Science.gov

Sample records for national security human

  1. Simulating human behavior for national security human interactions.

    SciTech Connect

    Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.; Glickman, Matthew R.; Wolfenbarger, Paul R.; Xavier, Patrick Gordon

    2007-01-01

    This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humans were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.

  2. Contributions to Human Errors and Breaches in National Security Applications.

    SciTech Connect

    Pond, D. J.; Houghton, F. K.; Gilmore, W. E.

    2002-01-01

    Los Alamos National Laboratory has recognized that security infractions are often the consequence of various types of human errors (e.g., mistakes, lapses, slips) and/or breaches (i.e., deliberate deviations from policies or required procedures with no intention to bring about an adverse security consequence) and therefore has established an error reduction program based in part on the techniques used to mitigate hazard and accident potentials. One cornerstone of this program, definition of the situational and personal factors that increase the likelihood of employee errors and breaches, is detailed here. This information can be used retrospectively (as in accident investigations) to support and guide inquiries into security incidents or prospectively (as in hazard assessments) to guide efforts to reduce the likelihood of error/incident occurrence. Both approaches provide the foundation for targeted interventions to reduce the influence of these factors and for the formation of subsequent 'lessons learned.' Overall security is enhanced not only by reducing the inadvertent releases of classified information but also by reducing the security and safeguards resources devoted to them, thereby allowing these resources to be concentrated on acts of malevolence.

  3. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    ERIC Educational Resources Information Center

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  4. National security

    SciTech Connect

    Not Available

    1992-04-01

    This paper summarizes the views presented on October 31, 1991, at a GAO-sponsored conference on worldwide threats to U.S. national security. The conference was designed to provide insight into potential military threats to U.S. security interests and necessary modifications to current and planned U.S. forces to meet those threats. Conference participants, including defense analysts and retired military officers, discussed and analyzed the possibility of U.S. and allied involvement in various regional contingencies in Europe and the Soviet Union, Eat Asia and the Pacific, and the Near East and South Asia. Topics ranged from the possibility of nuclear war to a general discussion of low-intensity conflict. To serve as a starting point for discussion, we asked several of the participants to provide papers representing a wide range of views. The participants agreed that for many years the Soviet/Warsaw Pact threat to Europe shaped U.S. force planning but that the Soviet union no longer posed a conventional threat. Nuclear weapons held by the former Soviet republics and other nations, however, remain a concern. There was no agreement of the methodology for sizing U.S. forces. Some argued for sizing based on specific threats; other argued for flexibility to meet any and all contingencies and cited the Gulf War as a example.

  5. Energy and national security.

    SciTech Connect

    Karas, Thomas H.

    2003-09-01

    On May 19 and 20, 2003, thirty-some members of Sandia staff and management met to discuss the long-term connections between energy and national security. Three broad security topics were explored: I. Global and U.S. economic dependence on oil (and gas); II. Potential security implications of global climate change; and III. Vulnerabilities of the U.S. domestic energy infrastructure. This report, rather than being a transcript of the workshop, represents a synthesis of background information used in the workshop, ideas that emerged in the discussions, and ex post facto analysis of the discussions. Each of the three subjects discussed at this workshop has significant U.S. national security implications. Each has substantial technology components. Each appears a legitimate area of concern for a national security laboratory with relevant technology capabilities. For the laboratory to play a meaningful role in contributing to solutions to national problems such as these, it needs to understand the political, economic, and social environments in which it expects its work to be accepted and used. In addition, it should be noted that the problems of oil dependency and climate change are not amenable to solution by the policies of any one nation--even the one that is currently the largest single energy consumer. Therefore, views, concerns, policies, and plans of other countries will do much to determine which solutions might work and which might not.

  6. Energy and National Security

    ERIC Educational Resources Information Center

    Abelson, Philip H.

    1973-01-01

    Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)

  7. Energy Security is National Security

    DTIC Science & Technology

    2011-03-11

    reactors p.nd even opened up drilling in the Arctic National Wildlife Refuge ( ANWR ). However, the reality is, "Oil company experts believe ... in at...best 10 years time, ANWR could boost American production by 600,000 barrels a day.ŝ Additionally, it will take decades to build nuclear power plants...naturally make·the altermitive fuels cheaper and thus more attractive. Finally, further domestic drilling in the Arctic National Wildlife Refuge ( ANWR ) and

  8. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and......

  9. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and......

  10. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and......

  11. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and......

  12. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and......

  13. Bioethics and the national security state.

    PubMed

    Moreno, Jonathan D

    2004-01-01

    In previous work, I have described the history and ethics of human experiments for national security purposes during he cold war and developed the bioethical issues that will be apparent in the "war on terror". This paper is an attempt to bring these two previous lines of work together under the rubric of the "national security state," a concept familiar to Cold War historians and political scientists. The founding of the national security state was associated with the first articulations of informed consent requirements by national security agencies. My analysis indicates that strengthened consent standards, though conventionally thought to be antithetical crisis, can be seen as an attempt by the postwar national security state to protect itself from critics of expanded governmental power. During the coming years the renewed mission of the national security state in the war on terror should impel students of bioethics to consider its implications for the field.

  14. Redefining National Security. Worldwatch Paper 14.

    ERIC Educational Resources Information Center

    Brown, Lester R.

    This paper, an adaption from the author's forthcoming book "The Twenty-Ninth Day: Accomodating Human Needs and Numbers to the Earth's Resources," deals with non-military threats to national security. Since World War II the concept of national security has acquired an overwhelmingly military character. The policy of continual preparedness has led…

  15. Abortion: a national security issue.

    PubMed

    Mumford, S D

    1982-04-15

    The national security implications of abortion have not been addressed in a public forum but could come to be the single most important facet of the abortion debate. Abortion has been and will continue to be an essential variable in fertility control. Any serious effort at population growth control in the next few decades will have to recognize the role abortion has in birth rate decline. At this time an estimated 40-50 million abortions are performed worldwide each year; 1/2 of them are illegal. In the absence of abortion, annual growth would approach approximately 120 million. Growth of this magnitude would probably place intolerable strains on the economics and environments of some nations. To recognize the role of abortion in fertility control is to emphasize the inescapable need for abortion as 1 element in any comprehensive family planning service. Excessive population growth leads to chronic unemployment and the frustration of the goals of hundreds of millions of people. While this new threat to the security of individual nations and ultimately to global security has not been widely acknowledged, it is beginning to gain the attention of people of different professions and distinctive political persuasions. In many ways, rampant population growth is an even more dangerous and subtle threat to the world than thermonuclear war, for it is intrinsically less subject to rational safeguards and less amenable to organized control. Possibly the greatest and most pervasive problem is the declining ability to meet human needs in the areas of food, raw material, and resources, counterpoised against what are clearly rising expectations of growing populations. The following facts cannot be disputed: world population is a threat to the security of all nations, including the U.S.; abortion is essential to any effective population growth control effort; abortion is a national security issue; and as the availability of legal abortion in the U.S. goes, so goes the availability

  16. Climate Change and National Security

    DTIC Science & Technology

    2013-02-01

    does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. a. REPORT Climate Change and National...Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Does climate change constitute a national security threat to the United States? What is climate ...resources for an in-depth discussion on national security and climate change . 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13. SUPPLEMENTARY NOTES

  17. Human Security in the Asia-Pacific: In Australia’s National Interests?

    DTIC Science & Technology

    2011-12-16

    University of Queensland Asian Studies Department, also argued that the concept of human security would have “greater analytical and policy value” if it...development. 13 Alex Bellamy and Matt McDonald, professors at the School of Political Science at the University of Queensland , supported the...reflect regional concerns with threats from natural disasters including earthquakes, floods, volcanic eruptions and landslides. As a developing

  18. National Strategy for Aviation Security

    DTIC Science & Technology

    2007-03-26

    for Aviation Security (hereafter referred to as the Strategy") to protect the Nation and its interests from threats in the Air Domain. The Secretary of... Aviation security is best achieved by integrating public and private aviation security global activities into a coordinated effort to detect, deter...might occur. The Strategy aligns Federal government aviation security programs and initiatives into a comprehensive and cohesive national effort

  19. 76 FR 34761 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... Classified National Security Information AGENCY: Marine Mammal Commission. ACTION: Notice. SUMMARY: This... information, as directed by Information Security Oversight Office regulations. FOR FURTHER INFORMATION CONTACT..., ``Classified National Security Information,'' and 32 CFR part 2001, ``Classified National Security...

  20. How Nation-States Craft National Security Strategy Documents

    DTIC Science & Technology

    2012-10-01

    Africa, Sir David Omand in the United Kingdom, and in the United States, former National Security Advisor Steve Hadley provided time that he did not have...officials, Major General John Cantwell and Ms. Maria Fernandez, individually responsible for force structure, information technol- ogy, and human...about the need for an NSS.179 Speaking at the annual DEMOS security lec- ture in December 2006, Sir David Omand, former UK Security and Intelligence

  1. 75 FR 707 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-05

    ... National Security Information Memorandum of December 29, 2009--Implementation of the Executive Order ``Classified National Security Information'' Order of December 29, 2009--Original Classification Authority #0... 13526 of December 29, 2009 Classified National Security Information This order prescribes a...

  2. Ingenuity and National Security

    DTIC Science & Technology

    2013-06-01

    result of poor joint integration in Operation Eagle Claw (Iranian Hostage Rescue), Operation Urgent Fury (Invasion of Grenada ), combined with the...American forces invaded the Caribbean island nation of Grenada . Operation Urgent Fury began at 0500 on October 25, 1983. Grenada’s Marxist government...Soviet bloc government planting seeds of revolutionary warfare in Central America concerned President Reagan and the leaders of the island nations of the

  3. Saudi National Security. Research report

    SciTech Connect

    Al-Ayed, I.

    1996-05-01

    The purpose of this research paper is to focus on Saudi National Security. The author highlights geographic and historic factors that impact on threats to Saudi Arabia, and the objectives for providing security. He discusses how to achieve these objectives, including military readiness and cooperation with other countries to guarantee Saudi security. This is to ensure interests which are vital to the industrial world as the result of a continued flow of oil with a reasonable price. Given is the author`s opinion about U.S. political strategy in the region to achieve stability in the Gulf Region.

  4. National Security Policy: Mexico.

    DTIC Science & Technology

    1986-04-01

    President Lazaro Cardenas expropriated the 2 assets of seventeen foreign oil companies to include major United States companies and formed a national oil...Ironically, it was a military man General Lazaro Cardenas , who as president from 1935 to 1940 eliminated the preeminence of the military in...offices to fill. Other accomplishments of President Cardenas were his stripping power from rival general officers and his successful efforts to

  5. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  6. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  7. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  8. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  9. National Security Management Correspondence Course.

    ERIC Educational Resources Information Center

    Industrial Coll. of the Armed Forces (DOD), Washington, DC.

    A course of study on the fundamental aspects of the areas of knowledge which are essential to effective management of national security is presented. The course presents the substance of the Industrial College resident curriculum adapted to the correspondence method of study. The subject matter is designed to impart knowledge and understanding of…

  10. Diversity Intersects with National Security.

    ERIC Educational Resources Information Center

    Chew, Cassie

    2003-01-01

    Describes how the United Negro College Fund's Institute for International Public Policy is preparing to host a series of open-ended discussions with top government and business officials on the importance of a diverse work force as a national security imperative, as well as a competitive advantage in a global economy. (EV)

  11. Climate Change and National Security

    SciTech Connect

    Malone, Elizabeth L.

    2013-02-01

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  12. The European Court of Human Rights: Implications for United States National Security

    DTIC Science & Technology

    2014-02-04

    to the Geneva Convention) to climate change ( Kyoto Protocols ) to arms control (Comprehensive Nuclear Test-Ban Treaty), including those related to...instruments that it perceives will encroach on its sovereignty. There are a wide variety of such treaties, from human rights (Additional Protocols I & II...Rights.” 5 In 1998, with the adoption of Protocol No. 11, individuals were allowed to petition the court directly, but only after exhausting their

  13. Status of the National Security Workforce

    SciTech Connect

    2008-03-31

    This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

  14. 76 FR 81359 - National Security Personnel System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ... MANAGEMENT 5 CFR Chapter XCIX RIN 3206-AM 53 National Security Personnel System AGENCY: Department of Defense... Defense and Office of Personnel Management regulations concerning the National Security Personnel System... the Department of Defense (DOD) authority to establish a National Security Personnel System (NSPS)...

  15. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  16. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security...

  17. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  18. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security...

  19. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security...

  20. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  1. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  2. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  3. The science of human security.

    PubMed

    Taback, Nathan; Coupland, Robin

    2007-01-01

    During the 1990s medical studies using public health methodologies about injury and death due to weapons in conflict began to appear in the medical literature. The 1990s was also the period when the concept of human security was materialising in the development and humanitarian communities. Nowadays it is common for global organisations, governmental and non-governmental agencies, and academics to conduct scientific studies of human security. Many such studies gather evidence about human insecurity and these in turn lead to policy recommendations pertaining to improving human security. The data-to-policy process applies in this domain. In this article we propose that conceptual developments in human security and methods which generate scientific evidence of human security or insecurity have combined to create a new science: the science of human security. We describe key problems inherent in this new multidisciplinary science, some unique methodological challenges and new scientific opportunities.

  4. Secure Distributed Human Computation

    NASA Astrophysics Data System (ADS)

    Gentry, Craig; Ramzan, Zulfikar; Stubblebine, Stuart

    In Peha’s Financial Cryptography 2004 invited talk, he described the Cyphermint PayCash system (see www.cyphermint.com), which allows people without bank accounts or credit cards (a sizeable segment of the U.S. population) to automatically and instantly cash checks, pay bills, or make Internet transactions through publicly-accessible kiosks. Since PayCash offers automated financial transactions and since the system uses (unprotected) kiosks, security is critical. The kiosk must decide whether a person cashing a check is really the person to whom the check was made out, so it takes a digital picture of the person cashing the check and transmits this picture electronically to a central office, where a human worker compares the kiosk’s picture to one that was taken when the person registered with Cyphermint. If both pictures are of the same person, then the human worker authorizes the transaction.

  5. Project on National Security Reform: Forging a New Shield

    DTIC Science & Technology

    2008-11-01

    their strength. While humans have a natural tendency to communicate and trade, the integration of world economies has resulted from specific...sharing, and strategy confusion for the national security system throughout the world . 634 Cause: The nature of national security events is growing...Mart, the Walt Disney Corporation, or Microsoft. 1457 These four American corporations do not have the same organizational

  6. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy... achieve national health security and to implement the first quadrennial National Health Security Strategy... the National Health Security Strategy of the United States of America (2009) the U.S. Government...

  7. Gender Aspects of Human Security

    ERIC Educational Resources Information Center

    Moussa, Ghada

    2008-01-01

    The chapter deals with the gender dimensions in human security through focusing on the relationship between gender and human security, first manifested in international declarations and conventions, and subsequently evolving in world women conferences. It aims at analysing the various gender aspects in its relation to different human security…

  8. Next Generation National Security Leaders

    SciTech Connect

    Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

    2012-07-19

    It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had “right-sized” the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community – or it may lie in more effectively using our existing resources and training programs.

  9. 77 FR 6813 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-09

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee..., National Protection and Programs Directorate, Department of Homeland Security, 245 Murray Lane, Mail...

  10. 77 FR 65393 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-26

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... national security and emergency preparedness (NS/EP) telecommunications policy. Agenda: The NSTAC...

  11. 78 FR 63232 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... related to national security and emergency preparedness (NS/EP) telecommunications policy. During...

  12. Water security - Nation state and international security implications

    USGS Publications Warehouse

    Tindall, James A.; Andrew A. Campbell,

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  13. Student Experiential Opportunities in National Security Careers

    SciTech Connect

    None, None

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  14. 75 FR 16159 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-31

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee...: The President's National Security Telecommunications Advisory Committee (NSTAC) will hold its annual... Management Branch, Department of Homeland Security, 245 Murray Lane, SW., Washington, DC 20598-0615....

  15. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-17

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Advisory Committee Meeting; Correction. SUMMARY: The Department of Homeland Security published a document...'s National Security Telecommunications Advisory Committee (NSTAC). The document contained...

  16. 75 FR 3913 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-25

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee...: The President's National Security Telecommunications Advisory Committee (NSTAC) will be meeting by... Communications System (Government Industry Planning and Management Branch), Department of Homeland Security,...

  17. 75 FR 29781 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-27

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee... meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC) will be...), Department of Homeland Security, 245 Murray Lane, SW., Washington, DC 20598-0615; Fax:...

  18. Water security-National and global issues

    USGS Publications Warehouse

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  19. National Security Threats at the U.S.-Mexico Border

    DTIC Science & Technology

    2011-04-24

    terrorists and WMDs to enter the U.S. across the U.S.- Mexico border. As stated earlier, DTO’s have secured control over the human smuggling trade in the...last decade. Nested within human smuggling, is smuggling of persons from Countries of Interest or countries known to harbor or directly support...eliminate domestic threats to or attacks upon the national order and social structure; to prevent crime and any related dangers to domestic human security

  20. National Security Science and Technology Strategy

    DTIC Science & Technology

    1995-01-01

    Infectious Disease Threats (1994); Committee on National Security—Strategic Implementation Plan (March 1995), and Committee on International Science...country’s first comprehensive Presidential statement of national security science and technology priorities . It augments the President’s National Security...this theme is a priority on engagement with other nations . Rather than isolate a state as we did the Soviet Union, we now seek to integrate states

  1. National Security Technology Incubator Business Plan

    SciTech Connect

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  2. The Superpowers: Nuclear Weapons and National Security. National Issues Forums.

    ERIC Educational Resources Information Center

    Mitchell, Greg; Melville, Keith

    Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…

  3. National Security Technology Incubator Operations Plan

    SciTech Connect

    2008-04-30

    This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

  4. National security in the third world

    SciTech Connect

    Al-Mashat, A.M.M.

    1985-01-01

    For nations of the Third World, national security poses serious dilemmas. Unlike Western nations, less-developed countries must balance the complex and often contradictory requirements of socio-economic and political development with problems of internal stability and the requirements of national defense. For these countries, a concept of national security that focuses primarily on the international threat system and its overt manifestations of wars and violence, ignoring domestic well-being, is inadequate on theoretical and pragmatic grounds. This book addresses the security problems of Third World states, arguing for new ways to define and measure national security so that the concept may be appropriately applied to the needs of developing countries. In addition, the author argues that the tranquility of a state, a concept traditionally linked with national security, cannot necessarily be associated with quality of life as measured by conventional means. Dr. Al-Mashat constructs a tranquility index for 95 developing nations and tests its relationship with the physical quality-of-life index to demonstrate this point. Attempts to improve quality of life, he suggests, may in many countries lead to a reduction in security unless simultaneous attempts are made to democratize the regime.

  5. 76 FR 40296 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-08

    ... RECORDS ADMINISTRATION 36 CFR Part 1260 RIN 3095-AB64 Declassification of National Security Information... would update NARA's regulations related to declassification of classified national security information... of Executive Order 13526, Classified National Security Information, and its Implementing...

  6. 76 FR 81827 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... RECORDS ADMINISTRATION 36 CFR Part 1260 RIN 3095-AB64 Declassification of National Security Information... classified national security information in records transferred to NARA's legal custody. The rule incorporates changes resulting from issuance of Executive Order 13526, Classified National Security...

  7. 78 FR 45255 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... preparedness (NS/EP) telecommunications policy. Agenda: The NSTAC members will deliberate and vote on the...

  8. 77 FR 75182 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-19

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... telecommunications policy. Agenda: The NSTAC members will receive an update on progress made to date by the...

  9. 76 FR 52672 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... telecommunications policy. During the conference call, the NSTAC members will receive an update regarding...

  10. 78 FR 8160 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... telecommunications policy. Agenda: The NSTAC members will review and discuss the draft NSTAC Report to the...

  11. 77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    ... Doc No: 2012-10510] DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0016] President's National Security Telecommunications Advisory Committee; Correction AGENCY: National Protection and Programs... Federal Register of April 25, 2012, concerning the President's National Security...

  12. National Security Agency Accountability Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. 31 CFR 515.325 - National securities exchange.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false National securities exchange. 515.325... Definitions § 515.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act...

  14. 31 CFR 515.325 - National securities exchange.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false National securities exchange. 515.325... Definitions § 515.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act...

  15. 31 CFR 515.325 - National securities exchange.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false National securities exchange. 515.325... Definitions § 515.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act...

  16. 31 CFR 500.325 - National securities exchange.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false National securities exchange. 500.325... Definitions § 500.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act...

  17. 31 CFR 515.325 - National securities exchange.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false National securities exchange. 515.325... Definitions § 515.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act...

  18. 31 CFR 515.325 - National securities exchange.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false National securities exchange. 515.325... Definitions § 515.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act...

  19. Human health risk assessment database, 'the NHSRC toxicity value database': Supporting the risk assessment process at US EPA's National Homeland Security Research Center

    SciTech Connect

    Moudgal, Chandrika J.

    2008-11-15

    The toxicity value database of the United States Environmental Protection Agency's (EPA) National Homeland Security Research Center has been in development since 2004. The toxicity value database includes a compilation of agent property, toxicity, dose-response, and health effects data for 96 agents: 84 chemical and radiological agents and 12 biotoxins. The database is populated with multiple toxicity benchmark values and agent property information from secondary sources, with web links to the secondary sources, where available. A selected set of primary literature citations and associated dose-response data are also included. The toxicity value database offers a powerful means to quickly and efficiently gather pertinent toxicity and dose-response data for a number of agents that are of concern to the nation's security. This database, in conjunction with other tools, will play an important role in understanding human health risks, and will provide a means for risk assessors and managers to make quick and informed decisions on the potential health risks and determine appropriate responses (e.g., cleanup) to agent release. A final, stand alone MS ACESSS working version of the toxicity value database was completed in November, 2007.

  20. Global water risks and national security: Building resilience (Invited)

    NASA Astrophysics Data System (ADS)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  1. National Security Technology Incubation Project Continuation Plan

    SciTech Connect

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  2. Child rights, right to water and sanitation, and human security.

    PubMed

    Pink, Ross

    2012-06-15

    The article explores the intersection between child rights, water scarcity, sanitation, and the human security paradigm. The recognition of child rights has been advanced through the 1989 Convention on the Rights of the Child and other international legal instruments, while water rights are increasingly affirmed in international law and through the historic July 2010 United Nations General Assembly resolution that strengthened the legal foundation for water security and human rights. Yet there remains a development gap in terms of child access to clean and secure water sources for basic human development needs. The human security paradigm provides a legal and humanitarian foundation for the extension of child rights related to water and sanitation.

  3. FEDERAL SPENDING FOR NATIONAL SECURITY,

    DTIC Science & Technology

    ECONOMICS, UNITED STATES), (* DEFENSE SYSTEMS, COSTS), (*NATIONAL DEFENSE , COSTS), UNITED STATES GOVERNMENT, GOVERNMENT PROCUREMENT, ARMS CONTROL, DISARMAMENT, NUCLEAR WEAPONS, MILITARY BUDGETS, DEPARTMENT OF DEFENSE

  4. The National Economic Strategy: Security and Prosperity Today and Tomorrow

    DTIC Science & Technology

    2007-11-02

    Reagan and Beyond. New York: Simon and Schuster, 1984. Sunstein , Cass R. “Economic Security: A Human Right,” The American Prospect, October 2004, A24...president’s NSS provides the vision to spread economic prosperity through democracy , globalization, and free trade while improving the lives of all...but will create conditions that allow democracy , freedom, security, and prosperity to spread around the globe. 2. The National Economic Strategy in

  5. The Clinton National Security Strategy

    DTIC Science & Technology

    1998-01-01

    second, promoting prosperity, outlrnes enhancing competltlveness through deficit reduction, gaining access to foreign markets , fostering free trade...murky Does domestic investment outweigh free trade? Will North American prosper@ count more than Asian advances? Are any markets more important than...Integration of emerging nations into free market systems to reslstrng genital mutilation find a home as national Interests Again, the order of

  6. It's a national security policy, stupid

    SciTech Connect

    Isaacs, J.

    1993-09-01

    This article discusses the first few national security decisions of the Clinton administration. The first decision was to have the United States continue to honor the nuclear testing moratorium through September, 1994 (or until another nation tested first). The second decision of the Clinton administration was the independence of the Arms Control and Disarmament Agency (ACDA) from the State Department. The third decision was to formally denounce the Reagan Administration's interpretation of the US/Soviet Anti-Ballistic Missile Treaty. The issue of the financing of United States involvement in Somalia was also addressed. The implications of these policy decisions as related to national security are evaluated in this article.

  7. National Security Technology Incubator Action Plan

    SciTech Connect

    None, None

    2008-02-28

    This report documents the action plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). This action plan serves as a tool in measuring progress in the development process and delivery of services for the NSTI program. Continuous review and evaluation of the action plan is necessary in the development process of the NSTI. The action plan includes detailed steps in developing the NSTI program based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Included are tasks required to implement the NSTI, developed within a work breakdown structure. In addition, a timeline is identified for each task.

  8. 77 FR 26024 - National Maritime Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    ...: 2012-10668] DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0975] National Maritime Security... notice announcing a National Maritime Security Advisory Committee (NMSAC) partially closed public meeting... Guard to continue deliberations and make forward progress regarding multiple maritime...

  9. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... members of national securities exchanges. 270.17f-1 Section 270.17f-1 Commodity and Securities Exchanges....17f-1 Custody of securities with members of national securities exchanges. (a) No registered... custody of a company which is a member of a national securities exchange as defined in the...

  10. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... members of national securities exchanges. 270.17f-1 Section 270.17f-1 Commodity and Securities Exchanges....17f-1 Custody of securities with members of national securities exchanges. (a) No registered... custody of a company which is a member of a national securities exchange as defined in the...

  11. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... members of national securities exchanges. 270.17f-1 Section 270.17f-1 Commodity and Securities Exchanges....17f-1 Custody of securities with members of national securities exchanges. (a) No registered... custody of a company which is a member of a national securities exchange as defined in the...

  12. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... members of national securities exchanges. 270.17f-1 Section 270.17f-1 Commodity and Securities Exchanges....17f-1 Custody of securities with members of national securities exchanges. (a) No registered... custody of a company which is a member of a national securities exchange as defined in the...

  13. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... members of national securities exchanges. 270.17f-1 Section 270.17f-1 Commodity and Securities Exchanges....17f-1 Custody of securities with members of national securities exchanges. (a) No registered... custody of a company which is a member of a national securities exchange as defined in the...

  14. 17 CFR 240.17a-6 - Right of national securities exchange, national securities association, registered clearing...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Right of national securities exchange, national securities association, registered clearing agency or the Municipal Securities... and Reports of Certain Stabilizing Activities § 240.17a-6 Right of national securities...

  15. 17 CFR 240.17a-6 - Right of national securities exchange, national securities association, registered clearing...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Right of national securities exchange, national securities association, registered clearing agency or the Municipal Securities... and Reports of Certain Stabilizing Activities § 240.17a-6 Right of national securities...

  16. 17 CFR 240.17a-6 - Right of national securities exchange, national securities association, registered clearing...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Right of national securities exchange, national securities association, registered clearing agency or the Municipal Securities... and Reports of Certain Stabilizing Activities § 240.17a-6 Right of national securities...

  17. 17 CFR 240.17a-6 - Right of national securities exchange, national securities association, registered clearing...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Right of national securities exchange, national securities association, registered clearing agency or the Municipal Securities... and Reports of Certain Stabilizing Activities § 240.17a-6 Right of national securities...

  18. 17 CFR 240.17a-6 - Right of national securities exchange, national securities association, registered clearing...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Right of national securities exchange, national securities association, registered clearing agency or the Municipal Securities... and Reports of Certain Stabilizing Activities § 240.17a-6 Right of national securities...

  19. 32 CFR 156.5 - National security positions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false National security positions. 156.5 Section 156.5 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM (PSP) § 156.5 National security positions. (a) Procedures. The objective of...

  20. [National health security agencies: facts and perspectives].

    PubMed

    Houssin, Didier

    2013-10-01

    Despite major changes in its composition over the past two decades, the French health security infrastructure, currently consisting of eight agencies, has endured. This infrastructure has reinforced the French state's capacity to protect the health of its population, but it did not yet provide total protection. The future of national health agencies will depend on their ability to maintain the priority given to public health security ; to preserve credible, high-level scientific expertise ; to meet the challenges of healthcare safety ; and to organize health security at the European level.

  1. Maritime Commerce Security Plan for The National Strategy for Maritime Security

    DTIC Science & Technology

    2005-10-01

    MARITIME COMMERCE SECURITY PLAN FOR THE NATIONAL STRATEGY FOR MARITIME SECURITY OCTOBER 2005 Report Documentation Page Form...COVERED 00-00-2005 to 00-00-2005 4. TITLE AND SUBTITLE Maritime Commerce Security Plan for The National Strategy for Maritime Security 5a... Commerce Security Plan i FOREWORD By signing National Security Presidential Directive 41/Homeland Security Presidential Directive 13 (NSPD-41/HSPD

  2. Nevada National Security Site Environmental Report 2013

    SciTech Connect

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  3. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2011-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  4. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2010-09-03

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  5. Argentina: Nationality, Demography and Security

    DTIC Science & Technology

    1993-04-22

    consciousness. This is where Argentina’s weakness lies, a weakness at the foundation of any political, economic or social plan with which we try to solve our...retained their idiom and customs unusually long; not effectively socialized as Argentines; lack of national identity. The present situation. Our...work force. They lack social coverage and earn minimum wages under the table. Some Paraguayans become "contractors", the peak of the immigrant’s

  6. Cognitive models applied to human effectiveness in national security environments (ergonomics of augmented cognition system design and application).

    SciTech Connect

    Ntuen, Celestine; Winchester, Woodrow III

    2004-06-01

    In complex simulation systems where humans interact with computer-generated agents, information display and the interplay of virtual agents have become dominant media and modalities of interface design. This design strategy is reflected in augmented reality (AR), an environment where humans interact with computer-generated agents in real-time. AR systems can generate large amount of information, multiple solutions in less time, and perform far better in time-constrained problem solving. The capabilities of AR have been leveraged to augment cognition in human information processing. In this sort of augmented cognition (AC) work system, while technology has become the main source for information acquisition from the environment, the human sensory and memory capacities have failed to cope with the magnitude and scale of information they encounter. This situation generates opportunity for excessive cognitive workloads, a major factor in degraded human performance. From the human effectiveness point of view, research is needed to develop, model, and validate simulation tools that can measure the effectiveness of an AR technology used to support the amplification of human cognition. These tools will allow us to predict human performance for tasks executed under an AC tool construct. This paper presents an exploration of ergonomics issues relevant to AR and AC systems design. Additionally, proposed research to investigate those ergonomic issues is discussed.

  7. 78 FR 16699 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of Federal Advisory Committee Meeting. SUMMARY: The National Maritime Security Advisory... national maritime security. This meeting will be open to the public. DATES: The Committee will meet...

  8. National Security Strategy: What About the Environment

    DTIC Science & Technology

    2006-02-27

    and South Korea, to seabed mining and drilling rights in countries surrounding the Caspian Sea. According to Ambassador Jan Kubis , Secretary General of...national economy, distribute wealth, and provide basic goods and services. Kubis notes, “Such environmental pressures 8 could make social polarization...the U.S. interest (Washington, D.C.: Jewish Institute for National Security Affairs, 2001), x. 21 7 Ibid. 8 Jan Kubis , “Initiative For Change,” Our

  9. Heavy Lift for National Security: The Ares V

    NASA Technical Reports Server (NTRS)

    Sumrall, Phil

    2009-01-01

    The NASA Ares Projects Office is developing the launch vehicles to move the United States and humanity beyond low earth orbit. Ares I is a crewed vehicle, and Ares V is a heavy lift vehicle being designed to launch cargo into LEO and transfer cargo and crews to the Moon. This is a snapshot of development and capabilities. Ares V is early in the requirements formulation stage of development pending the outcome of the Review of U.S. Human Space Flight Plans Committee and White House action. The Ares V vehicle will be considered a national asset, creating unmatched opportunities for human exploration, science, national security, and space business.

  10. Sensor Science for National Security

    SciTech Connect

    Hardy, Jim E; Warmack, Robert J Bruce; Lavrik, Nickolay V; Datskos, Panos G; BRITTONJr., CHARLES L.

    2009-01-01

    Oak Ridge National Laboratory (ORNL) has over 200 professionals engaged in measurement science research and development. This work includes transduction techniques, advanced microelectronics, signal and image processing, modeling and simulation, material synthesis and characterization, and system engineering issues for packaging, miniaturization, integration, and communications (e.g. wireless networks). ORNL is applying this expertise to detecting, preventing, and reversing the proliferation of weapons of mass destruction, deploying integrated systems for incident awareness, detection, and response, providing technology for detection of explosives, and delivering enhanced protection and new capabilities to first responders and warfighters. Sensor systems include micro- and nano-arrays, optical, chemical, and biological technologies. Electronics research has focused on low-power, low-cost, and wireless functionality. Signal processing advancements encompass data flow with conversion to information and knowledge for intelligent decision making.

  11. Teaching Ethics and National Security Policy.

    ERIC Educational Resources Information Center

    Harbour, Frances V.

    1987-01-01

    Covers the objectives, subject matter, and requirements of a one-semester course based on ethics and national security policy taught within the School of Public Affairs at the University of Maryland at College Park. The course is designed to give students an opportunity to develop skill in the analysis of moral and ethical issues. (JDH)

  12. New rules revamp national security prosecutions

    NASA Astrophysics Data System (ADS)

    Gwynne, Peter

    2016-06-01

    Following the collapse of recent prosecutions of Chinese-American scientists on national security grounds, the US Department of Justice (DOJ) has issued new rules on such lawsuits that will require top officials in Washington to review and supervise all cases that implicitly involve spying - rather than leaving decisions to local prosecutors.

  13. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS THE OFFICE OF ENERGY RESEARCH FINANCIAL ASSISTANCE...). However, if in the opinion of the recipient or DOE such involvement becomes expected prior to the...

  14. The National Security Council: An Organizational Assessment

    DTIC Science & Technology

    2008-04-21

    Mifflin, 1991), p. 58. 39 See National Security Adviser: Role and Accountability. 40 Brzezinski acknowledges but discounts the reports that Mondale had...who had worked for Vice President Walter Mondale , who had been given a major policy role.40 The Reagan NSC, 1981-1989 Campaigning for the presidency

  15. The National Security Council: An Organizational Assessment

    DTIC Science & Technology

    2009-02-06

    staff.39 There were also reports of infighting between Carter loyalists on the NSC staff and those who had worked for Vice President Walter Mondale ...Mifflin, 1991), p. 58. 39 See National Security Adviser: Role and Accountability. 40 Brzezinski acknowledges but discounts the reports that Mondale

  16. US and Brazil: Prospective National Security Partners

    DTIC Science & Technology

    2001-01-01

    Chapter 5, “National Security,” data as of April 1997. Maxwell, Kenneth. “George W., King Canute , and Brazil,” Article published by Council on Foreign...22. [22] Kenneth Maxwell, “George W., King Canute , and Brazil,” article published by Council on Foreign Relations, 15 Dec 2000. (Hereafter referred

  17. Alternate Energy for National Security.

    NASA Astrophysics Data System (ADS)

    Rath, Bhakta

    2010-02-01

    Recent price fluctuations at the gas pump have brought our attention to the phenomenal increase of global energy consumption in recent years. It is now evident that we have almost reached a peak in global oil production. Several projections indicate that total world consumption of oil will rise by nearly 60 per cent between 1999 and 2020. In 1999 consumption was equivalent to 86 million barrels of oil per day, which has reached a peak of production extracted from most known oil reserves. These projections, if accurate, will present an unprecedented crisis to the global economy and industry. As an example, in the US, nearly 40 per cent of energy usage is provided by petroleum, of which nearly a third is used in transportation. The US Department of Defense (DOD) is the single largest buyer of fuel, amounting to, on the average, 13 million gallons per day. Additionally, these fuels have to meet different requirements that prevent use of ethanol additives and biodiesel. An aggressive search for alternate energy sources, both renewable and nonrenewable, is vital. The presentation will review national and DOD perspectives on the exploration of alternate energy with a focus on energy derivable from the ocean. )

  18. National Information Systems Security (INFOSEC) Glossary

    DTIC Science & Technology

    2000-09-01

    Systems Security Engineering ISSM Information Systems Security Manager ISSO Information Systems Security Officer IT Information Technology ITAR ...Digital Net Radio Interface Unit SDNS Secure Data Network System SDR System Design Review SFA Security Fault Analysis SHA Secure Hash Algorithm

  19. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 19 2014-07-01 2014-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense....

  20. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense....

  1. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 18 2011-07-01 2011-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense....

  2. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 33 2011-07-01 2011-07-01 false National security exemption. 1042.635... Compliance Provisions § 1042.635 National security exemption. The standards and requirements of this part and... government responsible for national defense. (b) Manufacturers may request a national security exemption...

  3. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 33 2014-07-01 2014-07-01 false National security exemption. 1042.635... Compliance Provisions § 1042.635 National security exemption. The standards and requirements of this part and... government responsible for national defense. (b) Manufacturers may request a national security exemption...

  4. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 34 2013-07-01 2013-07-01 false National security exemption. 1042.635... Compliance Provisions § 1042.635 National security exemption. The standards and requirements of this part and... government responsible for national defense. (b) Manufacturers may request a national security exemption...

  5. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 19 2012-07-01 2012-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense....

  6. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 19 2013-07-01 2013-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense....

  7. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 34 2012-07-01 2012-07-01 false National security exemption. 1042.635... Compliance Provisions § 1042.635 National security exemption. The standards and requirements of this part and... government responsible for national defense. (b) Manufacturers may request a national security exemption...

  8. Scientific Openness and National Security at the National Laboratories

    NASA Astrophysics Data System (ADS)

    McTague, John

    2000-04-01

    The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.

  9. 77 FR 1710 - National Maritime Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-11

    ... SECURITY Coast Guard National Maritime Security Advisory Committee AGENCY: Coast Guard, DHS. ACTION... published in the Federal Register of January 9, 2012, a notice announcing a National Maritime Security... regarding multiple maritime security initiatives. If you have been adversely affected by the delay...

  10. Nuclear Arms and National Security. 1983 National Issues Forum.

    ERIC Educational Resources Information Center

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  11. National Center for Nuclear Security - NCNS

    SciTech Connect

    2014-11-12

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  12. National Center for Nuclear Security - NCNS

    ScienceCinema

    None

    2016-07-12

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  13. Selecting RMF Controls for National Security Systems

    SciTech Connect

    Witzke, Edward L.

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  14. 76 FR 72427 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... Security Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS... President's National Security Telecommunications Advisory Committee (NSTAC) will meet on Thursday, December...) telecommunications policy. During the meeting, NSTAC members will receive feedback from the Department of...

  15. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-09

    ...The National Maritime Security Advisory Committee (NMSAC) will meet on January 18-19, 2012 in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the...

  16. Nevada National Security Site Environmental Report 2011

    SciTech Connect

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  17. VICARS and MANAGERS: Organizing for National Security

    DTIC Science & Technology

    1988-11-01

    involvement pushes the NSC staff, and especially the NSC adviser, out of the role of neutral policy coordination and into the mainstream of daily decisions...position of either ruhber- stampin ( or challenging what for all he knew had already been approved by the President. 30 Second. there is a natural...the same time, it is highly unstable: the national security adviser will be constantly lured or pushed across the line separating his role from the

  18. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2012-02-28

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  19. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    none,

    2013-06-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: • DOE hazardous and non-hazardous non-radioactive classified waste • DOE low-level radioactive waste (LLW) • DOE mixed low-level waste (MLLW) • U.S. Department of Defense (DOD) classified waste The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  20. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... requirements-national security contracts. 1352.237-72 Section 1352.237-72 Federal Acquisition Regulations... Provisions and Clauses 1352.237-72 Security processing requirements—national security contracts. As prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing...

  1. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... requirements-national security contracts. 1352.237-72 Section 1352.237-72 Federal Acquisition Regulations... Provisions and Clauses 1352.237-72 Security processing requirements—national security contracts. As prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing...

  2. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  3. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  4. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  5. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  6. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  7. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  8. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  9. 77 FR 9214 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act,...

  10. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  11. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  12. 14 CFR § 1260.31 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false National security. § 1260.31 Section Â... AGREEMENTS General Provisions § 1260.31 National security. National Security October 2000 Normally, NASA... performing on the grant who will have access to the information must obtain the appropriate...

  13. 40 CFR 91.1008 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  14. 40 CFR 89.908 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 20 2011-07-01 2011-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  15. 3 CFR 101.4 - National Security Council.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 3 The President 1 2012-01-01 2012-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI....

  16. 40 CFR 90.908 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 20 2014-07-01 2013-07-01 true National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request...

  17. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 20 2014-07-01 2013-07-01 true National security exemption. 94.908... § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... regulations in this subpart for reasons of national security. No request for this exemption is necessary....

  18. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 20 2011-07-01 2011-07-01 false National security exemption. 94.908... § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... regulations in this subpart for reasons of national security. No request for this exemption is necessary....

  19. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is...

  20. 40 CFR 90.908 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 21 2012-07-01 2012-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request...

  1. 40 CFR 211.110-2 - National security exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false National security exemptions. 211.110... ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a) A new product which is produced to conform with specifications developed by national security...

  2. 40 CFR 90.908 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 20 2011-07-01 2011-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request...

  3. 40 CFR 80.1655 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 17 2014-07-01 2014-07-01 false National security exemption. 80.1655... (CONTINUED) REGULATION OF FUELS AND FUEL ADDITIVES Gasoline Sulfur § 80.1655 National security exemption. (a...) Tactical military vehicles, engines, or equipment having an EPA national security exemption from...

  4. 40 CFR 89.908 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 21 2013-07-01 2013-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  5. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 21 2013-07-01 2013-07-01 false National security exemption. 94.908... § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... regulations in this subpart for reasons of national security. No request for this exemption is necessary....

  6. 40 CFR 89.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  7. 40 CFR 204.5-2 - National security exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 26 2012-07-01 2011-07-01 true National security exemptions. 204.5-2... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act,...

  8. 40 CFR 204.5-2 - National security exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false National security exemptions. 204.5-2... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act,...

  9. 39 CFR 267.5 - National Security Information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 39 Postal Service 1 2014-07-01 2014-07-01 false National Security Information. 267.5 Section 267.5... § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide regulations implementing Executive Order 12356 National Security Information (hereinafter referred to as...

  10. 40 CFR 211.110-2 - National security exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 26 2012-07-01 2011-07-01 true National security exemptions. 211.110-2... PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a) A new product which is produced to conform with specifications developed by national security agency, and...

  11. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 21 2013-07-01 2013-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must...

  12. 40 CFR 91.1008 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 20 2011-07-01 2011-07-01 false National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  13. 40 CFR 89.908 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 21 2012-07-01 2012-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  14. 40 CFR 211.110-2 - National security exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 25 2014-07-01 2014-07-01 false National security exemptions. 211.110... ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a) A new product which is produced to conform with specifications developed by national security...

  15. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 20 2011-07-01 2011-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must...

  16. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 20 2014-07-01 2013-07-01 true National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must...

  17. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 21 2012-07-01 2012-07-01 false National security exemption. 94.908... § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... regulations in this subpart for reasons of national security. No request for this exemption is necessary....

  18. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 2 2013-07-01 2013-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is...

  19. 3 CFR 101.4 - National Security Council.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 3 The President 1 2014-01-01 2014-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI....

  20. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  1. 40 CFR 90.908 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 21 2013-07-01 2013-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request...

  2. 40 CFR 204.5-2 - National security exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 25 2014-07-01 2014-07-01 false National security exemptions. 204.5-2... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act,...

  3. 40 CFR 91.1008 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 21 2012-07-01 2012-07-01 false National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  4. 40 CFR 204.5-2 - National security exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 204.5-2... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act,...

  5. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 2 2011-07-01 2011-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is...

  6. 40 CFR 91.1008 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 20 2014-07-01 2013-07-01 true National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  7. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must...

  8. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 21 2012-07-01 2012-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must...

  9. 3 CFR 101.4 - National Security Council.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 3 The President 1 2013-01-01 2013-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI....

  10. 5 CFR 9901.314 - National security compensation comparability.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false National security compensation... DEFENSE NATIONAL SECURITY PERSONNEL SYSTEM (NSPS) Pay and Pay Administration Overview of Pay System § 9901.314 National security compensation comparability. (a) To the maximum extent practicable, for...

  11. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 2 2012-07-01 2012-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is...

  12. 3 CFR 101.4 - National Security Council.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 3 The President 1 2011-01-01 2011-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI....

  13. 40 CFR 91.1008 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 21 2013-07-01 2013-07-01 false National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  14. 40 CFR 89.908 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 20 2014-07-01 2013-07-01 true National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  15. 40 CFR 90.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request...

  16. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 2 2014-07-01 2014-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is...

  17. 3 CFR 101.4 - National Security Council.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI....

  18. 76 FR 50719 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... 92-463, notice is hereby given of a forthcoming meeting of the National Security Education Board. The... requirements established by the David L. Boren National Security Education Act, Title VII of Public Law...

  19. 77 FR 49439 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... hereby given of a forthcoming meeting of the National Security Education Board. The purpose ] of the... established by the David L. Boren National Security Education Act, Title VII of Public Law 102-183, as...

  20. 77 FR 27739 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-11

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... hereby given of a forthcoming meeting of the National Security Education Board. The purpose of the... established by the David L. Boren National Security Education Act, Title VII of Public Law 102- 183,...

  1. 76 FR 28960 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... hereby given of a forthcoming meeting of the National Security Education Board. The purpose of the... established by the David L. Boren National Security Education Act, Title VII of Public Law 102- 183,...

  2. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  3. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  4. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  5. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  6. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  7. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ... Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... telecommunications policy. The new NSTAC Chair, James Crowe, Chief Executive Officer (CEO), Level 3...

  8. Nevada National Security Site Environmental Report 2012

    SciTech Connect

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  9. Estonian National Security Strategy: Current and Future Challenges

    DTIC Science & Technology

    2013-03-01

    2013 2 . REPORT TYPE STRATEGY RESEARCH PROJECT .33 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Estonian National Security Strategy...the existing Estonian Security Strategy and offers recommendations. 2 1. Estonian Security Environment: International Relations...Copenhagen School is understood in wider terms than the political-military and state-centered view of traditional security studies. 2 According to Buzan

  10. Security Economics and Critical National Infrastructure

    NASA Astrophysics Data System (ADS)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  11. 78 FR 19277 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-29

    ... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: United States Coast... published a notice of meeting for the National Maritime Security Advisory Committee (NMSAC) in the Federal... reported. NMSAC will now meet on April 2, 2013 via web and teleconference to discuss various...

  12. Overview of Scientific Freedom and National Security

    NASA Astrophysics Data System (ADS)

    Lerch, Irving

    2000-04-01

    The subject of our scrutiny is very much in the news, punctuated with nouns and modifiers both inflammatory and mundane such as espionage, justice, scientific accountability and scientific freedom. And while our discussion will focus on these issues, I want to raise some of the pragmatic questions that bear on the foundation of our support for international science. Beneath questions of guilt and the loss of secrets in the Wen Ho Lee case lay the inherent tension between the tradition of open exchange in the scientific enterprise and the need to protect the nation's security. How this balance is to be achieved in a democratic society has bedeviled us ever since the Manhattan project heralded the emergence of science and technology as instruments of great national power. If we do not find this balance, we run the risk of damaging some of the most important intellectual treasures that the US has produced the Department of Energy's national laboratories and the entire system that we call the international scientific enterprise. For while the superheated charges of lax security and criminal negligence have led some to call for ``firewalls" to isolate and protect the secrets in our weapons labs, such measures may have severe consequences for weapons and non-weapons labs alike and their many associated universities. It's estimated that from 70% to as much as 80% in the expansion of our economy is technology-driven, derived from the most productive system of scientific innovation in the world. This is also true of our national security. Science is indispensable to the development and maintenance of the nation's arsenals. The Department of Energy's Nuclear Stockpile Stewardship Program is central to the safety and reliability of American nuclear weapons and to our hope for a worldwide ban on nuclear tests. But this program will fail without a continuing intense development effort based on cutting-edge science. And a great deal of the science needed is being pursued in

  13. Y-12 National Security Complex Water Assessment

    SciTech Connect

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  14. Developing and Implementing an Effective National Security Strategy for Croatia

    DTIC Science & Technology

    2013-03-01

    documents. The final analysis identifies problems in the insufficient national security system and the lack of political want to efficiently deal with...national security system and the lack of political want to efficiently deal with national security issues. The essay ends with several...Croatia and abroad, and all the political parties used every available means including their lives to achieve all national goals which is obvious from

  15. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is...

  16. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is...

  17. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is...

  18. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is...

  19. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is...

  20. Extreme Scale Computing to Secure the Nation

    SciTech Connect

    Brown, D L; McGraw, J R; Johnson, J R; Frincke, D

    2009-11-10

    Since the dawn of modern electronic computing in the mid 1940's, U.S. national security programs have been dominant users of every new generation of high-performance computer. Indeed, the first general-purpose electronic computer, ENIAC (the Electronic Numerical Integrator and Computer), was used to calculate the expected explosive yield of early thermonuclear weapons designs. Even the U. S. numerical weather prediction program, another early application for high-performance computing, was initially funded jointly by sponsors that included the U.S. Air Force and Navy, agencies interested in accurate weather predictions to support U.S. military operations. For the decades of the cold war, national security requirements continued to drive the development of high performance computing (HPC), including advancement of the computing hardware and development of sophisticated simulation codes to support weapons and military aircraft design, numerical weather prediction as well as data-intensive applications such as cryptography and cybersecurity U.S. national security concerns continue to drive the development of high-performance computers and software in the U.S. and in fact, events following the end of the cold war have driven an increase in the growth rate of computer performance at the high-end of the market. This mainly derives from our nation's observance of a moratorium on underground nuclear testing beginning in 1992, followed by our voluntary adherence to the Comprehensive Test Ban Treaty (CTBT) beginning in 1995. The CTBT prohibits further underground nuclear tests, which in the past had been a key component of the nation's science-based program for assuring the reliability, performance and safety of U.S. nuclear weapons. In response to this change, the U.S. Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship (SBSS) program in response to the Fiscal Year 1994 National Defense Authorization Act, which requires, 'in the absence of nuclear

  1. Environmental degradation: Implications for national security. Study report

    SciTech Connect

    Schlegel, J.D.

    1990-03-30

    As the United States prepares to move into the 21st century, the threat of armed conflict between the United States and the Soviet Union appears to have receded into the realm of the improbable. At the same time, however, a new and perhaps more ominous threat is emerging to challenge the security of nations: environmental degradation. Burgeoning world populations and the quest for industrial/economic development have begun seriously to erode the capability of the earth's environment to sustain itself. The phenomena of global warming, ozone depletion, deforestation, desertification and many forms of pollution are destroying the delicate life support systems upon which humanity depends for its very survival. National security, therefore, must be redefined and in this instance must be viewed in a context outside the traditional concept of military capability. This paper examines economic, social, political and military implications of environmental degradation as threats to the security of the United States and to world security. The paper concludes that a new level of international cooperation and technological innovation are required to reduce the negative impact of environmental degradation. An appendix provides additional data on specific forms of environmental degradation.

  2. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Access to restricted data and national security... Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access to restricted data and national security...

  3. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access to restricted data and national security... Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access to restricted data and national security...

  4. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  5. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  6. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  7. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  8. 75 FR 45154 - National Security Division; Agency Information Collection Activities:

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... National Security Division; Agency Information Collection Activities: Proposed Collection; Comments... (Foreign Agents). The Department of Justice (DOJ), National Security Division (NSD), will be submitting the... information, please write to U.S. Department of Justice, 10th & Constitution Avenue, NW., National...

  9. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 36 Parks, Forests, and Public Property 3 2011-07-01 2011-07-01 false National security-classified... Restrictions § 1256.46 National security-classified information. In accordance with 5 U.S.C. 552(b)(1), NARA... properly classified under the provisions of the pertinent Executive Order on Classified National...

  10. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true National security-classified... Restrictions § 1256.46 National security-classified information. In accordance with 5 U.S.C. 552(b)(1), NARA... properly classified under the provisions of the pertinent Executive Order on Classified National...

  11. 29 CFR 1606.3 - The national security exception.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 4 2012-07-01 2012-07-01 false The national security exception. 1606.3 Section 1606.3... DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful employment practice to deny employment opportunities to any individual who does not fulfill the...

  12. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false National security-classified... Restrictions § 1256.46 National security-classified information. In accordance with 5 U.S.C. 552(b)(1), NARA... properly classified under the provisions of the pertinent Executive Order on Classified National...

  13. 29 CFR 1606.3 - The national security exception.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 4 2013-07-01 2013-07-01 false The national security exception. 1606.3 Section 1606.3... DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful employment practice to deny employment opportunities to any individual who does not fulfill the...

  14. 29 CFR 1606.3 - The national security exception.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 4 2014-07-01 2014-07-01 false The national security exception. 1606.3 Section 1606.3... DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful employment practice to deny employment opportunities to any individual who does not fulfill the...

  15. 29 CFR 1606.3 - The national security exception.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false The national security exception. 1606.3 Section 1606.3... DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful employment practice to deny employment opportunities to any individual who does not fulfill the...

  16. 29 CFR 1606.3 - The national security exception.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 4 2011-07-01 2011-07-01 false The national security exception. 1606.3 Section 1606.3... DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful employment practice to deny employment opportunities to any individual who does not fulfill the...

  17. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  18. Computer Security: The Human Element.

    ERIC Educational Resources Information Center

    Guynes, Carl S.; Vanacek, Michael T.

    1981-01-01

    The security and effectiveness of a computer system are dependent on the personnel involved. Improved personnel and organizational procedures can significantly reduce the potential for computer fraud. (Author/MLF)

  19. Input from Key Stakeholders in the National Security Technology Incubator

    SciTech Connect

    2008-01-31

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  20. Nevada National Security Site Groundwater Program

    ScienceCinema

    None

    2016-07-12

    From 1951 to 1992, the Unites States government conducted 828 underground nuclear tests at the Nevada National Security Site. About one-third of these tests occurred near, below or within the water table - the very top portion of the groundwater layer where rock and soil are completely saturated with water. As a result, some groundwater was contaminated. The U.S. Department of Energy (DOE) began exploring the effects of groundwater contamination in the 1970s. Though contamination from underground testing has never been detected on public land, the DOE was committed to developing an advanced, reliable monitoring network that ensures the long-term protection of the public. An intensive groundwater investigation program was launched in 1989.

  1. Nevada National Security Site Radiation Protection Program

    SciTech Connect

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  2. Nevada National Security Site Radiological Control Manual

    SciTech Connect

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  3. Neuroscience, Ethics, and National Security: The State of the Art

    PubMed Central

    Tennison, Michael N.; Moreno, Jonathan D.

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security. PMID:22448146

  4. Status of Educational Efforts in National Security Workforce

    SciTech Connect

    2008-03-31

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  5. Neuroscience, ethics, and national security: the state of the art.

    PubMed

    Tennison, Michael N; Moreno, Jonathan D

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  6. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-01

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office, National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held...

  7. The European Union’s Human Security Doctrine: A Critical Analysis

    DTIC Science & Technology

    2009-03-01

    These nations were Austria, Canada, Chile, Ireland, Jordan, the Netherlands, Norway, Slovenia, South Africa (participating only in the capacity of...a widely published author on Africa , have discussed human security especially, though not exclusively, as it pertains to Africa . They stipulate that...human security “ overpopulates an area that is already adequately addressed by state security, human development, and human rights initiatives, causing

  8. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-12

    ... RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY: Information Security Oversight Office, NARA. ACTION.... This correction assigns a Federal Docket Management System (FDMS) number to the proposed rule...

  9. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS THE OFFICE OF ENERGY RESEARCH FINANCIAL ASSISTANCE... the Office of Safeguards and Security for Headquarters awards, or from the cognizant field office Division of Safeguards and Security for awards obtained through DOE field organizations. Costs...

  10. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE COMPRESSION-IGNITION ENGINES Exclusion and Exemption Provisions § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is...) Manufacturers may request a national security exemption for any marine engine, otherwise subject to this...

  11. The Role of Information Technology in National Security Policy

    DTIC Science & Technology

    1994-01-01

    processes that add to the economic and military dimensions of national security. The model uses a " systems thinking " approach. It attempts to integrate...perspective on national security into a multidisciplinary and coherent body of theory and practice from a holistic " systems thinking " view.

  12. Arms Control and National Security: An Introduction. Advance Edition.

    ERIC Educational Resources Information Center

    Arms Control Association, Washington, DC.

    Suitable for use with high school students, this booklet on arms control and national security provides background information, describes basic concepts, reviews recent history, and offers suggestions for further reading. The first section, on American attitudes toward national security and arms control, defines five types of limits on weapons…

  13. 40 CFR 211.110-2 - National security exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 211.110-2 Section 211.110-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a)...

  14. 39 CFR 267.5 - National Security Information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide regulations implementing Executive...

  15. 40 CFR 204.5-2 - National security exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions. 204.5-2 Section 204.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT... national security exemption shall be void ab initio with respect to each new product, originally...

  16. 39 CFR 267.5 - National Security Information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Executive Order) which deals with the protection, handling and classification of national security.... (2) Derivative Classification means the carrying forward of a classification from one document to a... derivative classification of national security information in the custody of, and use by, the Postal...

  17. 75 FR 22151 - National Maritime Security Advisory Committee; Vacancies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-27

    .... Maritime Labor. International and Inter-modal Supply Chain. Maritime Hazardous Materials Handling/Shipping... National Maritime Security Advisory Committee (NMSAC). This Committee advises and makes recommendations on... makes recommendations to the Secretary on matters relating to national maritime security. Such...

  18. AVIATION SECURITY: Terrorist Acts Demonstrate Urgent Need to Improve Security at the Nation’s Airports

    DTIC Science & Technology

    2007-11-02

    what actually occurred or what all the weaknesses in the nation’s aviation security apparatus are that contributed to the horrendous events of last week...it is clear that serious weaknesses exist in our aviation security system and that their impact can be far more devastating than previously imagined...offer some observations about improving aviation security in these various areas.

  19. Nevada National Security Site Environmental Report 2010

    SciTech Connect

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  20. Human Security: Relevance and Implications

    DTIC Science & Technology

    2005-01-01

    Quarterly, 35 (March 1991), 3-17; Simon Dalby , “Contesting an Essential Concept: Reading the Dilemmas in Contemporary Social Discourse,” in Krause and...Core Curriculum,” p. 27. 37. Dalby , pp. 12-18. 38. Braden R. Allenby, “Environmental Security: Concept and Implementation,” International Political...Science Review, 21 (January 2000), 18-19; Dalby , pp. 15-18. 39. Kagan, pp. 27-42. 40. This has been attempted in efforts by Nef and MacLean (see notes 24

  1. Strategic Planning for National Security: A New Project Solarium

    DTIC Science & Technology

    2006-01-01

    effective strategic planning process for national security. Fifteen years after the Cold War, the United States still lacks a comprehensive interagency...articulate a set of national goals and objectives, it was not the product of serious strategic planning . More than 4 years after September 11, 2001...how the country will achieve its stated goals. Various institutions in the national security apparatus have attempted strategic planning , but these

  2. Design of the national health security preparedness index.

    PubMed

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  3. A deeper look at climate change and national security.

    SciTech Connect

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  4. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office, National Archives and Records... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...

  5. 75 FR 4894 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-29

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and... 31, 2009, National Securities Clearing Corporation (``NSCC'') filed with the Securities and...

  6. Wage and salary stabilization in a national security emergency

    SciTech Connect

    Not Available

    1984-10-01

    This guidance document provides the necessary information to State and local government leaders on their roles in their jurisdictions related to wage and salary stabilization (WSS)* during a national security emergency. The guidance covers the areas of policy, authority, and concept of operations for the emergency conditions of evacuation during an intense crisis prior to attack and post-attack recovery following a nuclear attack. The document provides the basis for improving the readiness of State and local jurisdictions for undertaking economic stabilization programs. Under the conditions of severe economic dislocation attendant to a national emergency that results in an attack on our nation, the primary objective of economic stabilization would be to maintain and protect the surviving economy as part of the overall effort directed toward national survival and recovery. Stabilization strategies would be applied to: financial and monetary systems; wages, salaries, and benefits; prices; rents; and rationing of essential goods. These measures are designed to maintain public confidence in the market and financial systems and their institutions so that general inflation can be controlled, scarce resources conserved, and the recovery effort supported so that the most efficient use is made of human material and capital resources to bring about national recovery as rapidly as possible.

  7. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a)...

  8. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a)...

  9. Climate Change: Implications for National Security and Strategy

    DTIC Science & Technology

    2011-11-02

    The  National  Security  Implications  of   Climate   Change       November  2,  2011   Climate Change : Implications for National Security and...00-00-2011 4. TITLE AND SUBTITLE Climate Change : Implications for National Security and Strategy 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c... Change       November  2,  2011   Climate Change : Part of the Strategic Landscape Enduring  trends  and  operational  challenges  will  shape

  10. External Service Providers to the National Security Technology Incubator

    SciTech Connect

    2008-02-28

    This report documents the identification and assessment of external service providers to the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant to Arrowhead Center, New Mexico State University. This report contains 1) a summary of the services to be provided by NSTI; 2) organizational descriptions of external service providers; and 3) a comparison of NSTI services and services offered by external providers.

  11. 75 FR 45152 - National Security Division: Agency Information Collection Activities: Proposed Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... National Security Division: Agency Information Collection Activities: Proposed Collection; Comments... (Foreign Agents). The Department of Justice (DOJ), National Security Division (NSD), will be submitting the... & Constitution Avenue, NW., National Security Division, Counterespionage Section/ Registration Unit,...

  12. Geo-Strategic Context: South Asia, A National Security Strategy

    DTIC Science & Technology

    1998-02-27

    ARCHIVE COPY NATIONAL DEFENSE UNIVERSITY NATIONAL WAR COLLEGE GEO-STRATEGIC CONTEXT SOUTH ASIA, A NATIONAL SECURITY STRATEGY MS Youngeun ... Anderson and Captain D Craig Wellmg/Class of 1998 Course 5604 Seminar I FACULTY SEMINAR LEADER CAPT J Kelso 27 February 1998 78-E-54 c-. I Report

  13. Expansion of National Security Agency Oversight Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. A Call for National Security System Transformation

    DTIC Science & Technology

    2012-06-01

    This interagency program is an integrated counter proliferation, counterterrorism, and illegal trafficking effort to help secure the Caspian Basin ...location of political and international leadership in Kabul shackled the integration of interagency efforts. This was eventually rectified with the

  15. The Superpowers: Nuclear Weapons and National Security. Teacher's Guide. National Issues Forums in the Classroom.

    ERIC Educational Resources Information Center

    Levy, Tedd

    This teacher's guide is designed to accompany the National Issues Forums'"The Superpowers: Nuclear Weapons and National Security." Activities and ideas are provided to challenge students to debate and discuss the United States-Soviet related issues of nuclear weapons and national security. The guide is divided into sections that…

  16. 75 FR 37253 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ... 2001.60 General. Subpart G--Security Education and Training 2001.70 General. 2001.71 Coverage. Subpart........... 5.4 2001.70 Security Education and Training, 5.4 General. 2001.71 Coverage 1.3(d), 2.1(d), 3.7(b), 4... the subject of a challenge or access demand pursuant to the Order or law. Sec. 2001.11...

  17. A Delicate Balance: National Security vs. Public Access

    DTIC Science & Technology

    2005-03-01

    AVAILABILITY STATEMENT Approved for Public Release; Distribution Unlimited 13. SUPPLEMENTARY NOTES: Published in Computers in Libraries , Vol.25 No. 3...security; in January 2004, is a how-to guide on gathering useful <, MARCH 2005 17 I COMPUTERS IN LIBRARIES feature: national security vs. public access

  18. A National Partnership for Careers in Public Safety and Security

    ERIC Educational Resources Information Center

    Coffee, Joseph

    2007-01-01

    A partnership of state, local and federal public safety agencies, secondary and postsecondary educational institutions, and professional and educational associations, the National Partnership for Careers in Law, Public Safety, Corrections and Security also serves as the lead organization for the Law, Public Safety, Corrections and Security Career…

  19. Strong Artificial Intelligence and National Security: Operational and Strategic Implications

    DTIC Science & Technology

    2015-05-18

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Strong Artificial Intelligence and National Security 5a...Prominent business and science leaders believe that technological advances will soon allow humankind to develop artificial intelligence (AI) that...its potential strategic pitfalls. 15. SUBJECT TERMS Artificial Intelligence 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT

  20. 40 CFR 211.110-2 - National security exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions. 211.110-2 Section 211.110-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE... security exemption shall be void ab initio with respect to each new product, originally intended for...

  1. National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook

    NASA Technical Reports Server (NTRS)

    Roback, E.

    1991-01-01

    The NASA Automated Information Security Handbook provides NASA's overall approach to automated information systems security including discussions of such aspects as: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers.

  2. Composing Alternatives to a National Security Language Policy

    ERIC Educational Resources Information Center

    Wible, Scott

    2009-01-01

    President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…

  3. Russian National Security Policy: Perceptions, Policies, and Prospects

    DTIC Science & Technology

    2001-07-01

    that policy in terms of factors influencing Russian national security policy formulation, Russia’s perceptions of the world and itself, current Russian...security and foreign policies in key regions of the world , and prospects for Russian interests and actions in the world and especially with regard to the United States.

  4. Analytical Chemistry for Homeland Defense and National Security

    SciTech Connect

    S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  5. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... contractor is required to report any of its activities in accordance with the U.S.-IAEA AP, the...

  6. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... contractor is required to report any of its activities in accordance with the U.S.-IAEA AP, the...

  7. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... contractor is required to report any of its activities in accordance with the U.S.-IAEA AP, the...

  8. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... contractor is required to report any of its activities in accordance with the U.S.-IAEA AP, the...

  9. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... contractor is required to report any of its activities in accordance with the U.S.-IAEA AP, the...

  10. The Risks that Foreign Labor Poses to UAE National Security

    DTIC Science & Technology

    2012-06-08

    AND SUBTITLE The Risks that Foreign Labor poses to UAE National Security 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6......69 viii APPENDIX C INTERNATIONAL CONVENTION FOR THE PROTECTION OF MIGRANT WORKERS’ RIGHTS

  11. U.S. National Security and Strategy: A Selected Bibliography

    DTIC Science & Technology

    2007-10-01

    National Security and the Threat of Climate Change . Alexandria: CNA Corpora- tion, 2007. 68pp. (UA23. N171 2007) http://securityandclimate.cna.org/report...2005) Schwartz, Peter, and Doug Randall. An Abrupt Climate Change Scenario and Its Implications for United States National Security. New York: Time...CSIS Press, 2004. 73pp. (DS79.76 .C567 2004) Cordesman, Anthony H., and Ionut C. Popescu. The Changing Challenges of U.S. Defense Spend- ing

  12. Economic Sanctions Targeting Yugoslavia - An Effective National Security Strategy Component

    DTIC Science & Technology

    2006-05-31

    USAWC STRATEGY RESEARCH PROJECT Economic Sanctions Targeting Yugoslavia – An Effective National Security Strategy Component by COL Charles J. Kacsur...Jr. U.S. Army Dr. Clayton K. S. Chun Project Advisor The views expressed in this academic research paper are those of the author and do not...National Security Strategy Component 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Charles Kacsur; 5d. PROJECT

  13. International migration: security concerns and human rights standards.

    PubMed

    Crépeau, François; Nakache, Delphine; Atak, Idil

    2007-09-01

    Over the last two decades, the reinforcement of security-related migration policies has resulted in the perception of the foreigner, and especially the irregular migrant, as a category outside the circle of legality. The rights of foreigners in host countries have deteriorated due to the connection made between immigration and criminality. Restrictions imposed upon irregular migrants' basic political and civil rights have been accompanied by major obstacles to their access to economic and social rights, including the right to health. The events of 9/11 further contributed to this trend, which contradicts the basic premises of the human rights paradigm. Recent policy developments and ongoing international cooperation implementing systematic interception and interdiction mechanisms have led to the securitization of migration. The preventive and deterrent measures reinforce the security paradigm. By contrast, various national and international actors have been successful in defending irregular migrants' rights. At the domestic level, the involvement of the judiciary and civil society enhances the rights-based approach to foreigners. The role of judges is vital in holding policy-makers accountable for respecting the high national standards of human rights protection. This article elaborates on the dichotomy between the state's legitimate interest to ensure national security, and its domestic and international obligations to protect human rights for all, including irregular migrants. It focuses on the changing relationship between migration and security, on the one hand, and between state and individual, on the other hand. It affirms the necessity to recognize the pre-eminence of fundamental rights upon security concerns.

  14. The importance of establishing a national health security preparedness index.

    PubMed

    Lumpkin, John R; Miller, Yoon K; Inglesby, Tom; Links, Jonathan M; Schwartz, Angela T; Slemp, Catherine C; Burhans, Robert L; Blumenstock, James; Khan, Ali S

    2013-03-01

    Natural disasters, infectious disease epidemics, terrorism, and major events like the nuclear incident at Fukushima all pose major potential challenges to public health and security. Events such as the anthrax letters of 2001, Hurricanes Katrina, Irene, and Sandy, severe acute respiratory syndrome (SARS) and West Nile virus outbreaks, and the 2009 H1N1 influenza pandemic have demonstrated that public health, emergency management, and national security efforts are interconnected. These and other events have increased the national resolve and the resources committed to improving the national health security infrastructure. However, as fiscal pressures force federal, state, and local governments to examine spending, there is a growing need to demonstrate both what the investment in public health preparedness has bought and where gaps remain in our nation's health security. To address these needs, the Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (PHPR), is creating an annual measure of health security and preparedness at the national and state levels: the National Health Security Preparedness Index (NHSPI).

  15. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... System DEPARTMENT OF COMMERCE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Security processing... favorable results. No national security material or documents shall be removed from a Department of...

  16. Welcome to Los Alamos National Laboratory: A premier national security science laboratory

    SciTech Connect

    Wallace, Terry

    2012-06-25

    Dr Wallace presents visitors with an overview of LANL's national security science mission: stockpile stewardship, protecting against the nuclear threat, and energy security & emerging threats, which are underpinned by excellence in science/technology/engineering capabilities. He shows visitors a general Lab overview of budget, staff, and facilities before providing a more in-depth look at recent Global Security accomplishments and current programs.

  17. Impacts of psychological science on national security agencies post-9/11.

    PubMed

    Brandon, Susan E

    2011-09-01

    Psychologists have been an integral part of national security agencies since World War I, when psychological science helped in personnel selection. A robust infrastructure supporting wider applications of psychology to military and intelligence problems developed further during World War II and the years following, primarily in the areas of testing, human factors, perception, and the decision sciences. Although the nature of the attacks on 9/11 raised the level of perceived need for increased human-based intelligence, the impacts of psychologists on the policies and practices of national security agencies in the decade since have not increased significantly.

  18. Classified Component Disposal at the Nevada National Security Site

    SciTech Connect

    Poling, J.; Arnold, P.; Saad, M.; DiSanza, F.; Cabble, K.

    2012-11-05

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012.

  19. Enhancing Nutrition Security via India's National Food Security Act: Using an Axe instead of a Scalpel?

    PubMed

    Desai, Sonalde; Vanneman, Reeve

    2015-08-05

    In September 2013, India passed a historic National Food Security Act. This paper examines the potential impact of the two central pillars of this act - expansion of the Public Distribution System and strengthening of the Integrated Child Development Schemes - on child nutrition. Using new data from the India Human Development Survey of 2011-12, this paper shows that access to subsidized grains via PDS is not related to improved child nutrition, and while ICDS seems to be related to lower child undernutrition, it has a limited reach in spite of the universalization of the program. The paper suggests that a tiered strategy in dealing with child undernutrition that starts with the identification of undernourished children and districts and follows through with different strategies for dealing with severe, acute malnutrition, followed by a focus on moderate malnutrition, could be more effective than the existing focus on cereal distribution rooted in the NFSA.

  20. Affairs of State: The Interagency and National Security

    DTIC Science & Technology

    2008-12-01

    budgeting, humanitarian assistance, peace operations, counternarcotics, counterterrorism, security assistance, 43 environmental security, human rights ... rights , and protection of the environment. American capital, technology, and culture influence the globe. American power and influence is pervasive... right , in getting all the agencies in Washington, DC, and in the field to work relatively well in integrating their respective contributions

  1. The Impact of National Debt on U.S. National Security

    DTIC Science & Technology

    2011-05-29

    Pr og ra m R es ea rc h Pr oj ec t THE IMPACT OF NATIONAL DEBT ON U.S. NATIONAL SECURITY BY COLONEL MARTIN L. BLANK United States Army...DISTRIBUTION STATEMENT A: Approved for Public Release. Distribution is Unlimited. This PRP is submitted in partial fulfillment of the...DATES COVERED (From - To) 4. TITLE AND SUBTITLE The Impact of National Debt on U.S. National Security 5a. CONTRACT NUMBER 5b. GRANT

  2. After Iraq: The Search for a Sustainable National Security Strategy

    DTIC Science & Technology

    2009-01-01

    or cunningly applied economic coercion may remove need for the spilling of blood . However, since national security strategy has the military...great issues between nations at war have always been decided—except in the rarest of cases—either by what your army can do against your enemy’s

  3. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  4. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  5. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 25 2014-07-01 2014-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  6. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 26 2012-07-01 2011-07-01 true National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  7. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  8. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false National security-classified information. 1256.46 Section 1256.46 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE ACCESS TO RECORDS AND DONATED HISTORICAL MATERIALS...

  9. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false National security-classified information. 1256.46 Section 1256.46 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE ACCESS TO RECORDS AND DONATED HISTORICAL MATERIALS General Restrictions § 1256.46...

  10. Risk assessment of climate systems for national security.

    SciTech Connect

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul G; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  11. Marketing Plan for the National Security Technology Incubator

    SciTech Connect

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  12. 77 FR 41837 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-16

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and... is hereby given that on June 28, 2012, National Securities Clearing Corporation (``NSCC'') filed...

  13. 75 FR 39721 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-12

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and... is hereby given that on June 11, 2010, the National Securities Clearing Corporation (``NSCC'')...

  14. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security Division; interpretation of Executive Orders. (a) The Assistant Attorney General for National Security or...

  15. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of...

  16. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of...

  17. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of...

  18. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security Division; interpretation of Executive Orders. (a) The Assistant Attorney General for National Security or...

  19. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security Division; interpretation of Executive Orders. (a) The Assistant Attorney General for National Security or...

  20. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security Division; interpretation of Executive Orders. (a) The Assistant Attorney General for National Security or...

  1. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of...

  2. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security Division; interpretation of Executive Orders. (a) The Assistant Attorney General for National Security or...

  3. A National Climate Change Adaptation Network for Protecting Water Security

    NASA Astrophysics Data System (ADS)

    Weaver, A.; Sauchyn, D.; Byrne, J. M.

    2009-12-01

    Water security and resource-dependent community-survival are being increasingly challenged as a consequence of climate change, and it is urgent that we plan now for the security of our water supplies which support our lives and livelihoods. However, the range of impacts of climate change on water availability, and the consequent environmental and human adaptations that are required, is so complex and serious that it will take the combined work of natural, health and social scientists working with industries and communities to solve them. Networks are needed that will identify crucial water issues under climate change at a range of scales in order to provide regionally-sensitive, solutions-oriented research and adaptation. We suggest national and supra-national water availability and community sustainability issues must be addressed by multidisciplinary research and adaptation networks. The work must be driven by a bottom-up research paradigm — science in the service of community and governance. We suggest that interdisciplinary teams of researchers, in partnership with community decision makers and local industries, are the best means to develop solutions as communities attempt to address future water demands, protect their homes from infrastructure damage, and meet their food, drinking water, and other essential resource requirements. The intention is to cover: the impact of climate change on Canadian natural resources, both marine and terrestrial; issues of long-term sustainability and resilience in human communities and the environments in which they are embedded; the making and moving of knowledge, be that between members of Indigenous and non-Indigenous communities, researchers of different disciplines, communities, industry, policymakers and the academy and the crucial involvement of the various orders of government in the response to water problems, under conditions of heightened uncertainty. Such an adaptation network must include a national

  4. Independent Assessment of the Afghan National Security Forces

    DTIC Science & Technology

    2014-02-01

    on-scene commander, the legal authority to quickly redirect resources within the central fund from one program element to another based on real-time... based analyses are hallmarks of our regional work. This report contains the best opinion of CNA at the time of issue. It does not necessarily...national security forces stand in formation after the flag-raising ceremo- ny that established Security Base Najil in the Alishang Valley of Laghman

  5. Neutron Detection Alternatives to 3He for National Security Applications

    SciTech Connect

    Kouzes, Richard T.; Ely, James H.; Erikson, Luke E.; Kernan, Warnick J.; Lintereur, Azaree T.; Siciliano, Edward R.; Stephens, Daniel L.; Stromswold, David C.; Van Ginhoven, Renee M.; Woodring, Mitchell L.

    2010-11-21

    One of the main uses for 3He is in gas proportional counters for neutron detection. Large radiation detection systems deployed for homeland security and proliferation detection applications use such systems. Due to the large increase in use of 3He for homeland security and basic research, the supply has dwindled, and can no longer meet the demand. This has led to the search for an alternative technology to replace the use of 3He-based neutron detectors. In this paper, we review the testing of currently commercially available alternative technologies for neutron detection in large systems used in various national security applications.

  6. American National Security and the Comprehensive Test Ban Treaty (Invited)

    NASA Astrophysics Data System (ADS)

    Gottemoeller, R.

    2013-12-01

    Acting Under Secretary of Arms Control and International Security Rose Gottemoeller will discuss the importance of the Comprehensive Test Ban Treaty (CTBT) and how, upon its entry into force, it will contribute to American national security, as well as international security. She will outline the technological changes over the past decade, both with verification improvements and nuclear stockpile management. Acting Under Secretary Gottemoeller will also highlight the potential for 21st century technology to strengthen the CTBT, including discussion of how technological innovation can modernize verification and monitoring of nuclear testing worldwide.

  7. Economic Conflict and National Security Research

    DTIC Science & Technology

    1977-02-22

    infectious diseases or cancer can have epidemological consequences that go beyond national boundaries. The recent attention to DNA research in America...claims "it doesn’t have the time" is merely asserting, with a kind of childish petulance, that it Im- atiently wants the fruits of economic growth n

  8. Rand National Security Division Annual Report 2006

    DTIC Science & Technology

    2007-01-01

    psychological dimensions. But in contrast to the Cold War, the current bat- tle involves shadowy groups, not a single entity. The Soviet Union was a nation...Partner, Perkins Coie LLP Eugene Rosenfeld President, ForestLane Group Lenny Sands President & CEO, Alchemy Worldwide, LLC Michael J. Shockro

  9. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 2 2014-10-01 2014-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS SPECIAL PROGRAMS AND PROJECTS...

  10. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    ERIC Educational Resources Information Center

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  11. National security and the comprehensive test ban treaty

    SciTech Connect

    Landauer, J.K.

    1980-08-01

    For nearly three years now, the US, UK, and USSR have been working on the draft of a treaty that would ban all nuclear explosions (both peaceful applications and weapon tests) and institute verification and monitoring provisions to ensure compliance with the treaty. The status of the draft treaty is summarized. The question, Is a CTBT really in the interest of US national security. is analyzed with arguments used by both proponents and opponents of the CTBT. It is concluded that there are arguments both for and against a CTBT, but, for those whose approach to national security can be expressed as peace through preparedness, the arguments against a CTBT appear persuasive. (LCL)

  12. The Intersection of National Security and Climate Change

    SciTech Connect

    Hund, Gretchen; Fankhauser, Jana G.; Kurzrok, Andrew J.; Sandusky, Jessica A.

    2014-07-29

    On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.

  13. The National Security Strategy of the United Kingdom: Security in an Interdependent World

    DTIC Science & Technology

    2008-03-01

    changes and globalisation . 1.4 The aim of this first National Security Strategy is to set out how we will address and manage this diverse though...also, crucially, greater legitimacy. And just as globalisation exacerbates the challenges, it also creates new opportunities for a multilateral...a world where globalisation can exacerbate domestic security challenges, but also bring new opportunities to tackle them. Similarly, the

  14. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    DTIC Science & Technology

    2015-09-01

    seem too complex to understand so policy makers do not make any decisions to change for fear of adverse impacts. Current policies often lean towards ...ES, HS, and NS because I want to understand how they affect one another in order to improve homeland security policy development and decision making ...happens when countries are not able to make political decisions because of economic encumbrances? In “Genuine National Security: A People’s

  15. International Competitiveness: A National Security Perspective

    DTIC Science & Technology

    1989-06-01

    49 National IndustrialfTechnological Policy ................... 49 Abandoning the "Not-Invented-Here" Syndrome ............... 49 Conclusions...industry h:s cha uuet lratnalically over tlie years,. the US industry. Even though the overall demand for In 19(0 1)OD wa the nl’t.ty’s most...busincss. So while independent spirit and preference for a market-driven the United States cries about unfair practices of the economy. Of course

  16. Environmental Degradation: Implications for National Security

    DTIC Science & Technology

    1990-03-30

    and increased evaporation) through dams constructed by upstream riparian countries, water diversion, industrial and agrochemical pol]ution, salinization ...dire urban problems.35 Perhaps the best (worst?) example of this situation occurred in the Sahel region of Africa which is suffering acutely from...Desertification of the Sahel in Africa has driven hundreds of thousands of people across national boundaries. The critical role of water, and the competition

  17. The National Strategy to Secure Cyberspace

    DTIC Science & Technology

    2003-02-01

    became vulnerable to attacks from aircraft and missiles for the first time. The federal government responded by creating a national system to: monitor...attempt to slow the U.S. military response by disrupting systems of the Department of Defense (DoD), the Intelligence Community, and other government ...Work Unit Number Performing Organization Name(s) and Address(es) The White House Washington, DC Performing Organization Report Number Sponsoring

  18. National Security Policy on Government Secrecy

    DTIC Science & Technology

    2007-11-02

    prevailed as a political issue. 6 The Watergate scandal caused the downfall of Nixon , leaving President Gerald Ford to help the nation recover its...pressure President Richard Nixon relaxed the requirements of the classification system by issuing EO 11652 on March 8, 1972. The directive reduced further...confidence in government. In the wake of Watergate the public pushed for greater awareness of government activities with emphasis on truthful information

  19. Nevada National Security Site Environmental Report 2011 Summary

    SciTech Connect

    Cathy Wills, ed

    2012-09-12

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  20. 17 CFR 240.11a1-4(T) - Bond transactions on national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Bond transactions on national securities exchanges. 240.11a1-4(T) Section 240.11a1-4(T) Commodity and Securities Exchanges SECURITIES AND....11a1-4(T) Bond transactions on national securities exchanges. A transaction in a bond, note,...

  1. Guide to National Security Policy and Strategy

    DTIC Science & Technology

    2006-06-01

    objects of attack in war and others are not. All recognized that there were times, seasons, and religious festivals during which warfare would be...as an agent of good for all humanity. 172 ENDNOTES - CHAPTER 12 1. Miyamoto Musashi, The Book of Five Rings, Victor Harris, trans., Woodstock , NY

  2. Observations on Ecology and National Security

    DTIC Science & Technology

    1975-03-01

    Ricnard Raymond,33 Mortimer Ostow,31* and Heinz von Foerster.’𔃿 From the work of these and others, ever, an ethical prin- ciple fox aa ecologically wise...Sapiens, including human physiology, genetics, embryology , evolution, psychuiogy, and sociology. Others use it in a much more narrow sense, although

  3. 75 FR 45150 - National Security Division: Agency Information Collection Activities: Proposed Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... National Security Division: Agency Information Collection Activities: Proposed Collection; Comments... Agents). The Department of Justice (DOJ), National Security Division (NSD), will be submitting the... information, please write to U.S. Department of ] Justice, 10th & Constitution Avenue, NW., National...

  4. 75 FR 45153 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... National Security Division; Agency Information Collection Activities: Proposed Collection; Comments... Agents). The Department of Justice (DOJ), National Security Division (NSD), will be submitting the... information, please write to U.S. Department of Justice, 10th & Constitution Avenue, NW., National...

  5. Negotiable Collateral Damage: Civil Liberties Versus National Security in Times of Threat

    DTIC Science & Technology

    2011-06-01

    civil liberties and national defense has changed as the threat has shifted, and also illustrates the differences in response between the two...rarely changes due to threats to national security; thus, this study does not reference this issue. 7 A. H. Maslow, "A Theory of Human Motivation...different, the strategic context of American society also changed . However, there are significant similarities to draw some general conclusions

  6. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  7. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  8. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  9. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  10. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  11. AIDS and international security in the United Nations System.

    PubMed

    Rushton, Simon

    2010-11-01

    Two assumptions underpin much of the literature that has examined the links between HIV/AIDS and security: (1) that HIV/AIDS is now firmly established as an international security issue; and (2) that Resolution 1308, adopted by the UN Security Council in July 2000, was the decisive moment in the securitization process. This article questions both of those assumptions. It argues that even within the Security Council, HIV/AIDS' status as a bona fide threat to international peace and security is not entirely secure. Despite the fact that the Resolution was adopted unanimously, there is considerable doubt over the extent to which the Council members were persuaded that HIV/AIDS is genuinely a threat to international peace and security. Furthermore, the Council's subsequent actions suggest a retreat from the issue. The article moves on to examine statements made in and by some of the other key UN System bodies grappling with HIV/AIDS. Focusing in particular on the General Assembly, the Economic and Social Council and UNAIDS, it is argued that the international security framing of HIV/AIDS has not generally achieved a great deal of traction within these bodies. Alternative framings, in particular international development and human rights, occur far more frequently. This raises issues for our understanding of both securitization theory and the global governance of HIV/AIDS.

  12. Global Warming, Africa and National Security

    DTIC Science & Technology

    2008-01-15

    producers reduce their total emissions. As a result of its environmental impact, climate change can act as a threat multiplier for instability in some...should plan to support and mitigate environmental challenges and possible crises exacerbated by the phenomenon. Climate Change History The...series of major reports on the human factors affecting climate change. Highlighting the growing importance of climate change, the IPCC shared the 2007

  13. 17 CFR 249.10 - Form 1-N for notice registration as a national securities exchange.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... registration as a national securities exchange. 249.10 Section 249.10 Commodity and Securities Exchanges... or Exemption of, and Notification of Action Taken by, National Securities Exchanges § 249.10 Form 1-N for notice registration as a national securities exchange. This form shall be used for notice,...

  14. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Access to matter classified as National Security... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data....

  15. 76 FR 62439 - Order of Succession for the Office of Disaster Management and National Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-07

    ... URBAN DEVELOPMENT Order of Succession for the Office of Disaster Management and National Security AGENCY... Security Officer, Office of Disaster Management and National Security, Department of Housing and Urban... functions and duties of the Chief Disaster and National Security Officer, Office of Disaster Management...

  16. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Access to matter classified as National Security... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data....

  17. 17 CFR 249.10 - Form 1-N for notice registration as a national securities exchange.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... registration as a national securities exchange. 249.10 Section 249.10 Commodity and Securities Exchanges... or Exemption of, and Notification of Action Taken by, National Securities Exchanges § 249.10 Form 1-N for notice registration as a national securities exchange. This form shall be used for notice,...

  18. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Protection of National Security Information and Restricted... CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Physical Security § 95.25 Protection of National Security Information and Restricted Data in storage. (a) Secret matter,...

  19. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... imports on the national security. 705.4 Section 705.4 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.4...

  20. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Access to matter classified as National Security... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data....

  1. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Protection of National Security Information and Restricted... CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Physical Security § 95.25 Protection of National Security Information and Restricted Data in storage. (a) Secret matter,...

  2. 17 CFR 249.10 - Form 1-N for notice registration as a national securities exchange.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... registration as a national securities exchange. 249.10 Section 249.10 Commodity and Securities Exchanges... or Exemption of, and Notification of Action Taken by, National Securities Exchanges § 249.10 Form 1-N for notice registration as a national securities exchange. This form shall be used for notice,...

  3. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Protection of National Security Information and Restricted... CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Physical Security § 95.25 Protection of National Security Information and Restricted Data in storage. (a) Secret matter,...

  4. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... imports on the national security. 705.4 Section 705.4 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.4...

  5. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Access to matter classified as National Security... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data....

  6. 17 CFR 249.10 - Form 1-N for notice registration as a national securities exchange.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... registration as a national securities exchange. 249.10 Section 249.10 Commodity and Securities Exchanges... or Exemption of, and Notification of Action Taken by, National Securities Exchanges § 249.10 Form 1-N for notice registration as a national securities exchange. This form shall be used for notice,...

  7. 17 CFR 249.10 - Form 1-N for notice registration as a national securities exchange.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... registration as a national securities exchange. 249.10 Section 249.10 Commodity and Securities Exchanges... or Exemption of, and Notification of Action Taken by, National Securities Exchanges § 249.10 Form 1-N for notice registration as a national securities exchange. This form shall be used for notice,...

  8. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... imports on the national security. 705.4 Section 705.4 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.4...

  9. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-09

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on July...

  10. Security and Privacy Preservation in Human-Involved Networks

    NASA Astrophysics Data System (ADS)

    Asher, Craig; Aumasson, Jean-Philippe; Phan, Raphael C.-W.

    This paper discusses security within human-involved networks, with a focus on social networking services (SNS). We argue that more secure networks could be designed using semi-formal security models inspired from cryptography, as well as notions like that of ceremony, which exploits human-specific abilities and psychology to assist creating more secure protocols. We illustrate some of our ideas with the example of the SNS Facebook.

  11. National Security and Information Technology: The New Regulatory Option?

    ERIC Educational Resources Information Center

    Irwin, Manley R.

    1987-01-01

    Summarizes recent developments in information technology research and development, telecommunication services, telephone manufacturing, telecommunication networks, information processing, and U.S. import/export policy. It is concluded that government regulation as a policy strategy depends on how one defines national security. (Author/CLB)

  12. Academics and National-Security Experts Must Work Together

    ERIC Educational Resources Information Center

    Gansler, Jacques S.; Gast, Alice P.

    2008-01-01

    In the years since the September 11, 2001, terrorist attacks, the federal government's policies that deal with national security have changed significantly. In an effort to prevent the results of science and engineering research from being misused or falling into the wrong hands, government agencies that support studies are placing restrictions on…

  13. Federal Restrictions on Research: Academic Freedom and National Security.

    ERIC Educational Resources Information Center

    Rosenbaum, Robert A.; And Others

    1982-01-01

    The American Association of University Professors' Committee A on Academic Freedom and Tenure reports on potential problems and concerns in government regulation of research opportunities, methods, and use of research results. Federal actions, campus responses to these actions, and the relationship of academic freedom and national security are…

  14. Achieving Youth Employment and National Security in Nigeria: TVET Imperatives

    ERIC Educational Resources Information Center

    Ogbuanya, T. C.; Ofonmbuk, Michael

    2015-01-01

    The rate of unemployment in Nigeria is alarming and could promote social vices some of which are kidnapping, armed robbery, child trafficking, Cultism, Drug peddling and ritual killing. These social vices could in no small measure constitute a threat to national security as a matter of fact. Therefore, the development of a workable Technical and…

  15. National Security Council of Mongolia- Promoting Civil-Military Relations

    DTIC Science & Technology

    2004-03-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited NATIONAL SECURITY...COUNCIL OF MONGOLIA- PROMOTING CIVIL-MILITARY RELATIONS by Khasbazaryn Boldbat March 2004 Thesis Advisor: Lyman H. Miller Second Reader...REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour

  16. Semiconductor Technology and U.S. National Security

    DTIC Science & Technology

    2010-04-21

    international community to a nation that ―is focused not on the world but on itself.Ŝ While China’s efforts to expand its economic and military strengths are...26, 2009) 39 Lieberman, 5. 40 Department of Commerce Home Page, http://www.osec.doc.gov/ omo /dmp/default. 41 Bureau of Industry and Security

  17. Thinking Different about U.S. National Security

    DTIC Science & Technology

    2011-04-18

    the list of threats: wars over religious, ethnic, and tribal identity, inequality and economic instability, damage to the environment, food ... insecurity , and dangers to public health. Barak Obama, National Security Strategy, Washington, D.C., The White House, May 2010, 1. iv. 2010 Quadrennial

  18. Economic Factors of Japan’s National Security Policy

    DTIC Science & Technology

    1988-06-01

    security, the rates of domestic consumption, trade balances , overseas investment, and technology development have become tests of bilateral cooperation... balances , overseas investment, and technology development have become tests of bilateral cooperation. Domestic demand, capital formation, trade and...the policy were: * Balance the nation’s budget * Strengthen the tax collection process * Limit Reconstruction Finance Bank (RFB) loans * Improve

  19. Components of a Course on National Security Policy.

    ERIC Educational Resources Information Center

    Quester, George H.

    1987-01-01

    Describes the components of a course on the formation of national security policy. Includes information on the amount of emphasis and instructional approach to take with each component of the course. Components include the nature of strategy, the role of war in international politics, disarmament and arms control, nuclear weapons and nuclear war,…

  20. Identifying the Enemy: Social Categorization and National Security Policy

    ERIC Educational Resources Information Center

    Unsworth, Kristene

    2010-01-01

    This dissertation seeks to understand the interplay between informal articulations of social categories and formal instantiations of those categories in official language. Specifically, it explores the process of social categorization as it is used to identify threats to national security. The research employed a qualitative, document-based,…

  1. The National Security Language Initiative and the Teaching of Hindi

    ERIC Educational Resources Information Center

    Shinge, Manjula

    2008-01-01

    This article discusses the teaching of Hindi in the USA, with special reference to the National Security Language Initiative (NSLI). Asian Indian languages are briefly described, as are the growth and diversification of the Asian Indian population in the USA. The inclusion of Hindi in the NSLI, and the implications of this decision for the…

  2. United States Homeland Security and National Biometric Identification

    DTIC Science & Technology

    2002-04-09

    IMPORTANCE OF AMERICA’S FREEDOMS AND HOMELAND SECURITY: ................... 1 W HAT IS A BIO M ETRIC...2 W AYS/M EANS O F BIO M ETRICS...9 THE DEPARTMENT OF DEFENSE’S ROLE IN NATIONAL IDENTIFICATION AND BIO M ETRICS

  3. Recent Advances in Infrasound Science for National Security Applications

    NASA Astrophysics Data System (ADS)

    Arrowsmith, S.; Blom, P. S.; Marcillo, O. E.; Whitaker, R. W.

    2014-12-01

    Infrasound is sound below the frequency-threshold of human hearing, covering the frequency range from 0.01 - 20 Hz. Infrasound science studies the generation, propagation, measurement, and analysis of infrasound. Sources of infrasound include a wide variety of energetic natural and manmade phenomena that include chemical and nuclear explosions, rockets and missiles, and aircraft. The dominant factors influencing the propagation of infrasound are the spatial and temporal variations in temperature, wind speed, and wind direction. In recent years, Infrasound Science has experienced a renaissance due to the installation of an international monitoring system of 60 infrasound arrays for monitoring the Comprehensive Nuclear Test Ban Treaty, and to the demonstrated value of regional infrasound networks for both scientific and applied purposes. Furthermore, in the past decade, significant advances have been made on using measurements of infrasound to invert for these properties of the atmosphere at altitudes where alternative measurement techniques are extremely costly. This presentation provides a review of recent advances in infrasound science as relevant to National Security applications.

  4. Malaysia’s Participation in a United Nations Standing Force: A Question of National Security

    DTIC Science & Technology

    2007-11-02

    Amali bin Ahmad, Malaysian Army, 76 pages This thesis investigates whether Malaysia , as a small state, should participate in a United Nations (UN...many parties. In analyzing whether Malaysia should participate in a UN standing force, this paper explores the concept of comprehensive security to...implemented by Malaysia as its national security strategy, participation in a UN standing force would incur substantially more cost and pose greater risks to

  5. Department of Energy award DE-SC0004164 Climate and National Security: Securing Better Forecasts

    SciTech Connect

    Reno Harnish

    2011-08-16

    The Climate and National Security: Securing Better Forecasts symposium was attended by senior policy makers and distinguished scientists. The juxtaposition of these communities was creative and fruitful. They acknowledged they were speaking past each other. Scientists were urged to tell policy makers about even improbable outcomes while articulating clearly the uncertainties around the outcomes. As one policy maker put it, we are accustomed to making these types of decisions. These points were captured clearly in an article that appeared on the New York Times website and can be found with other conference materials most easily on our website, www.scripps.ucsd.edu/cens/. The symposium, generously supported by the NOAA/JIMO, benefitted the public by promoting scientifically informed decision making and by the transmission of objective information regarding climate change and national security.

  6. National Character vs. National Security: Conflict in the Making?

    DTIC Science & Technology

    2011-03-01

    Reformulation,” The Journal of Conflict Resolution 14, no. 2 (June 1970): 205, in JSTOR (accessed September 29, 2010). 7 Erik D. Aker, “The American...International Relations,” Background 6, no. 1-3 (Autumn 1962): 44, in JSTOR (accessed September 29, 2010). 19 Terhune, “From National Character,” 260

  7. National Security Letters, the USA PATRIOT Act, and the Constitution: The Tensions between National Security and Civil Rights

    ERIC Educational Resources Information Center

    Gorham-Oscilowski, Ursula; Jaeger, Paul T.

    2008-01-01

    In response to the terrorist attacks of 9/11, the USA PATRIOT Act greatly expanded the ability of the Federal Bureau of Investigation to use National Security Letters (NSLs) in investigations and the contexts in which they could be used by relaxing the standards under which NSLs could be employed. NSLs allow investigators to acquire a significant…

  8. Coordinating UAV information for executing national security-oriented collaboration

    NASA Astrophysics Data System (ADS)

    Isenor, Anthony W.; Allard, Yannick; Lapinski, Anna-Liesa S.; Demers, Hugues; Radulescu, Dan

    2014-10-01

    Unmanned Aerial Vehicles (UAVs) are being used by numerous nations for defence-related missions. In some cases, the UAV is considered a cost-effective means to acquire data such as imagery over a location or object. Considering Canada's geographic expanse, UAVs are also being suggested as a potential platform for use in surveillance of remote areas, such as northern Canada. However, such activities are typically associated with security as opposed to defence. The use of a defence platform for security activities introduces the issue of information exchange between the defence and security communities and their software applications. This paper explores the flow of information from the system used by the UAVs employed by the Royal Canadian Navy. Multiple computers are setup, each with the information system used by the UAVs, including appropriate communication between the systems. Simulated data that may be expected from a typical maritime UAV mission is then fed into the information system. The information structures common to the Canadian security community are then used to store and transfer the simulated data. The resulting data flow from the defence-oriented UAV system to the security-oriented information structure is then displayed using an open source geospatial application. Use of the information structures and applications relevant to the security community avoids the distribution restrictions often associated with defence-specific applications.

  9. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... National Security Information § 2.907 Notice of intent to introduce restricted data or national security... be impracticable for it to avoid the introduction of Restricted Data or National Security Information into the proceeding, it will file a notice of intent to introduce Restricted Data or National...

  10. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national... National Security Information in accordance with the applicable provisions of laws of the United States...

  11. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national... National Security Information in accordance with the applicable provisions of laws of the United States...

  12. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... National Security Information § 2.907 Notice of intent to introduce restricted data or national security... be impracticable for it to avoid the introduction of Restricted Data or National Security Information into the proceeding, it will file a notice of intent to introduce Restricted Data or National...

  13. A 21st Century Science, Technology, and Innovation Strategy for Americas National Security

    DTIC Science & Technology

    2016-05-01

    aspects of national security. With guidance from the President and Congress, strategic direction and investment priorities for national security science ...interconnected, fast- evolving science and technology landscape that presents new threats and opportunities, the policy directions called for in this...A 21ST CENTURY SCIENCE , TECHNOLOGY, AND INNOVATION STRATEGY FOR AMERICA’S NATIONAL SECURITY PRODUCT OF THE Committee on Homeland and National

  14. United States national security policy making and Vietnam

    SciTech Connect

    Davidson, M.W.

    1985-01-01

    The United States failed to achieve its goals in waging a war in Vietnam. This thesis endeavors to show that this failure was due to errors in the formulation of American national security policy regarding Vietnam. The policy making process went astray, at least in part, due to a narrowing of the role of senior military officers as national security policy makers. The restricted role of senior officers as national security policy makers adversely affected American policy formulation regarding Vietnam. The United States response to the coup against Diem in 1963 and the deployment of conventional American forces to ground combat in Vietnam, in 1965 were undertaken without a clear recognition of the considerable costs of the commitments being assumed. Senior military officers had prompted such a recognition in similar previous crises but were not in a policy making position to do so concerning Vietnam. The policymaking input that was absent was ethical counsel of a fundamental nature. Clausewitz viewed the mortality of a war as being embodied in the national will to fight that war. The absence of an accurate appreciation of the costs of a military solution in Vietnam denied civilian officials a critical policy making factor and contributed significantly to the defeat of the American purpose there.

  15. National Security Report: Background and Perspective on Important National Security and Defense Policy Issues. Volume 2, Issue 2, April 1998. Sales or Security? Supercomputers and Export Controls

    DTIC Science & Technology

    1998-04-01

    2 Chairman, House National Security Committee April 1998 Fromthe Chairman- Sales or Security? Supercomputers and Export Controls ilk)9o oil V e... military purposes, in Rus- fltJ Administatiii’ý’iclaxation of ers were inappropriately shipped without sia, China, and other countries ofprolifera- erc i...exuit controls. Under the required export licenses to military -re- tion concern. This shifted the burden of ~t i laxedpolicy the Administation did

  16. The Indian National Food Security Act, 2013: a commentary.

    PubMed

    Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura

    2014-06-01

    The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level.

  17. Improved safeguards and security of a national resource

    SciTech Connect

    Zack, N.R.; Hunteman, W.J.; Rinard, P.M.; Metzler, J.F.; Jaeger, C.D.

    1994-07-01

    Initiatives by the President and the Secretary of Energy to reduce the quantity of nuclear materials in the nation`s strategic reserve are increasing the quantity of materials to be held in long-term storage until a final disposition option is imposed. These excess materials will be available for third-party inspection and verification to provide assurance that declared materials are not being diverted for weapons production. These protection systems must be capable of detecting unauthorized attempts to gain access to or control of the materials and information. Facility designs can incorporate new concepts and techniques that will minimize impact on operations and significantly reduce lifetime operational and infrastructure costs from safeguards and security requirements. The safeguards and security systems will be coupled with other facility systems such as safety, emergency preparedness, and process control to enhance public, worker, and environmental protection; protect nuclear materials, related information, and technology; and mitigate or prevent accidents and sabotage involving the nuclear materials. This paper will discuss the application of proven, state-of-the-art safeguards, physical security, computer/information security, and materials assay systems that can be combined to provide a cost-effective, efficient means for monitoring and protecting these materials.

  18. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-25

    ... open to the public. However, due to space limitations and access procedures, the name and telephone... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program...

  19. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-25

    ... open to the public. However, due to space limitations and access procedures, the name and telephone... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program...

  20. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    .... SUPPLEMENTARY INFORMATION: This meeting will be open to the public. However, due to space limitations and access... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program...

  1. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-01

    ... open to the public. However, due to space limitations and access procedures, the name and telephone... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program...

  2. Arms Control and National Security: Revealed through Two Case Studies

    DTIC Science & Technology

    1988-03-01

    Often, in a democratic society these watered down compromises, as they deal with arms control, fail to support arms control or national ’ 4 security...United States has made some progress in this area. Several years ago it was recognized that the communications systems were not as survivable against...defensive system. Today, SDI promises to do what was envisioned years 0 ago , that of reducing the worth of offensive weapons * .. and hopefully as a

  3. The Next EFV: Aligning Marine Corps Capabilities With National Security

    DTIC Science & Technology

    2011-05-09

    currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 09-05-2011 2. REPORT TYPE...addresses national security goals of countering the hybrid threat or supporting partner capacity-building. Hovercrafts can project power from the seas by...armament, or range. The proven hovercraft such as the commercial-off-the-shelf EPS M10, if retrofitted with modern weaponry, is the ideal

  4. Medical Diplomacy: A Tool for Enabling National Security Strategy Objectives

    DTIC Science & Technology

    2012-04-06

    REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of Information Is estimated to...information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ORGANIZATION. 1. REPORT DATE (DD-MM...SUBJECT TERMS Medical Diplomacy, National Security Strategy, Health Service Support ( HSS ), HSS Doctrine, HSS Engagement Programs, Global Health

  5. Understanding Law Enforcement Support to National Security Problems and Prospects

    DTIC Science & Technology

    2008-04-04

    National Strategy for Homeland Security Many of the threats we face – pandemic diseases , the proliferation of weapons of...ii-iii. 131 DOJ, FY 2007-2012 Strategic Plan, 48. 132 USMS, “DOJ Press Release - August 11, 2007,” http://www.usdoj.gov/marshals/news/ chron ...Service (ICS). Source: Data from DOJ, “DOJ Press Release - August 11, 2007,” http://www.usdoj.gov/marshals/news/ chron /2007/081107.htm (accessed

  6. Terrorism: National Security Policy and the Home Front.

    DTIC Science & Technology

    1995-05-15

    oil companies from trading Iranian oil ...opinion shapes foreign policy and national security strategy. The starkest venue for this relationship is terrorism on U.S. soil. Admittedly, not all...Director of Research Dr. Earl H. Tilford, Jr. Editor Dr. Stephen C. Pelletiere Institute Editor Mrs. Marianne P. Cowling Secretary Ms. Rita A. Rummel ***** Composition Mrs. Mary Jane Semple Cover Artist Mr. James E. Kistler

  7. A brief history of Sandia's National security missions.

    SciTech Connect

    Drewien, Celeste A.; O'Canna, Myra Lynn; Stikar, John Anthony.

    2014-09-01

    To help members of the workforce understand what factors contribute to Sandia National Laboratories national security mission, the authors describe the evolution of Sandias core mission and its other mission components. The mission of Sandia first as a division of Los Alamos and later as Sandia Corporation underlies our core nuclear weapon mission of today. Sandias mission changed in 1963 and twice more in the 1970s. This report should help staff and management appreciate the need for mission evolution. A clear definition and communication of a consistent corporate mission statement is still needed.

  8. Human Health and Global Security. Relevance to Medical Education.

    ERIC Educational Resources Information Center

    Kornfeld, Howard

    1984-01-01

    Programs in human health and global security should be incorporated into medical school curricula. Information about nuclear arms proliferation and unmet human health needs will help physicians exert a critical leadership role. (SK)

  9. Repositioning Technical and Vocational Education and Training (TVET) for Youths Employment and National Security in Nigeria

    ERIC Educational Resources Information Center

    Ogbunaya, T. C.; Udoudo, Ekereobong S.

    2015-01-01

    The paper focused on repositioning Technical and Vocational Education and Training (TVET) for youth's employment and national security in Nigeria. It examined briefly the concepts of technical vocational education and training (TVET), youths, unemployment and national security as well as the effects of unemployment on national security in Nigeria.…

  10. The Impact of Migration Processes on the National Security of Kazakhstan

    ERIC Educational Resources Information Center

    Korganova, Saipzhamal S.; Taubayeva, Mirash Y.; Sultanov, Serik A.; Rysbayeva, Saule Zh.; Sultanova, Valida I.; Zhumabekov, Madiyr U.; Raximshikova, Mavluda K.

    2016-01-01

    The purpose of this study is to analyze the impact of migration processes on the national security of Kazakhstan. However, it should be noted that national security is an expression of national interests and it is provided by means of resources and efforts of a particular state. Consequently, social security is an expression of the public…

  11. Domestic Agricultural Subsidies’ Impacts on National Security Objectives Relative to the SOUTHCOM AOR

    DTIC Science & Technology

    2009-06-12

    domestic policies that impact regional security concerns? Background The United States National Security Strategy, National Defense Strategy...due to the preponderance of information regarding the impacts of such subsidies on new and future trade agreements. This thesis will address the...concerns of security and economic policy as an instrument of national power, specifically focusing on the impacts for the SOUTHCOM Commander. Although

  12. 78 FR 31525 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Doc No: 2013-12433] DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board... Readiness, Defense Language and National Security Education Office (DLNSEO), DoD. ACTION: Meeting notice... National Security Education Board will take place. DATES: Monday, June 17, 2013, from 1:00 p.m. to 5:30...

  13. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public...

  14. 78 FR 54634 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... of the Secretary National Security Education Board; Notice of Federal Advisory Committee Meeting AGENCY: Under Secretary of Defense for Personnel and Readiness, Defense Language and National Security... meeting of the National Security Education Board will take place. DATES: Monday, September 23, 2013,...

  15. 47 CFR 0.387 - Other national security and emergency preparedness delegations; cross reference.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false Other national security and emergency... COMMISSION GENERAL COMMISSION ORGANIZATION Delegations of Authority National Security and Emergency Preparedness Delegations § 0.387 Other national security and emergency preparedness delegations;...

  16. 17 CFR 240.11a1-4(T) - Bond transactions on national securities exchanges.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Bond transactions on national....11a1-4(T) Bond transactions on national securities exchanges. A transaction in a bond, note, debenture, or other form of indebtedness effected on a national securities exchange by a member for its...

  17. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Protection of restricted data and national security... Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National...

  18. 17 CFR 240.11a1-4(T) - Bond transactions on national securities exchanges.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Bond transactions on national....11a1-4(T) Bond transactions on national securities exchanges. A transaction in a bond, note, debenture, or other form of indebtedness effected on a national securities exchange by a member for its...

  19. 12 CFR 335.251 - Forms for notification of action taken by national securities exchanges.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... national securities exchanges. 335.251 Section 335.251 Banks and Banking FEDERAL DEPOSIT INSURANCE... for notification of action taken by national securities exchanges. The applicable forms for notification of action taken by national securities exchanges are codified in 17 CFR part 249. All forms...

  20. 12 CFR 335.251 - Forms for notification of action taken by national securities exchanges.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... national securities exchanges. 335.251 Section 335.251 Banks and Banking FEDERAL DEPOSIT INSURANCE... for notification of action taken by national securities exchanges. The applicable forms for notification of action taken by national securities exchanges are codified in 17 CFR part 249. All forms...

  1. 47 CFR 0.387 - Other national security and emergency preparedness delegations; cross reference.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false Other national security and emergency... COMMISSION GENERAL COMMISSION ORGANIZATION Delegations of Authority National Security and Emergency Preparedness Delegations § 0.387 Other national security and emergency preparedness delegations;...

  2. 47 CFR 0.387 - Other national security and emergency preparedness delegations; cross reference.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Other national security and emergency... COMMISSION GENERAL COMMISSION ORGANIZATION Delegations of Authority National Security and Emergency Preparedness Delegations § 0.387 Other national security and emergency preparedness delegations;...

  3. 17 CFR 240.11a1-4(T) - Bond transactions on national securities exchanges.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Bond transactions on national....11a1-4(T) Bond transactions on national securities exchanges. A transaction in a bond, note, debenture, or other form of indebtedness effected on a national securities exchange by a member for its...

  4. 12 CFR 335.251 - Forms for notification of action taken by national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... national securities exchanges. 335.251 Section 335.251 Banks and Banking FEDERAL DEPOSIT INSURANCE... for notification of action taken by national securities exchanges. The applicable forms for notification of action taken by national securities exchanges are codified in subpart A of 17 CFR part 249....

  5. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Protection of restricted data and national security... Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National...

  6. 12 CFR 335.251 - Forms for notification of action taken by national securities exchanges.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... national securities exchanges. 335.251 Section 335.251 Banks and Banking FEDERAL DEPOSIT INSURANCE... for notification of action taken by national securities exchanges. The applicable forms for notification of action taken by national securities exchanges are codified in 17 CFR part 249. All forms...

  7. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice... Restricted Data or National Security Information into the proceeding, it will file a notice of intent...

  8. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public...

  9. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public...

  10. 12 CFR 335.251 - Forms for notification of action taken by national securities exchanges.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... national securities exchanges. 335.251 Section 335.251 Banks and Banking FEDERAL DEPOSIT INSURANCE... for notification of action taken by national securities exchanges. The applicable forms for notification of action taken by national securities exchanges are codified in 17 CFR part 249. All forms...

  11. 47 CFR 0.387 - Other national security and emergency preparedness delegations; cross reference.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Other national security and emergency... COMMISSION GENERAL COMMISSION ORGANIZATION Delegations of Authority National Security and Emergency Preparedness Delegations § 0.387 Other national security and emergency preparedness delegations;...

  12. 17 CFR 240.11a1-4(T) - Bond transactions on national securities exchanges.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Bond transactions on national....11a1-4(T) Bond transactions on national securities exchanges. A transaction in a bond, note, debenture, or other form of indebtedness effected on a national securities exchange by a member for its...

  13. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice... Restricted Data or National Security Information into the proceeding, it will file a notice of intent...

  14. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data...

  15. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Criteria for determining effects of... Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of...

  16. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    SciTech Connect

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    2000-06-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

  17. 36 CFR 1260.20 - Who is responsible for the declassification of classified national security Executive Branch...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... declassification of classified national security Executive Branch information that has been accessioned by NARA... ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION Responsibilities § 1260.20 Who is responsible for the declassification of classified national security Executive Branch...

  18. 36 CFR 1260.20 - Who is responsible for the declassification of classified national security Executive Branch...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... declassification of classified national security Executive Branch information that has been accessioned by NARA... ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION Responsibilities § 1260.20 Who is responsible for the declassification of classified national security Executive Branch...

  19. 36 CFR 1260.20 - Who is responsible for the declassification of classified national security Executive Branch...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... declassification of classified national security Executive Branch information that has been accessioned by NARA... ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION Responsibilities § 1260.20 Who is responsible for the declassification of classified national security Executive Branch...

  20. 36 CFR 1260.20 - Who is responsible for the declassification of classified national security Executive Branch...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... declassification of classified national security Executive Branch information that has been accessioned by NARA... ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION Responsibilities § 1260.20 Who is responsible for the declassification of classified national security Executive Branch...

  1. The Asia-Pacific Maritime Security Strategy: Achieving U.S. National Security Objectives in a Changing Environment

    DTIC Science & Technology

    2015-07-27

    ACHIEVING U.S. NATIONAL SECURITY OBJECTIVES IN A CHANGING ENVIRONMENT Indian Ocean In sharp contrast to the South and East China Seas, the Indian ... ENVIRONMENT Second, we are working together with our allies and partners from Northeast Asia to the Indian Ocean to build their maritime capacity. We...Pacific Maritime Security Strategy: Achieving U.S. National Security Objectives in a Changing Environment 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  2. Oil market power and United States national security

    PubMed Central

    Stern, Roger

    2006-01-01

    It is widely believed that an oil weapon could impose scarcity upon the United States. Impending resource exhaustion is thought to exacerbate this threat. However, threat seems implausible when we consider strategic deficits of prospective weapon users and the improbability of impending resource exhaustion. Here, we explore a hypothesis relating oil to national security under a different assumption, abundance. We suggest that an oil cartel exerts market power to keep abundance at bay, commanding monopoly rents [or wealth transfers (wt)] that underwrite security threats. We then compare security threats attributed to the oil weapon to those that may arise from market power. We first reexamine whether oil is abundant or scarce by reviewing current development data, then we estimate a competitive price for oil. From this, we derive wt2004 collections by Persian Gulf states ≈ $132-178 × 109. We find that wt and the behavior of states collecting it interact to actuate security threats. Threats underwritten by wt are (i) the potential for emergence of a Persian Gulf superpower and (ii) terrorism. It is therefore oil market power, not oil per se, that actuates threats. We also describe a paradox in the relation of market power to the United States' defense doctrine of force projection to preempt a Gulf superpower. Because the superpower threat derives from wt, force alone cannot preempt it. A further paradox is that because foreign policy is premised on oil weapon fear, market power is appeased. Threats thereby grow unimpeded. PMID:16428291

  3. Oil market power and United States national security.

    PubMed

    Stern, Roger

    2006-01-31

    It is widely believed that an oil weapon could impose scarcity upon the United States. Impending resource exhaustion is thought to exacerbate this threat. However, threat seems implausible when we consider strategic deficits of prospective weapon users and the improbability of impending resource exhaustion. Here, we explore a hypothesis relating oil to national security under a different assumption, abundance. We suggest that an oil cartel exerts market power to keep abundance at bay, commanding monopoly rents [or wealth transfers (wt)] that underwrite security threats. We then compare security threats attributed to the oil weapon to those that may arise from market power. We first reexamine whether oil is abundant or scarce by reviewing current development data, then we estimate a competitive price for oil. From this, we derive wt(2004) collections by Persian Gulf states approximately USD $132-178 x 10(9). We find that wt and the behavior of states collecting it interact to actuate security threats. Threats underwritten by wt are (i) the potential for emergence of a Persian Gulf superpower and (ii) terrorism. It is therefore oil market power, not oil per se, that actuates threats. We also describe a paradox in the relation of market power to the United States' defense doctrine of force projection to preempt a Gulf superpower. Because the superpower threat derives from wt, force alone cannot preempt it. A further paradox is that because foreign policy is premised on oil weapon fear, market power is appeased. Threats thereby grow unimpeded.

  4. Social Software and National Security: An Initial Net Assessment

    DTIC Science & Technology

    2009-04-01

    net assessment of how social software interacts with government and security in the broadest sense.1 The analysis looks at both sides of what once...operations, within a lessons-learned process, military intelligence gathering and analysis , human resources decisionmaking, networking warfighters’ families...Importantly, such Inward Sharing tools not only have conventional uses, like intelligence analysis , but also relatively mundane but very important advantages

  5. Public perspectives on nuclear security. US national security surveys, 1993--1997

    SciTech Connect

    Herron, K.G.; Jenkins-Smith, H.C.

    1998-08-01

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between US and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.

  6. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    SciTech Connect

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  7. Ergonomics issues in national identity card for homeland security.

    PubMed

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security.

  8. Physics and National Security: The Spectrum of Opportunities

    NASA Astrophysics Data System (ADS)

    Davis, Jay

    2011-03-01

    Physicists reflexively tend to approach their role in addressing national security problems by reaching for technologies and inventing devices or systems. While this is appropriate, the space for contribution is much larger. The application of technology is frequently constrained by doctrinal, operational, financial, and logistic constraints, not to mention those of security. The speaker, who has played a role in technology development, field operations, advisory processes, and policy considerations will discuss the role physicists can have in definition of the threat space, creation and assessment of technologies needed, and helping with response and recovery. In particular, he will address the opportunities and risks for both academic and industrial physicists in trying to assist in these matters, i.e., when in career to address such problems, what are the obstacles or consequences, and when do you know you have contributed?

  9. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    NASA Astrophysics Data System (ADS)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive

  10. Measuring Human Performance within Computer Security Incident Response Teams

    SciTech Connect

    McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel; Forsythe, James C.

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  11. 17 CFR 240.3a12-7 - Exemption for certain derivative securities traded otherwise than on a national securities exchange.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... derivative securities traded otherwise than on a national securities exchange. 240.3a12-7 Section 240.3a12-7... national securities exchange. Any put, call, straddle, option, or privilege traded exclusively otherwise than on a national securities exchange and for which quotations are not disseminated through...

  12. 17 CFR 240.3a12-7 - Exemption for certain derivative securities traded otherwise than on a national securities exchange.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... derivative securities traded otherwise than on a national securities exchange. 240.3a12-7 Section 240.3a12-7... national securities exchange. Any put, call, straddle, option, or privilege traded exclusively otherwise than on a national securities exchange and for which quotations are not disseminated through...

  13. 17 CFR 240.3a12-7 - Exemption for certain derivative securities traded otherwise than on a national securities exchange.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... derivative securities traded otherwise than on a national securities exchange. 240.3a12-7 Section 240.3a12-7... national securities exchange. Any put, call, straddle, option, or privilege traded exclusively otherwise than on a national securities exchange and for which quotations are not disseminated through...

  14. 17 CFR 240.3a12-7 - Exemption for certain derivative securities traded otherwise than on a national securities exchange.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... derivative securities traded otherwise than on a national securities exchange. 240.3a12-7 Section 240.3a12-7... national securities exchange. Any put, call, straddle, option, or privilege traded exclusively otherwise than on a national securities exchange and for which quotations are not disseminated through...

  15. 15 CFR 930.122 - Necessary in the interest of national security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Secretary for Review Related to the Objectives of the Act and National Security Interests § 930.122 Necessary in the interest of national security. A federal license or permit activity, or a federal assistance activity, is “necessary in the interest of national security” if a national defense or...

  16. 15 CFR 930.122 - Necessary in the interest of national security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Secretary for Review Related to the Objectives of the Act and National Security Interests § 930.122 Necessary in the interest of national security. A federal license or permit activity, or a federal assistance activity, is “necessary in the interest of national security” if a national defense or...

  17. 15 CFR 930.122 - Necessary in the interest of national security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Secretary for Review Related to the Objectives of the Act and National Security Interests § 930.122 Necessary in the interest of national security. A federal license or permit activity, or a federal assistance activity, is “necessary in the interest of national security” if a national defense or...

  18. 15 CFR 930.122 - Necessary in the interest of national security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Secretary for Review Related to the Objectives of the Act and National Security Interests § 930.122 Necessary in the interest of national security. A federal license or permit activity, or a federal assistance activity, is “necessary in the interest of national security” if a national defense or...

  19. Scientific freedom, national security, and the first amendment.

    PubMed

    Ferguson, J R

    1983-08-12

    The Supreme Court may soon be asked to decide an important issue of First Amendment law arising from the government's efforts to restrict the dissemination of "militarily critical" technological knowledge. To resolve the issue, the Court will first determine whether technological knowledge qualifies for a full measure of protection under the free-speech clause of the First Amendment. The Court will then address the government's stated justification for restricting the contested information. This inquiry will evaluate both the gravity of the asserted danger to national security and the likelihood of its occurrence.

  20. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-08

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... number of individuals planning to attend must be submitted to the Information Security Oversight Office... Industrial Security Program policy matters. DATES: The meeting will be held on March 20, 2013 from 10:00...

  1. 77 FR 41688 - Security Zones; 2012 Republican National Convention, Captain of the Port St. Petersburg Zone...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-16

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA87 Security Zones; 2012 Republican National Convention.... SUMMARY: The Coast Guard is establishing seven temporary security zones on the waters and adjacent land 20... August 31, 2012. The Department of Homeland Security has designated the 2012 Republican...

  2. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Access to matter classified as National Security Information and Restricted Data. 95.35 Section 95.35 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter...

  3. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 2 2014-01-01 2014-01-01 false Criteria for determining effect of... SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.4 Criteria for determining effect of imports on the national security. (a) To determine the effect on...

  4. 75 FR 51867 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ...] [FR Doc No: 2010-20815] SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62726; File No. SR-NSCC-2010-05] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving... Service August 16, 2010. I. Introduction On June 4, 2010, National Securities Clearing Corporation...

  5. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    .... SUPPLEMENTARY INFORMATION: This meeting will be open to the public. However, due to space limitations and access... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... meeting. To discuss National Industrial Security Program policy matters. DATES: The meeting will be...

  6. SDI (Strategic Defense Initiative) and national security policy. Research report

    SciTech Connect

    Davis, R.W.

    1988-04-01

    The paper attempts to answer the fundamental question of Can SDI make a significant contribution to US national security. It uses as its evaluation criteria historical arms-control measurements of stability, reduction in the probability of war, reduction in the consequences of war, economic benefits, and political benefits. A historical discussion of US nuclear strategy development along with Soviet thinking is provided as a backdrop to set the stage for an analysis of the reasons for President Reagan's March 1983 speech. The objectives of SDI are discussed along with the major concerns expressed by the program critics. Using the evaluation criteria defined above, the author analyzes SDI potential position in a long-term integrated national strategy that includes arms control and competitive strategies.

  7. Potential National Security Applications of Nuclear Resonance Fluorescence Methods

    SciTech Connect

    Warren, Glen A.; Peplowski, Patrick N.; Caggiano, Joseph A.

    2009-06-09

    The objective of this report is to document the initial investigation into the possible research issues related to the development of NRF-based national security applications. The report discusses several potential applications ranging from measuring uranium enrichment in UF6 canisters to characterization of gas samples. While these applications are varied, there are only a few research issues that need to be addressed to understand the limitation of NRF in solving these problems. These research issues range from source and detector development to measuring small samples. The next effort is to determine how best to answer the research issues, followed by a prioritization of those questions to ensure that the most important are addressed. These issues will be addressed through either analytical calculations, computer simulations, analysis of previous data or collection of new measurements. It will also be beneficial to conduct a thorough examination of a couple of the more promising applications in order to develop concrete examples of how NRF may be applied in specific situations. The goals are to develop an understanding of whether the application of NRF is limited by technology or physics in addressing national security applications, to gain a motivation to explore those possible applications, and to develop a research roadmap so that those possibilities may be made reality.

  8. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    SciTech Connect

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  9. Ares V: Game Changer for National Security Launch

    NASA Technical Reports Server (NTRS)

    Sumrall, Phil; Morris, Bruce

    2009-01-01

    NASA is designing the Ares V cargo launch vehicle to vastly expand exploration of the Moon begun in the Apollo program and enable the exploration of Mars and beyond. As the largest launcher in history, Ares V also represents a national asset offering unprecedented opportunities for new science, national security, and commercial missions of unmatched size and scope. The Ares V is the heavy-lift component of NASA's dual-launch architecture that will replace the current space shuttle fleet, complete the International Space Station, and establish a permanent human presence on the Moon as a stepping-stone to destinations beyond. During extensive independent and internal architecture and vehicle trade studies as part of the Exploration Systems Architecture Study (ESAS), NASA selected the Ares I crew launch vehicle and the Ares V to support future exploration. The smaller Ares I will launch the Orion crew exploration vehicle with four to six astronauts into orbit. The Ares V is designed to carry the Altair lunar lander into orbit, rendezvous with Orion, and send the mated spacecraft toward lunar orbit. The Ares V will be the largest and most powerful launch vehicle in history, providing unprecedented payload mass and volume to establish a permanent lunar outpost and explore significantly more of the lunar surface than was done during the Apollo missions. The Ares V consists of a Core Stage, two Reusable Solid Rocket Boosters (RSRBs), Earth Departure Stage (EDS), and a payload shroud. For lunar missions, the shroud would cover the Lunar Surface Access Module (LSAM). The Ares V Core Stage is 33 feet in diameter and 212 feet in length, making it the largest rocket stage ever built. It is the same diameter as the Saturn V first stage, the S-IC. However, its length is about the same as the combined length of the Saturn V first and second stages. The Core Stage uses a cluster of five Pratt & Whitney Rocketdyne RS-68B rocket engines, each supplying about 700,000 pounds of thrust

  10. 77 FR 61033 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-05

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change To Enhance the Default Pricing Methodology Used by NSCC's Automated Customer...

  11. 17 CFR 240.3a12-7 - Exemption for certain derivative securities traded otherwise than on a national securities exchange.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... national securities exchange. Any put, call, straddle, option, or privilege traded exclusively otherwise... “exempted security” or “exempted securities,” provided that the securities underlying such put,...

  12. 10 CFR 2.913 - Review of Restricted Data or other National Security Information received in evidence.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Review of Restricted Data or other National Security... and/or National Security Information § 2.913 Review of Restricted Data or other National Security... review the record and shall direct that any Restricted Data or other National Security Information...

  13. 10 CFR 2.913 - Review of Restricted Data or other National Security Information received in evidence.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Review of Restricted Data or other National Security... and/or National Security Information § 2.913 Review of Restricted Data or other National Security... review the record and shall direct that any Restricted Data or other National Security Information...

  14. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Access to restricted data and national security information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR DOMESTIC LICENSING PROCEEDINGS AND ISSUANCE OF ORDERS Special Procedures Applicable to Adjudicatory Proceedings Involving...

  15. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national...

  16. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national...

  17. 75 FR 45151 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... National Security Division; Agency Information Collection Activities: Proposed Collection; Comments... (Foreign Agents). The Department of Justice (DOJ), National Security Division (NSD), will be submitting the... information, please write to U.S. Department of Justice, 10th & Constitution Avenue, NW., National...

  18. Swords into plowshares: Military geology and national security projects

    SciTech Connect

    Neal, J.T.

    1994-12-31

    Military geology and national security projects are often comparable, achieving their rai-son d`etre in support of national goals, military operations, and/or systems-all for vital national interests. The application of Geoscience to these ends, especially engineering geology, has occurred from pole to pole and included every conceivable environment and natural condition. In the conduct of such projects, the Geosciences have advanced, and vice versa. Desert trafficability, most notably regarding playa surfaces, is both temporary and variable and not a persistent condition as some early authors believed. Playas in Australia, Iran, and the US show that saline efflorescence is removed following surface water dissolution and subsequent deflation, resulting in very hard crusts. Magadiite, a hydrous sodium silicate and possible precursor of bedded chert, was first discovered in North America at Alkali Lake, OR, during a military project. Pleistocene Lake Trinity, a small and mostly buried evaporate basin in the northern Jornada del Muerto, NM, was discovered during exploratory drilling in support of a military test program.

  19. Enhancing Nutrition Security via India's National Food Security Act: Using an Axe instead of a Scalpel?§

    PubMed Central

    Desai, Sonalde; Vanneman, Reeve

    2016-01-01

    In September 2013, India passed a historic National Food Security Act. This paper examines the potential impact of the two central pillars of this act - expansion of the Public Distribution System and strengthening of the Integrated Child Development Schemes – on child nutrition. Using new data from the India Human Development Survey of 2011-12, this paper shows that access to subsidized grains via PDS is not related to improved child nutrition, and while ICDS seems to be related to lower child undernutrition, it has a limited reach in spite of the universalization of the program. The paper suggests that a tiered strategy in dealing with child undernutrition that starts with the identification of undernourished children and districts and follows through with different strategies for dealing with severe, acute malnutrition, followed by a focus on moderate malnutrition, could be more effective than the existing focus on cereal distribution rooted in the NFSA. PMID:27034596

  20. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    SciTech Connect

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  1. National Security Implications of Climate-related Risks and a Changing Climate

    DTIC Science & Technology

    2015-07-23

    23 July 2015 1 NATIONAL SECURITY IMPLICATIONS OF CLIMATE -RELATED RISKS AND A CHANGING CLIMATE This report responds to the...COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE National Security Implications of Climate -related Risks and a Changing Climate 5a. CONTRACT...Response to Congressional Inquiry on National Security Implications of Climate -Related Risks and a Changing Climate July 2015 Elements of

  2. Magnetic Imaging: a New Tool for UK National Nuclear Security

    PubMed Central

    Darrer, Brendan J.; Watson, Joe C.; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-01

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications. PMID:25608957

  3. Magnetic Imaging: a New Tool for UK National Nuclear Security

    NASA Astrophysics Data System (ADS)

    Darrer, Brendan J.; Watson, Joe C.; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-01

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications.

  4. Magnetic imaging: a new tool for UK national nuclear security.

    PubMed

    Darrer, Brendan J; Watson, Joe C; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-22

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications.

  5. 77 FR 34029 - National Security Education Board Members Meeting; Cancellation of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-08

    ... and National Security Education Office, 1101 Wilson Boulevard, Suite 1210, Arlington, VA 22209... Education Office (DLNSEO), 1101 Wilson Boulevard, Suite 1210, Arlington, Virginia 22209-2248; (703)...

  6. 3 CFR - Implementation of the Executive Order, “Classified National Security Information”

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... measurable progress toward greater openness and transparency, I hereby direct the following actions. 1... Security and Counterterrorism The Director of National Drug Control Policy The Director, Office of...

  7. Rivers in the Anthropocene: Mapping Human Water Security

    NASA Astrophysics Data System (ADS)

    Vorosmarty, C. J.; Green, P.

    2014-12-01

    Fresh water underpins countless benefits to society and is pivotal to the success of the food and energy sectors, industry and commerce, and the expanding urban domain. It provides essential cultural, recreational, and aesthetic values and also plays a critical role in the maintenance of ecosystem services and biodiversity. Recent analyses of water systems across the planet, summarized using high resolution, geospatial indicator maps of rivers, demonstrate that a wide array of stressors combine to produce a pattern of worldwide threat to much of the freshwater resource base that sustains human water supply and aquatic biodiversity. A pervasive, globally-significant pattern of management is evident in the contemporary setting, through which impairment accumulates as a function of wealth, but is then remedied by costly, after-the-fact technological investments. This strategy of treating symptoms while leaving unabated the underlying causes is practiced widely across rich countries, but it strands poor nations and much of the world's aquatic lifeforms at high levels of vulnerability. The seeds of such an approach to water management are hardly new and are evident throughout human history. This talk will explore the implications of these global realities and will focus on the role of 21st century engineering as in both contributing to the growing water crisis and stimulating innovation for more effective stewardship of our water resource systems. It will also present a first global synthesis of the geography of freshwater provisioning source areas, evaluating jointly the quantity and condition of freshwater produced from these areas, and the downstream populations served by these resources. A geospatial indicator is derived, the freshwater provisioning index for humans (FPIh), which constitutes an objective measure of the state of the resource base and its role in supporting human water security.

  8. Infectious Disease and National Security: Strategic Information Needs

    DTIC Science & Technology

    2006-01-01

    forensic attribution. BioShield Signed into law by President Bush in July 2004, Project BioShield is an initiative to speed the development and procurement...vulnerabilities and determine potential consequences, and provide a national capability for conducting forensic analysis of evidence from biocrimes and...1999, pp. 54–64. Lounibos, L. Philip, “Invasions by Insect Vectors of Human Disease,” Annual Review of Entomology , Vol. 47, January 2002, pp. 233–266

  9. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  10. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  11. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  12. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  13. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  14. Pursuing the National Interest: A National Security Strategy in a New World Order

    DTIC Science & Technology

    1992-04-19

    proudly in its true colors, as something incapable of controlling passion , insubordinate to the idea of justice, the enemy of anything superior to...terms of power, as if they were playing a game. Domestic affairs and intangibles, such as national character and the passions of nationalism...our national wealth insulates us. Hobbes Thomas Hobbes saw the nature of man as "the sum of passions , and of human reason as a cal- culating machine

  15. 17 CFR 240.19c-5 - Governing the multiple listing of options on national securities exchanges.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... of options on national securities exchanges. 240.19c-5 Section 240.19c-5 Commodity and Securities... of Exchange Members § 240.19c-5 Governing the multiple listing of options on national securities exchanges. (a) The rules of each national securities exchange that provides a trading market in...

  16. 17 CFR 240.19c-1 - Governing certain off-board agency transactions by members of national securities exchanges.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Governing certain off-board agency transactions by members of national securities exchanges. 240.19c-1 Section 240.19c-1 Commodity... members of national securities exchanges. The rules of each national securities exchange shall provide...

  17. 17 CFR 240.19c-3 - Governing off-board trading by members of national securities exchanges.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... members of national securities exchanges. 240.19c-3 Section 240.19c-3 Commodity and Securities Exchanges... Members § 240.19c-3 Governing off-board trading by members of national securities exchanges. The rules of each national securities exchange shall provide as follows: (a) No rule, stated policy or practice...

  18. 17 CFR 240.19c-3 - Governing off-board trading by members of national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... members of national securities exchanges. 240.19c-3 Section 240.19c-3 Commodity and Securities Exchanges... Members § 240.19c-3 Governing off-board trading by members of national securities exchanges. The rules of each national securities exchange shall provide as follows: (a) No rule, stated policy or practice...

  19. 17 CFR 240.19c-3 - Governing off-board trading by members of national securities exchanges.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... members of national securities exchanges. 240.19c-3 Section 240.19c-3 Commodity and Securities Exchanges... Members § 240.19c-3 Governing off-board trading by members of national securities exchanges. The rules of each national securities exchange shall provide as follows: (a) No rule, stated policy or practice...

  20. 17 CFR 240.19c-1 - Governing certain off-board agency transactions by members of national securities exchanges.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Governing certain off-board agency transactions by members of national securities exchanges. 240.19c-1 Section 240.19c-1 Commodity... members of national securities exchanges. The rules of each national securities exchange shall provide...