers over the country of India, which faces the daunting challenge of needing a 50-100% increase in yields of major crops by the middle to the 21st century to feed its growing population. We analyze the long term (1982-2006) record of the Normalized Difference Vegetation Index (NDVI) from the National Oceanic and Atmospheric Administration’s Advanced Very High Resolution Radiometer (NOAA/AVHRR) together with climate, land use, and crop production

  20. The Secure Rural Schools and Community Self-Determination Act of 2000. Hearing before the Subcommittee on Public Lands and Forests of the Committee on Energy and Natural Resources, United States Senate, One Hundred Ninth Congress, First Session (February 8, 2005). Senate Hearing 109-5

    ERIC Educational Resources Information Center

    US Senate, 2005

    2005-01-01

    The purpose of this hearing was to review the implementation of Titles I through III of Public Law 106-393, "The Secure Rural Schools and Community Self-Determination Act of 2000." Statements were presented by: Honorable Jeff Bingaman, U.S. Senator from New Mexico; Honorable Maria Cantwell, U.S. Senator from Washington; Honorable Larry…

  1. Telemedicine Security: A Systematic Review

    PubMed Central

    Garg, Vaibhav; Brewer, Jeffrey

    2011-01-01

    Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards. PMID:21722592

  2. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  3. Securing Information Technology in Healthcare

    PubMed Central

    Anthony, Denise; Campbell, Andrew T.; Candon, Thomas; Gettinger, Andrew; Kotz, David; Marsch, Lisa A.; Molina-Markham, Andrés; Page, Karen; Smith, Sean W.; Gunter, Carl A.; Johnson, M. Eric

    2014-01-01

    Dartmouth College’s Institute for Security, Technology, and Society conducted three workshops on securing information technology in healthcare, attended by a diverse range of experts in the field. This article summarizes the three workshops. PMID:25379030

  4. The future of security training.

    PubMed

    Slotnick, Jeffrey A

    2008-01-01

    This article reports on the brave new world of private security training, whether in healthcare or any other industry. It gives details and advice on new requirements, new approaches, and new resources for the forward-looking security director.

  5. Telemedicine security: a systematic review.

    PubMed

    Garg, Vaibhav; Brewer, Jeffrey

    2011-05-01

    Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards.

  6. Land grabbing: a preliminary quantification of economic impacts on rural livelihoods.

    PubMed

    Davis, Kyle F; D'Odorico, Paolo; Rulli, Maria Cristina

    2014-01-01

    Global demands on agricultural land are increasing due to population growth, dietary changes and the use of biofuels. Their effect on food security is to reduce humans' ability to cope with the uncertainties of global climate change. In light of the 2008 food crisis, to secure reliable future access to sufficient agricultural land, many nations and corporations have begun purchasing large tracts of land in the global South, a phenomenon deemed "land grabbing" by popular media. Because land investors frequently export crops without providing adequate employment, this represents an effective income loss for local communities. We study 28 countries targeted by large-scale land acquisitions [comprising 87 % of reported cases and 27 million hectares (ha)] and estimate the effects of such investments on local communities' incomes. We find that this phenomenon can potentially affect the incomes of ~12 million people globally with implications for food security, poverty levels and urbanization. While it is important to note that our study incorporates a number of assumptions and limitations, it provides a much needed initial quantification of the economic impacts of large-scale land acquisitions on rural livelihoods.

  7. Land use and energy

    SciTech Connect

    Robeck, K.E.; Ballou, S.W.; South, D.W.; Davis, M.J.; Chiu, S.Y.; Baker, J.E.; Dauzvardis, P.A.; Garvey, D.B.; Torpy, M.F.

    1980-07-01

    This report provides estimates of the amount of land required by past and future energy development in the United States and examines major federal legislation that regulates the impact of energy facilities on land use. An example of one land use issue associated with energy development - the potential conflict between surface mining and agriculture - is illustrated by describing the actual and projected changes in land use caused by coal mining in western Indiana. Energy activities addressed in the report include extraction of coal, oil, natural gas, uranium, oil shale, and geothermal steam; uranium processing; preparation of synfuels from coal; oil refineries; fossil-fuel, nuclear, and hydro-electric power plants; biomass energy farms; and disposal of solid wastes generated during combustion of fossil fuels. Approximately 1.1 to 3.3 x 10/sup 6/ acres were devoted to these activities in the United States in 1975. As much as 1.8 to 2.0 x 10/sup 6/ additional acres could be required by 1990 for new, nonbiomass energy development. The production of grain for fuel ethanol could require an additional 16.9 to 55.7 x 10/sup 6/ acres by 1990. Federal laws that directly or indirectly regulate the land-use impacts of energy facilities include the National Environmental Protection Act, Clean Air Act, Federal Water Pollution Control Act, Surface Mining Control and Reclamation Act, and Coastal Zone Management Act. The major provisions of these acts, other relevant federal regulations, and similar state and local regulatons are described in this report. Federal legislation relating to air quality, water quality, and the management of public lands has the greatest potential to influence the location and timing of future energy development in the United States.

  8. Climate Change and National Security

    DTIC Science & Technology

    2013-02-01

    does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. a. REPORT Climate Change and National...Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Does climate change constitute a national security threat to the United States? What is climate ...resources for an in-depth discussion on national security and climate change . 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13. SUPPLEMENTARY NOTES

  9. 76 FR 46603 - Security Ratings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-03

    ...In light of the provisions of Section 939A of the Dodd-Frank Wall Street Reform and Consumer Protection Act, we are adopting amendments to replace rule and form requirements under the Securities Act of 1933 and the Securities Exchange Act of 1934 for securities offering or issuer disclosure rules that rely on, or make special accommodations for, security ratings (for example, Forms S-3 and F-3......

  10. Permanence of Temporary Security Barriers

    DTIC Science & Technology

    2009-05-01

    confidence among interface residents that the outcome of the process will be a lasting improvement in safety, security and quality of life adequate...most significant finding was that the most direct link to removal of barriers is risk tolerance regarding an improved security environment, but the...tolerance in regards to an improving security environment. This fell short of identifying specific conditions or criteria for the removal of security

  11. National Strategy for Aviation Security

    DTIC Science & Technology

    2007-03-26

    for Aviation Security (hereafter referred to as the Strategy") to protect the Nation and its interests from threats in the Air Domain. The Secretary of... Aviation security is best achieved by integrating public and private aviation security global activities into a coordinated effort to detect, deter...might occur. The Strategy aligns Federal government aviation security programs and initiatives into a comprehensive and cohesive national effort

  12. Land Use and Change

    NASA Technical Reports Server (NTRS)

    Irwin, Daniel E.

    2004-01-01

    The overall purpose of this training session is to familiarize Central American project cooperators with the remote sensing and image processing research that is being conducted by the NASA research team and to acquaint them with the data products being produced in the areas of Land Cover and Land Use Change and carbon modeling under the NASA SERVIR project. The training session, therefore, will be both informative and practical in nature. Specifically, the course will focus on the physics of remote sensing, various satellite and airborne sensors (Landsat, MODIS, IKONOS, Star-3i), processing techniques, and commercial off the shelf image processing software.

  13. Aircraft landing gear systems

    NASA Technical Reports Server (NTRS)

    Tanner, John A. (Editor)

    1990-01-01

    Topics presented include the laboratory simulation of landing gear pitch-plane dynamics, a summary of recent aircraft/ground vehicle friction measurement tests, some recent aircraft tire thermal studies, and an evaluation of critical speeds in high-speed aircraft. Also presented are a review of NASA antiskid braking research, titanium matrix composite landing gear development, the current methods and perspective of aircraft flotation analysis, the flow rate and trajectory of water spray produced by an aircraft tire, and spin-up studies of the Space Shuttle Orbiter main gear tire.

  14. Lunar Polar Landing Sites

    NASA Astrophysics Data System (ADS)

    Kamps, Oscar; Foing, Bernard H.; Flahaut, Jessica

    2016-07-01

    An important step for a scientific mission is to assess on where the mission should be conducted. This study on landing site selection focuses on a mission to the poles of the Moon where an in-situ mission should be conducted to answer the questions with respect to volatiles and ices. The European interest for a mission to the poles of the Moon is presented in the mission concept called Heracles. This mission would be a tele-operated, sample return mission where astronauts will controlling a rover from an Orion capsule in cislunar orbit. The primary selection of landing sites was based on the scientific interest of areas near the poles. The maximum temperature map from Diviner was used to select sites where CO^2¬ should always be stable. This means that the maximum temperature is lower than 54K which is the sublimation temperature for CO^2¬ in lunar atmospheric pressure. Around these areas 14 potential regions of interest were selected. Further selection was based on the epoch of the surface in these regions of interest. It was thought that it would be of high scientific value if sites are sampled which have another epoch than already sampled by one of the Apollo or Luna missions. Only 6 sites on both North as South Pole could contain stable CO^2 ¬and were older than (Pre-)Necterian. Before a landing site and rover traverse was planned these six sites were compared on their accessibility of the areas which could contain stable CO^2. It was assumed that slope lower than 20^o is doable to rove. Eventually Amundsen and Rozhdestvenskiy West were selected as regions of interest. Assumptions for selecting landing sites was that area should have a slope lower than 5^o, a diameter of 1km, in partial illuminated area, and should not be isolated but inside an area which is in previous steps marked as accessible area to rove. By using multiple tools in ArcGIS it is possible to present the area's which were marked as potential landing sites. The closest potential landing

  15. Global Land Information System

    USGS Publications Warehouse

    ,

    1999-01-01

    The Global Land Information System (GLIS) is a World Wide Web-based query tool developed by the U.S. Geological Survey (USGS) to provide data and information about the Earth's land surface. Examples of holdings available through the GLIS include cartographic data, topographic data, soils data, aerial photographs, and satellite images from various agencies and cooperators located around the world. Both hard copy and digital data collections are represented in the GLIS, and preview images are available for millions of the products in the system.

  16. Asian Energy Security

    SciTech Connect

    Peter Hayes, PhD

    2003-12-01

    OAK-B135 In the Asian Energy Security (AES) Project, Nautilus Institute works together with a network of collaborating groups from the countries of Northeast Asia to evaluate the energy security implications of different national and regional energy ''paths''. The goal of the Asia Energy Security project is to illuminate energy paths--and the energy policy choices that might help to bring them about--that result in a higher degree of energy security for the region and for the world as a whole, that is, to identify energy paths that are ''robust'' in meeting many different energy security and development objectives, while also offering flexibility in the face of uncertainty. In work to date, Nautilus has carefully assembled a network of colleagues from the countries of the region, trained them together as a group in the use of a common, flexible, and transparent energy and environmental analysis planning software tool (LEAP, the Long-range Energy Alternatives Planning system), and worked with them to prepare base-year energy sector models for each country. To date, complete data sets and models for ''Business as Usual'' (BAU) energy paths have been compiled for China, Japan, the Republic of Korea, and the Democratic Peoples' Republic of Korea. A partial data set and BAU path has been compiled for the Russian Far East, and a data set is being started in Mongolia, where a team of researchers has just joined the AES project. In several countries, ''Alternative'' energy paths have been developed as well, or partially elaborated. National energy sector developments, progress on national LEAP modeling, additional LEAP training, and planning for the next phase of the AES project were the topics of a recent (early November) workshop held in Vancouver, British Columbia. With funding from the Department of Energy, Nautilus is poised to build upon the successes of the project to date with a coordinated international effort to research the energy security ramifications of

  17. FOILFEST :community enabled security.

    SciTech Connect

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6

  18. Securing mobile code.

    SciTech Connect

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  19. 76 FR 8946 - Security Ratings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-16

    ... From the Federal Register Online via the Government Publishing Office ] SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 200, 229, 230, 232, 239, 240, and 249 RIN 3235-AK18 Security Ratings AGENCY: Securities and Exchange Commission. ACTION: Proposed rule. SUMMARY: This is one of several releases that...

  20. Securing the Aviation Transportation System

    DTIC Science & Technology

    2007-12-01

    accessed 27 May 2007) 13 Robert W. Poole, Jr., “ Airport Security : Time for a New Model,” Reason Foundation online article, January 2006, Available from...15 Robert W. Poole, Jr., “ Airport Security : Time for a New Model,” Reason Foundation online article, January 2006...commercial jetliners. 24 Peter St. John, Air Piracy, Airport Security , and International Terrorism

  1. Secure Storage Architectures

    SciTech Connect

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to

  2. Revolutionary land use change in the 21st century: Is (rangeland) science relevant?

    USGS Publications Warehouse

    Herrick, J.E.; Brown, J.R.; Bestelmeyer, B.T.; Andrews, S.S.; Baldi, G.; Davies, J.; Duniway, M.; Havstad, K.M.; Karl, J.W.; Karlen, D.L.; Peters, Debra P. C.; Quinton, J.N.; Riginos, C.; Shaver, P.L.; Steinaker, D.; Twomlow, S.

    2012-01-01

    Rapidly increasing demand for food, fiber, and fuel together with new technologies and the mobility of global capital are driving revolutionary changes in land use throughout the world. Efforts to increase land productivity include conversion of millions of hectares of rangelands to crop production, including many marginal lands with low resistance and resilience to degradation. Sustaining the productivity of these lands requires careful land use planning and innovative management systems. Historically, this responsibility has been left to agronomists and others with expertise in crop production. In this article, we argue that the revolutionary land use changes necessary to support national and global food security potentially make rangeland science more relevant now than ever. Maintaining and increasing relevance will require a revolutionary change in range science from a discipline that focuses on a particular land use or land cover to one that addresses the challenge of managing all lands that, at one time, were considered to be marginal for crop production. We propose four strategies to increase the relevance of rangeland science to global land management: 1) expand our awareness and understanding of local to global economic, social, and technological trends in order to anticipate and identify drivers and patterns of conversion; 2) emphasize empirical studies and modeling that anticipate the biophysical (ecosystem services) and societal consequences of large-scale changes in land cover and use; 3) significantly increase communication and collaboration with the disciplines and sectors of society currently responsible for managing the new land uses; and 4) develop and adopt a dynamic and flexible resilience-based land classification system and data-supported conceptual models (e.g., state-and-transition models) that represent all lands, regardless of use and the consequences of land conversion to various uses instead of changes in state or condition that are

  3. Incorporating Risk and Indicators into a Water Security Framework

    NASA Astrophysics Data System (ADS)

    Allen, D. M.; Bakker, K.; Simpson, M. W.; Norman, E.; Dunn, G.

    2010-12-01

    The concept of water security has received growing attention over the past five years in academic debates and policy circles, particularly with respect to cumulative impacts assessment and watershed management. We propose an integrative definition for water security; one that considers both stressors and impacts (or effects) on hydrological systems. We present a water security assessment framework that considers status and risk indicators for both water quality and quantity as measures of impacts. This assessment framework also integrates the social sciences with natural science, engineering, and public health, providing opportunities to address environmental challenges, including the relationship between water and land use dynamics, the integration of aquatic ecosystem and human health concerns, and the alignment of governance with water management imperatives. We argue that this framework has the potential to advance water science, the contributing disciplines, and water policy and management.

  4. Urban land teleconnections and sustainability.

    PubMed

    Seto, Karen C; Reenberg, Anette; Boone, Christopher G; Fragkias, Michail; Haase, Dagmar; Langanke, Tobias; Marcotullio, Peter; Munroe, Darla K; Olah, Branislav; Simon, David

    2012-05-15

    This paper introduces urban land teleconnections as a conceptual framework that explicitly links land changes to underlying urbanization dynamics. We illustrate how three key themes that are currently addressed separately in the urban sustainability and land change literatures can lead to incorrect conclusions and misleading results when they are not examined jointly: the traditional system of land classification that is based on discrete categories and reinforces the false idea of a rural-urban dichotomy; the spatial quantification of land change that is based on place-based relationships, ignoring the connections between distant places, especially between urban functions and rural land uses; and the implicit assumptions about path dependency and sequential land changes that underlie current conceptualizations of land transitions. We then examine several environmental "grand challenges" and discuss how urban land teleconnections could help research communities frame scientific inquiries. Finally, we point to existing analytical approaches that can be used to advance development and application of the concept.

  5. Trees, soils, and food security

    PubMed Central

    Sanchez, P. A.; Buresh, R. J.; Leakey, R. R. B.

    1997-01-01

    Trees have a different impact on soil properties than annual crops, because of their longer residence time, larger biomass accumulation, and longer-lasting, more extensive root systems. In natural forests nutrients are efficiently cycled with very small inputs and outputs from the system. In most agricultural systems the opposite happens. Agroforestry encompasses the continuum between these extremes, and emerging hard data is showing that successful agroforestry systems increase nutrient inputs, enhance internal flows, decrease nutrient losses and provide environmental benefits: when the competition for growth resources between the tree and the crop component is well managed. The three main determinants for overcoming rural poverty in Africa are (i) reversing soil fertility depletion, (ii) intensifying and diversifying land use with high-value products, and (iii) providing an enabling policy environment for the smallholder farming sector. Agroforestry practices can improve food production in a sustainable way through their contribution to soil fertility replenishment. The use of organic inputs as a source of biologically-fixed nitrogen, together with deep nitrate that is captured by trees, plays a major role in nitrogen replenishment. The combination of commercial phosphorus fertilizers with available organic resources may be the key to increasing and sustaining phosphorus capital. High-value trees, 'Cinderella' species, can fit in specific niches on farms, thereby making the system ecologically stable and more rewarding economically, in addition to diversifying and increasing rural incomes and improving food security. In the most heavily populated areas of East Africa, where farm size is extremely small, the number of trees on farms is increasing as farmers seek to reduce labour demands, compatible with the drift of some members of the family into the towns to earn off-farm income. Contrary to the concept that population pressure promotes deforestation, there is

  6. Land cover change or land-use intensification: simulating land system change with a global-scale land change model.

    PubMed

    van Asselen, Sanneke; Verburg, Peter H

    2013-12-01

    Land-use change is both a cause and consequence of many biophysical and socioeconomic changes. The CLUMondo model provides an innovative approach for global land-use change modeling to support integrated assessments. Demands for goods and services are, in the model, supplied by a variety of land systems that are characterized by their land cover mosaic, the agricultural management intensity, and livestock. Land system changes are simulated by the model, driven by regional demand for goods and influenced by local factors that either constrain or promote land system conversion. A characteristic of the new model is the endogenous simulation of intensification of agricultural management versus expansion of arable land, and urban versus rural settlements expansion based on land availability in the neighborhood of the location. Model results for the OECD Environmental Outlook scenario show that allocation of increased agricultural production by either management intensification or area expansion varies both among and within world regions, providing useful insight into the land sparing versus land sharing debate. The land system approach allows the inclusion of different types of demand for goods and services from the land system as a driving factor of land system change. Simulation results are compared to observed changes over the 1970-2000 period and projections of other global and regional land change models.

  7. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  8. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a)...

  9. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  10. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a)...

  11. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.305 Facility Security Assessment (FSA)...

  12. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  13. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  14. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.305 Facility Security Assessment (FSA)...

  15. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  16. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  17. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  18. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a)...

  19. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a)...

  20. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  1. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  2. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.305 Facility Security Assessment (FSA)...

  3. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  4. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  5. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  6. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a)...

  7. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  8. The Cyber Security Crisis

    ScienceCinema

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2016-07-12

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  9. Keeping electronic records secure.

    PubMed

    Easton, David

    2013-10-01

    Are electronic engineering maintenance records relating to the hospital estate or a medical device as important as electronic patient records? Computer maintenance management systems (CMMS) are increasingly being used to manage all-round maintenance activities. However, the accuracy of the data held on them, and a level of security that prevents tampering with records, or other unauthorised changes to them to 'cover' poor practice, are both essential, so that, should an individual be injured or killed on hospital grounds, and a law suit follow, the estates team can be confident that it has accurate data to prove it has fulfilled its duty of care. Here David Easton MSc CEng FIHEEM MIET, director of Zener Engineering Services, and chair of IHEEM's Medical Devices Advisory Group, discusses the issues around maintenance databases, and the security and integrity of maintenance data.

  10. The Cyber Security Crisis

    SciTech Connect

    Spafford, Eugene

    2006-05-10

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  11. Biofuels and Food Security. A report by the High Level Panel of Experts on Food Security and Nutrition

    SciTech Connect

    2013-06-15

    In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects of biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation around the following five axes

  12. Secure Reliable Processing Systems

    DTIC Science & Technology

    1984-02-21

    specification successfully executed by application processes, technique draws from both the techniques of abstract data 121 Communications February 1980 of...J. and Farber. David A. "A \\lod’l for Verification of Data Security in Operating Systems." Communications of the ACM. Vol.21. No.9. September 1978. pp...the data being communicated exists in dleanext form as it is passed from one encrypted link to the next by the switch. Therefore the software in the

  13. Keeping Nuclear Materials Secure

    SciTech Connect

    2016-10-19

    For 50 years, Los Alamos National Laboratory has been helping to keep nuclear materials secure. We do this by developing instruments and training inspectors that are deployed to other countries to make sure materials such as uranium are being used for peaceful purposes and not diverted for use in weapons. These measures are called “nuclear safeguards,” and they help make the world a safer place.

  14. Convoy Security Shortfalls

    DTIC Science & Technology

    2012-12-06

    Second Reader Christopher C. LaNeve, COL, IN ___________________________________ Director, Thomas C. Graves, COL, IN School of...bandits adjusted their techniques and began emplacing roadside mines at night—a period when the force protection policy restricted any military...assist the reader in moving beyond the initial impressions of the topic of armed convoy security and improve the likelihood that the evidence presented

  15. Secure Design Patterns

    DTIC Science & Technology

    2009-03-01

    to the parent (s) or children of its corresponding locked node. It only contains the data specific to the node itself, that is, the data that the user...to reduce the cost of system main- tenance and the risk of security vulnerabilities need to be adopted by software development or- ganizations. While...child • is confined in its protection domain and does not gain control over the parent • does not gain control of a process possessing elevated

  16. Secure Design Patterns

    DTIC Science & Technology

    2009-10-01

    access to the parent (s) or children of its corresponding locked node. It only contains the data specific to the node itself, that is, the data that... adopted by software development or- ganizations. While there are a number of best practices available to address the issue of software security... parent − does not gain control of a process possessing elevated privileges, thereby limiting the damage that the adversary can inflict • Additional

  17. Implementing Security Sector Reform

    DTIC Science & Technology

    2008-12-04

    is compatible with combat operations, and it is a way of having your cake and eating it, too. After all, if there are manpower shortages that impact...Falling on ground already fertilized by years of ethnically-based violence, the ECOMOG-CDF partnership perpetuated ethnic division within Sierra Leone and...set by a clear definition of the driving problems. While post-combat security was the toughest political development test in Iraq, in Angola during

  18. Security seal. [Patent application

    DOEpatents

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  19. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    Metrics that would be useful in judging the security level of such a solution would therefore also include the number of operating system platforms ...components required for mission assurance could hop across platforms without impact to system operations. Next Steps Identification of a framework...software in a lab environment where recompilation, redesign of communication interfaces, and multiple platforms that could feasibly be made available in

  20. Robotic Security Systems

    DTIC Science & Technology

    2003-12-01

    robotic security platforms that automatically respond in an adaptive fashion to potential disturbances reported by a broad-area field of fixed unattended...sensors represents a powerful new defensive tool for mitigating the terrorist threat. Background The primary purpose of any robotic system is to...mobile robots , the predominant challenge is one of perception, in that the very nature of mobility introduces a never-ending sequence of dynamically

  1. Save Social Security Act

    THOMAS, 112th Congress

    Rep. McCotter, Thaddeus G. [R-MI-11

    2011-09-12

    09/19/2011 Referred for a period ending not later than September 19, 2011, (or for a later time if the Chairman so designates) to the Subcommittee on Social Security, in each case for consideration of such provisions as fall within the jurisdiction of the subcommittee concerned. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Systemization of Secure Computation

    DTIC Science & Technology

    2015-11-01

    studied MPC paradigm. 15. SUBJECT TERMS Garbled Circuits, Secure Multiparty Computation, SMC, Multiparty Computation, MPC, Server- aided computation 16...that may well happen for non-trivial input sizes and algorithms. One way to allow mobile devices to perform 2P-SFE is to use a server- aided ...Previous cryptographic work in a 3-party model (also referred as commodity-based, server-assisted, server- aided model) seems to have originated in [1], with

  3. Energy Security and Turkey

    DTIC Science & Technology

    2008-12-01

    Russia - Ukraine Gas Crisis,” Center for Eurasian Strategis Studies ( ASAM ), Ankara, Turkey, April 21, 2008, www.asam.org.tr/temp/temp111.doc...Necdet Pamir. “Energy in Security and the Most Recent Lesson: The Russia - Ukraine Gas Crisis,” Center for Eurasian Strategis Studies ( ASAM ), Ankara...Crisis,” Center for Eurasian Strategis Studies ( ASAM ), Ankara, Turkey, April 21, 2008, www.asam.org.tr/temp/temp111.doc (accessed May 21, 2008). 53

  4. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and......

  5. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and......

  6. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and......

  7. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and......

  8. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and......

  9. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security... Security Administration-002 Transportation Security Threat Assessment System System of Records (May 19... Transportation Worker Identification Credentialing and other Transportation Security......

  10. Global land and water grabbing for food and bioenergy

    NASA Astrophysics Data System (ADS)

    Rulli, M. C.; D'Odorico, P.

    2014-12-01

    The increasing demand for food, fibers and biofuels, the consequently escalating prices of agricultural products, and the uncertainty of international food markets have recently drawn the attention of governments and corporations toward investments in productive agricultural land, mostly in developing countries. Since 2000 more than 37 million hectares of arable land have been purchased or leased by foreign investors worldwide. The targeted regions are typically located in areas where crop yields are relatively low because of lack of modern technology. It is expected that in the long run large scale investments in agriculture and the consequent development of commercial farming will bring the technology required to close the existing crop yield gaps. Recently, a number of studies and reports have documented the process of foreign land acquisition, while the associated appropriation of land based resources (e.g., water and crops) has remained poorly investigated. The amount of food this land can produce and the number of people it could feed still needs to be quantified. It is also unclear to what extent the acquired land will be used to for biofuel production and the role played by U.S. and E.U. bioenergy policies as drivers of the ongoing land rush. The environmental impacts of these investments in agriculture require adequate investigation. Here we provide a global quantitative assessment of the rates of water and crop appropriation potentially associated with large scale land acquisitions. We evaluate the associated impacts on the food and energy security of both target and investors' countries, and highlight the societal and environmental implications of the land rush phenomenon.

  11. Sharing evidence of sustainable land management impacts

    NASA Astrophysics Data System (ADS)

    Schwilch, Gudrun; Mekdaschi Studer, Rima; Providoli, Isabelle; Liniger, Hanspeter

    2015-04-01

    Ensuring sustainable use of natural resources is crucial for maintaining the basis for our livelihoods. With threats from climate change, disputes over water, biodiversity loss, competing claims on land, and migration increasing worldwide, the demands for sustainable land management (SLM) practices will only increase in the future. For years already, various national and international organizations (GOs, NGOs, donors, research institutes, etc.) have been working on alternative forms of land management. And numerous land users worldwide - especially small farmers - have been testing, adapting, and refining new and better ways of managing land. All too often, however, the resulting SLM knowledge has not been sufficiently evaluated, documented and shared. Among other things, this has often prevented valuable SLM knowledge from being channelled into evidence-based decision-making processes. Indeed, proper knowledge management is crucial for SLM to reach its full potential. Since more than 20 years, the international WOCAT network documents and promotes SLM through its global platform. As a whole, the WOCAT methodology comprises tools for documenting, evaluating, and assessing the impact of SLM practices, as well as for knowledge sharing, analysis and use for decision support in the field, at the planning level, and in scaling up identified good practices. In early 2014, WOCAT's growth and ongoing improvement culminated in its being officially recognized by the UNCCD as the primary recommended database for SLM best practices. Over the years, the WOCAT network confirmed that SLM helps to prevent desertification, to increase biodiversity, enhance food security and to make people less vulnerable to the effects of climate variability and change. In addition, it plays an important role in mitigating climate change through improving soil organic matter and increasing vegetation cover. In-depth assessments of SLM practices from desertification sites enabled an evaluation of

  12. The Mayflower Landed Here!

    ERIC Educational Resources Information Center

    National Park Service (Dept. of Interior), Wellfleet, MA. Cape Cod National Seashore.

    This booklet provides information so that teachers can prepare their grade 5 and above students for a visit to the Cape Cod National Seashore historic site. Pilgrims on the Mayflower landed here in 1620. The booklet contains pre-visit, on site, and post-visit activities, along with a list of educational objectives and materials needed. It also…

  13. Land Combat Systems Industry

    DTIC Science & Technology

    2007-01-01

    communication equipment, and maintains power train components, starters , alternators , and generators. MCLB Barstow, Barstow, CA is the Marine Corps...protectionism became dominant themes. Other heavy industries, such as locomotive and food machinery companies, also were converted to production of land...implications for national defense. Domestic LCS companies’ market share may decrease as foreign companies with cheaper alternatives become more competitive and

  14. Land Use in Saskatchewan.

    ERIC Educational Resources Information Center

    Saskatchewan Dept. of the Environment, Regina. Public Information and Education Branch.

    Information on land use in Saskatchewan is provided in this updated report by the Policy, Planning, and Research Branch of Saskatchewan Environment. Chapter I discusses the physical, economic, and cultural geography of Saskatchewan and traces the history of settlement in this province. Chapter II provides information on the province's resource…

  15. Land Product Validation

    NASA Technical Reports Server (NTRS)

    Morisette, Jeffrey; Smith, David E. (Technical Monitor)

    2002-01-01

    The "Land Product Validation" (LPV) subgroup of the Committee on Earth Observing Satellites Working on Group on Calibration and Validation was formed in 2000. Goals of the LPV subgroup are: (1)to increase the quality and economy of global satellite product validation via developing and promoting international standards and protocols for field sampling, scaling, error budgeting, data exchange and product evaluation, and (2) to advocate mission-long validation programs for current and future earth observing satellites. First-round LPV activities will compliment the research themes of the Global Observation of Forest Cover (GOFC) program, which are: biophysical products, fire/burn scar detection, and land cover mapping. Meetings in June and July of 2001 focused on the first two themes. The GOFC "Forest Cover Characteristics and Changes" meeting provides a forum to initiate LPV activities related to Land Cover. The presentation will start with a summary of the LPV subgroup and its current activities. This will be followed by an overview of areas for potential coordination between the LPV and the GOFC Land Cover Theme.

  16. Geodiversity and land form

    NASA Astrophysics Data System (ADS)

    Gray, Murray

    2014-05-01

    The Earth's surface has a dynamic and topographically varied natural landscape. In some cases the resulting landforms are given generic names reflecting their form and/or origin, (e.g. sand dunes, eskers, ox-bow lakes) but in many cases the land surface has a more amorphous form and is less easily categorized other than at a landscape scale (e.g. dissected plateau, Chalk downland). Across much of Europe, while the natural vegetation has been removed or radically modified, the natural land form/topography remains in tact. In this context and in terms of geoconservation we ought to be: • allowing the dynamic natural processes that create, carve and modify landscapes to continue to operate; and • retaining natural topographic character and geomorphological authenticity in the face of human actions seeking to remodel the land surface. In this presentation examples of this approach to geoconservation of land form will be given from the UK and other parts of the world. This will include examples of both appropriate and inappropriate topographic modifications.

  17. MONITORING GRAZING LANDS

    Technology Transfer Automated Retrieval System (TEKTRAN)

    An important step in developing a ranch or allotment management plan for grazing lands is defining a rangeland monitoring program to evaluate progress toward achieving management objectives. A monitoring program can: 1) help determine the benefits gained from changes in grazing management or invest...

  18. Understanding Our Environment: Land.

    ERIC Educational Resources Information Center

    Callister, Jeffrey C.; Crampton, Janet Wert

    Part of the Understanding Our Environment project that is designed to engage students in investigating specific environmental problems through concrete activities and direct experience, this unit introduces students to the idea of natural resources and focuses on resources found on land: minerals such as hematite and gypsum; rocks such as granite…

  19. Aircraft landing control system

    NASA Technical Reports Server (NTRS)

    Lambregts, Antonius A. (Inventor); Hansen, Rolf (Inventor)

    1982-01-01

    Upon aircraft landing approach, flare path command signals of altitude, vertical velocity and vertical acceleration are generated as functions of aircraft position and velocity with respect to the ground. The command signals are compared with corresponding actual values to generate error signals which are used to control the flight path.

  20. Scofield Land Transfer Act

    THOMAS, 112th Congress

    Sen. Hatch, Orrin G. [R-UT

    2012-02-01

    03/22/2012 Committee on Energy and Natural Resources Subcommittee on Public Lands and Forests. Hearings held. With printed Hearing: S.Hrg. 112-642. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Living off the Land

    ERIC Educational Resources Information Center

    Dickerson, Peg; Gamberg, Maryellen

    2010-01-01

    Fourth-grade students at Cutchogue East Elementary School in Cutchogue, New York learned about dependence on natural resources for survival on a visit to Downs Farm Preserve at Fort Corchaug. This is a slice of preserved land just eight minutes beyond the classroom walls. Its inhabitants date back to the first hunting and gathering settlers--the…

  2. Food and nutrition security.

    PubMed

    1997-01-01

    This article discusses the deficits in food security in India. It is recommended that India commit to nutrition security by direct actions. Programs should provide essential staples and a nutrient distribution system with affordable prices. India should adopt an Employment Guarantee Program. Creches should provide maternal-child health care, nutrition, literacy, and employment. Government must resolve the internal conflicts of interest between overlapping sectors. India should resolve the "dysfunction" between macroeconomic policies and anti-poverty strategies. Interventions should be people oriented, rely on social mobilization, and provide information and financial resources in a nonconflict context. Efforts will require the cooperation between the private sector, voluntary organizations, state agencies, and local self-governing decentralized agencies. There is a need to build capacity and viable institutions. Poverty agencies do not have access to the minimum required cereals for the poor. The Public Distribution System (PDS) does not guarantee a minimum quantity of foodstuffs per household regardless of income level. More high quality varieties of rice are produced due to higher prices in the marketplace. Most state governments do not provide staple cereals to the PDS at affordable prices. The government sets fair prices for sugar, but not cereal. The government sells more cereal in the open market than to PDS. PDS should target poor households; that is, the 29.9% who live below the poverty line. Lack of nutrition security is due to poverty that is enhanced by ignorance and the lack of health and nutrition education.

  3. Nuclear energy and security

    SciTech Connect

    BLEJWAS,THOMAS E.; SANDERS,THOMAS L.; EAGAN,ROBERT J.; BAKER,ARNOLD B.

    2000-01-01

    Nuclear power is an important and, the authors believe, essential component of a secure nuclear future. Although nuclear fuel cycles create materials that have some potential for use in nuclear weapons, with appropriate fuel cycles, nuclear power could reduce rather than increase real proliferation risk worldwide. Future fuel cycles could be designed to avoid plutonium production, generate minimal amounts of plutonium in proliferation-resistant amounts or configurations, and/or transparently and efficiently consume plutonium already created. Furthermore, a strong and viable US nuclear infrastructure, of which nuclear power is a large element, is essential if the US is to maintain a leadership or even participatory role in defining the global nuclear infrastructure and controlling the proliferation of nuclear weapons. By focusing on new fuel cycles and new reactor technologies, it is possible to advantageously burn and reduce nuclear materials that could be used for nuclear weapons rather than increase and/or dispose of these materials. Thus, the authors suggest that planners for a secure nuclear future use technology to design an ideal future. In this future, nuclear power creates large amounts of virtually atmospherically clean energy while significantly lowering the threat of proliferation through the thoughtful use, physical security, and agreed-upon transparency of nuclear materials. The authors must develop options for policy makers that bring them as close as practical to this ideal. Just as Atoms for Peace became the ideal for the first nuclear century, they see a potential nuclear future that contributes significantly to power for peace and prosperity.

  4. Unfalsifiability of security claims

    PubMed Central

    Herley, Cormac

    2016-01-01

    There is an inherent asymmetry in computer security: Things can be declared insecure by observation, but not the reverse. There is no observation that allows us to declare an arbitrary system or technique secure. We show that this implies that claims of necessary conditions for security (and sufficient conditions for insecurity) are unfalsifiable. This in turn implies an asymmetry in self-correction: Whereas the claim that countermeasures are sufficient is always subject to correction, the claim that they are necessary is not. Thus, the response to new information can only be to ratchet upward: Newly observed or speculated attack capabilities can argue a countermeasure in, but no possible observation argues one out. Further, when justifications are unfalsifiable, deciding the relative importance of defensive measures reduces to a subjective comparison of assumptions. Relying on such claims is the source of two problems: once we go wrong we stay wrong and errors accumulate, and we have no systematic way to rank or prioritize measures. PMID:27217574

  5. 78 FR 66318 - Securities Investor Protection Corporation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-05

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 300 Securities Investor Protection Corporation AGENCY: Securities and Exchange Commission. ACTION: Proposed rule. SUMMARY: The Securities Investor Protection Corporation (``SIPC'') filed...

  6. 76 FR 34761 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... Classified National Security Information AGENCY: Marine Mammal Commission. ACTION: Notice. SUMMARY: This... information, as directed by Information Security Oversight Office regulations. FOR FURTHER INFORMATION CONTACT..., ``Classified National Security Information,'' and 32 CFR part 2001, ``Classified National Security...

  7. The cost of IT security.

    PubMed

    McMillan, Mac

    2015-04-01

    Breaches in data security have become commonplace in health care, making IT security a necessary cost for healthcare organizations. Organizations that do not invest proactively in IT security face a significant risk of incurring much greater costs from incidents involving compromised data security. Direct costs of security breaches include the costs of discovery, response, investigation, and notification and also can include state or federal penalties and costs of compliance with corrective action plans and resolution agreements. Hidden costs can include damage to brand, loss of consumer confidence, reduced HCAHPS scores, and--by extension--reduced value-based purchasing payments.

  8. New hologram of high security

    NASA Astrophysics Data System (ADS)

    Maripov, Arapbay; Shamshiev, Taalaibek

    2001-11-01

    This report, considers a hologram which possesses properties of Gabor"s, Leiht"s Denisyuk"s and Benton"s holograms as well as other new ones. These new properties and peculiarities of the hologram may be used in a Optical security, as a unique security device on security documents, such as, e.g., identification cards, passports, credit cards, and other documents where a high degree of security is needed. One may more increase a degree of security by means of a few manipulation in the recording scheme.

  9. SPAN security policies and guidelines

    NASA Technical Reports Server (NTRS)

    Sisson, Patricia L.; Green, James L.

    1989-01-01

    A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure. Therefore, each system manager, must strictly adhere to the requirements and must consider implementing the guidelines discussed. There are areas of vulnerability within the operating system that may not be addressed. However, when a requirement or guideline is discussed, implementation techniques are included. Information related to computer and data security is discussed to provide information on implementation options. The information is presented as it relates to a VAX computer environment.

  10. Security Assistance Reform: "Section 1206" Background and Issues for Congress

    DTIC Science & Technology

    2010-06-21

    maritime waters and on securing land and maritime borders. Some help military forces control their territories against terrorist threats. About 10...of maritime and land borders. Funding to support partner nations’ contributions to military and stability operations rose sharply in FY2010...and political engagement,” the letter states. One indicator of differing uses of Section 1206 and FMF assistance may be the relative size of funds

  11. Security Assistance Reform: "Section 1206" Background and Issues for Congress

    DTIC Science & Technology

    2010-06-29

    were CT programs focused on controlling adjacent maritime waters and on securing land and maritime borders. Some help military forces control their...Africa, much of it for surveillance and control of maritime and land borders. Funding to support partner nations’ contributions to military and...relative size of funds spent in Sub-Saharan Africa, a region whose insecure borders and ungoverned spaces present, many argue, an ideal habitat for

  12. Information risk and security modeling

    NASA Astrophysics Data System (ADS)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  13. NASA's Secured Advanced Federated Environment

    NASA Technical Reports Server (NTRS)

    Chow, Edward; Korsmeyer, David; Paterson, Pat; Liu, Joseph; Stewart, Helen; Burchell, Scott; Chang, Pat; Spence, Matt Chew; Viernes, Conan; Goforth, Andy; Billik, Shoshana; Wheeller, Bob

    2003-01-01

    In 1999, a NASA-wide team initially set out to create a collaborative environment to enable NASA's scientists and engineers to share information and tools across NASA locations and with world-wide partners. This paper describes the team's development process and solutions in resolving conflicting security issues of building a complex intra/inter-enterprise collaborative system. Based on the federated, hierarchical, compartmentalized principles, the Secured Advanced Federated Environment (SAFE) developed by the team is becoming a foundational element for building a collaborative infrastructure for NASA. This paper also introduces the concept of a Micro Security Domain which can achieve the balance between the need to collaborate and the need to enforce enterprise and local security rules. SAFE'S federated security concepts enables networks to be formed around the functional/security requirements. With the SAFE technologies and approaches, security will not be an afterthought of the enterprise network design.

  14. The remote security station (RSS)

    SciTech Connect

    Pletta, J.B. )

    1991-01-01

    This paper reports that, as an outgrowth of research into physical security systems, Sandia is investigating robotic technologies for improving physical security performance and flexibility. Robotic systems have the potential to allow more effective utilization of security personnel, especially in scenarios where they might be exposed to harm. They also can supplement fixed site installations where sensors have failed or where transient assets are present. The Remote Security Station (RSS) program for the defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior physical security systems. The RSS consists of three primary elements: a fixed but quickly moveable tripod with intrusion detection sensors and assessment camera; a mobile robotic platform with a functionally identical security module; and a control console which allows an operator to perform security functions and teleoperate the mobile platform.

  15. Health Security and Risk Aversion.

    PubMed

    Herington, Jonathan

    2016-09-01

    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (i) that security is intrinsically valuable, (ii) that it is necessary for social planning and (iii) that it is an appropriate response to decision-making in contexts of very limited information. Striking the right balance between securing and maximizing population health thus requires a substantive, and hitherto unrecognized, value judgment. Finally, I critically evaluate the current health security agenda in light of this new account of the concept and its relationship to the other aims of public health policy.

  16. Land Navigation and Positioning Systems

    DTIC Science & Technology

    2007-11-02

    Global Position System ( GPS ). This TOP incorporates procedures that require automated data collection instrumentation and a reference system that... Global Position System ( GPS ) 44 Survey Control Point (SCP) 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY...including those aided by the Global Positioning System ( GPS ). The MAPSH comprises the Dynamic Reference Unit Hybrid (DRUH), a Precision Lightweight

  17. 43 CFR 3811.1 - Lands: General.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 43 Public Lands: Interior 2 2013-10-01 2013-10-01 false Lands: General. 3811.1 Section 3811.1 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) LANDS AND MINERALS SUBJECT TO LOCATION Lands Subject...

  18. 43 CFR 3811.2 - Lands: Specific.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 43 Public Lands: Interior 2 2013-10-01 2013-10-01 false Lands: Specific. 3811.2 Section 3811.2 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) LANDS AND MINERALS SUBJECT TO LOCATION Lands Subject...

  19. 43 CFR 3811.2 - Lands: Specific.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 43 Public Lands: Interior 2 2014-10-01 2014-10-01 false Lands: Specific. 3811.2 Section 3811.2 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) LANDS AND MINERALS SUBJECT TO LOCATION Lands Subject...

  20. 43 CFR 3811.1 - Lands: General.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 43 Public Lands: Interior 2 2012-10-01 2012-10-01 false Lands: General. 3811.1 Section 3811.1 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) LANDS AND MINERALS SUBJECT TO LOCATION Lands Subject...

  1. 43 CFR 3811.1 - Lands: General.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 2 2011-10-01 2011-10-01 false Lands: General. 3811.1 Section 3811.1 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) LANDS AND MINERALS SUBJECT TO LOCATION Lands Subject...

  2. 43 CFR 3811.2 - Lands: Specific.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 43 Public Lands: Interior 2 2012-10-01 2012-10-01 false Lands: Specific. 3811.2 Section 3811.2 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) LANDS AND MINERALS SUBJECT TO LOCATION Lands Subject...

  3. 43 CFR 3811.2 - Lands: Specific.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 2 2011-10-01 2011-10-01 false Lands: Specific. 3811.2 Section 3811.2 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) LANDS AND MINERALS SUBJECT TO LOCATION Lands Subject...

  4. 43 CFR 3811.1 - Lands: General.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 43 Public Lands: Interior 2 2014-10-01 2014-10-01 false Lands: General. 3811.1 Section 3811.1 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) LANDS AND MINERALS SUBJECT TO LOCATION Lands Subject...

  5. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish...

  6. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms...

  7. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish...

  8. 17 CFR 230.602 - Securities exempted.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Securities exempted. 230.602 Section 230.602 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation E-Exemption for Securities of Small Business...

  9. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish...

  10. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms...

  11. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms...

  12. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for...

  13. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for...

  14. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms...

  15. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms...

  16. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for...

  17. 17 CFR 230.602 - Securities exempted.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Securities exempted. 230.602 Section 230.602 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation E-Exemption for Securities of Small Business...

  18. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for...

  19. 17 CFR 230.602 - Securities exempted.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Securities exempted. 230.602 Section 230.602 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation E-Exemption for Securities of Small Business...

  20. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for...