Science.gov

Sample records for national security human

  1. Simulating human behavior for national security human interactions.

    SciTech Connect

    Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.; Glickman, Matthew R.; Wolfenbarger, Paul R.; Xavier, Patrick Gordon

    2007-01-01

    This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humans were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.

  2. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    ERIC Educational Resources Information Center

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  3. Energy and national security.

    SciTech Connect

    Karas, Thomas H.

    2003-09-01

    On May 19 and 20, 2003, thirty-some members of Sandia staff and management met to discuss the long-term connections between energy and national security. Three broad security topics were explored: I. Global and U.S. economic dependence on oil (and gas); II. Potential security implications of global climate change; and III. Vulnerabilities of the U.S. domestic energy infrastructure. This report, rather than being a transcript of the workshop, represents a synthesis of background information used in the workshop, ideas that emerged in the discussions, and ex post facto analysis of the discussions. Each of the three subjects discussed at this workshop has significant U.S. national security implications. Each has substantial technology components. Each appears a legitimate area of concern for a national security laboratory with relevant technology capabilities. For the laboratory to play a meaningful role in contributing to solutions to national problems such as these, it needs to understand the political, economic, and social environments in which it expects its work to be accepted and used. In addition, it should be noted that the problems of oil dependency and climate change are not amenable to solution by the policies of any one nation--even the one that is currently the largest single energy consumer. Therefore, views, concerns, policies, and plans of other countries will do much to determine which solutions might work and which might not.

  4. Energy and National Security

    ERIC Educational Resources Information Center

    Abelson, Philip H.

    1973-01-01

    Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)

  5. Redefining National Security. Worldwatch Paper 14.

    ERIC Educational Resources Information Center

    Brown, Lester R.

    This paper, an adaption from the author's forthcoming book "The Twenty-Ninth Day: Accomodating Human Needs and Numbers to the Earth's Resources," deals with non-military threats to national security. Since World War II the concept of national security has acquired an overwhelmingly military character. The policy of continual preparedness has led…

  6. Bioethics and the national security state.

    PubMed

    Moreno, Jonathan D

    2004-01-01

    In previous work, I have described the history and ethics of human experiments for national security purposes during he cold war and developed the bioethical issues that will be apparent in the "war on terror". This paper is an attempt to bring these two previous lines of work together under the rubric of the "national security state," a concept familiar to Cold War historians and political scientists. The founding of the national security state was associated with the first articulations of informed consent requirements by national security agencies. My analysis indicates that strengthened consent standards, though conventionally thought to be antithetical crisis, can be seen as an attempt by the postwar national security state to protect itself from critics of expanded governmental power. During the coming years the renewed mission of the national security state in the war on terror should impel students of bioethics to consider its implications for the field.

  7. Congress and national security

    NASA Astrophysics Data System (ADS)

    Sharfman, Peter

    1983-10-01

    The starting point for any serious discussion of Congress role in matters of national security is the recognition that Congress does some kinds of things very effectively, but generally fails when it tries to do other kinds of things. Consequently, a citizen with a desire to shape national policy may find Congress to be the focal point of national decision, or largely irrelevant, depending almost, entirely on the nature of the issue. As a political scientist, I am tempted to relate this to the provisions of the U.S. Constitution and to the differing structures of the Executive and Legislative institutions; since I am addressing an audience of physicists, I will confine my explanation of causes to the observation that you cannot easily push on a string.

  8. 76 FR 34761 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... Classified National Security Information AGENCY: Marine Mammal Commission. ACTION: Notice. SUMMARY: This... information, as directed by Information Security Oversight Office regulations. FOR FURTHER INFORMATION CONTACT..., ``Classified National Security Information,'' and 32 CFR part 2001, ``Classified National Security...

  9. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  10. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  11. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  12. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  13. Diversity Intersects with National Security.

    ERIC Educational Resources Information Center

    Chew, Cassie

    2003-01-01

    Describes how the United Negro College Fund's Institute for International Public Policy is preparing to host a series of open-ended discussions with top government and business officials on the importance of a diverse work force as a national security imperative, as well as a competitive advantage in a global economy. (EV)

  14. National Security Management Correspondence Course.

    ERIC Educational Resources Information Center

    Industrial Coll. of the Armed Forces (DOD), Washington, DC.

    A course of study on the fundamental aspects of the areas of knowledge which are essential to effective management of national security is presented. The course presents the substance of the Industrial College resident curriculum adapted to the correspondence method of study. The subject matter is designed to impart knowledge and understanding of…

  15. Climate Change and National Security

    SciTech Connect

    Malone, Elizabeth L.

    2013-02-01

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  16. Secure Distributed Human Computation

    NASA Astrophysics Data System (ADS)

    Gentry, Craig; Ramzan, Zulfikar; Stubblebine, Stuart

    In Peha’s Financial Cryptography 2004 invited talk, he described the Cyphermint PayCash system (see www.cyphermint.com), which allows people without bank accounts or credit cards (a sizeable segment of the U.S. population) to automatically and instantly cash checks, pay bills, or make Internet transactions through publicly-accessible kiosks. Since PayCash offers automated financial transactions and since the system uses (unprotected) kiosks, security is critical. The kiosk must decide whether a person cashing a check is really the person to whom the check was made out, so it takes a digital picture of the person cashing the check and transmits this picture electronically to a central office, where a human worker compares the kiosk’s picture to one that was taken when the person registered with Cyphermint. If both pictures are of the same person, then the human worker authorizes the transaction.

  17. Status of the National Security Workforce

    SciTech Connect

    2008-03-31

    This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

  18. Gender Aspects of Human Security

    ERIC Educational Resources Information Center

    Moussa, Ghada

    2008-01-01

    The chapter deals with the gender dimensions in human security through focusing on the relationship between gender and human security, first manifested in international declarations and conventions, and subsequently evolving in world women conferences. It aims at analysing the various gender aspects in its relation to different human security…

  19. Nuclear Physics for National Security

    NASA Astrophysics Data System (ADS)

    Mayo, Douglass

    2006-10-01

    Being a nuclear physicist and working at a national laboratory provides many opportunities to ply one's skills in support of national security and the benefit of all mankind. Over the last 40 years, Los Alamos National Laboratory has been pioneering the field of Domestic and International Safeguards through the research and development of instrumentation and systems used to monitor nuclear materials and nuclear facilities. With a projected increase in the use of nuclear energy, effective systems must be designed to reduce the possibility that nuclear materials may be diverted for used in weapons. The recent focus has been the many applications of radiation detection used for safeguarding nuclear material and to support Homeland Security. There is a critical need for trained nuclear scientists who can understand and overcome measurement complexities, combinations of multiple sensor inputs, data reduction, and automated analysis for these applications. This talk will focus on the opportunities and experiences afforded physicists in the support of national security, beyond the weapons program and travel to interesting locales.

  20. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security...

  1. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  2. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  3. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security...

  4. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy... achieve national health security and to implement the first quadrennial National Health Security Strategy... the National Health Security Strategy of the United States of America (2009) the U.S. Government...

  5. Next Generation National Security Leaders

    SciTech Connect

    Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

    2012-07-19

    It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had “right-sized” the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community – or it may lie in more effectively using our existing resources and training programs.

  6. Water security - Nation state and international security implications

    USGS Publications Warehouse

    Tindall, James A.; Andrew A. Campbell,

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  7. 15 CFR 742.4 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States...

  8. 77 FR 65393 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-26

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... national security and emergency preparedness (NS/EP) telecommunications policy. Agenda: The NSTAC...

  9. 78 FR 63232 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... related to national security and emergency preparedness (NS/EP) telecommunications policy. During...

  10. Student Experiential Opportunities in National Security Careers

    SciTech Connect

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  11. Water security-National and global issues

    USGS Publications Warehouse

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  12. 75 FR 16159 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-31

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee...: The President's National Security Telecommunications Advisory Committee (NSTAC) will hold its annual... Management Branch, Department of Homeland Security, 245 Murray Lane, SW., Washington, DC 20598-0615....

  13. 77 FR 44641 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-30

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... Security, 245 Murray Lane, Mail Stop 0615, Arlington, VA 20598-0615. Instructions: All submissions...

  14. 75 FR 29781 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-27

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee... meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC) will be...), Department of Homeland Security, 245 Murray Lane, SW., Washington, DC 20598-0615; Fax:...

  15. 78 FR 45255 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... Programs Directorate, Department of Homeland Security, 245 Murray Lane, Mail Stop 3016B, Arlington,...

  16. The Political Economy of National Security.

    ERIC Educational Resources Information Center

    Kapstein, Ethan B.

    1990-01-01

    Describes a course offered on the political economy of national security. Discusses the objective of the course as the introduction of major economic issues associated with national security. Outlines lecture topics, course readings, and class format. Evaluates course weaknesses and strengths. Includes course assignments and requirements. (RW)

  17. National Security Technology Incubator Evaluation Process

    SciTech Connect

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  18. National Security Technology Incubator Business Plan

    SciTech Connect

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  19. Human health risk assessment database, 'the NHSRC toxicity value database': Supporting the risk assessment process at US EPA's National Homeland Security Research Center

    SciTech Connect

    Moudgal, Chandrika J.

    2008-11-15

    The toxicity value database of the United States Environmental Protection Agency's (EPA) National Homeland Security Research Center has been in development since 2004. The toxicity value database includes a compilation of agent property, toxicity, dose-response, and health effects data for 96 agents: 84 chemical and radiological agents and 12 biotoxins. The database is populated with multiple toxicity benchmark values and agent property information from secondary sources, with web links to the secondary sources, where available. A selected set of primary literature citations and associated dose-response data are also included. The toxicity value database offers a powerful means to quickly and efficiently gather pertinent toxicity and dose-response data for a number of agents that are of concern to the nation's security. This database, in conjunction with other tools, will play an important role in understanding human health risks, and will provide a means for risk assessors and managers to make quick and informed decisions on the potential health risks and determine appropriate responses (e.g., cleanup) to agent release. A final, stand alone MS ACESSS working version of the toxicity value database was completed in November, 2007.

  20. National Security Technology Incubator Operations Plan

    SciTech Connect

    2008-04-30

    This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

  1. National security in the third world

    SciTech Connect

    Al-Mashat, A.M.M.

    1985-01-01

    For nations of the Third World, national security poses serious dilemmas. Unlike Western nations, less-developed countries must balance the complex and often contradictory requirements of socio-economic and political development with problems of internal stability and the requirements of national defense. For these countries, a concept of national security that focuses primarily on the international threat system and its overt manifestations of wars and violence, ignoring domestic well-being, is inadequate on theoretical and pragmatic grounds. This book addresses the security problems of Third World states, arguing for new ways to define and measure national security so that the concept may be appropriately applied to the needs of developing countries. In addition, the author argues that the tranquility of a state, a concept traditionally linked with national security, cannot necessarily be associated with quality of life as measured by conventional means. Dr. Al-Mashat constructs a tranquility index for 95 developing nations and tests its relationship with the physical quality-of-life index to demonstrate this point. Attempts to improve quality of life, he suggests, may in many countries lead to a reduction in security unless simultaneous attempts are made to democratize the regime.

  2. National Security Agency Accountability Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. 77 FR 75182 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-19

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... telecommunications policy. Agenda: The NSTAC members will receive an update on progress made to date by the...

  4. 76 FR 52672 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... telecommunications policy. During the conference call, the NSTAC members will receive an update regarding...

  5. 75 FR 3913 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-25

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee AGENCY: National Communications System, DHS. ACTION: Notice of Open Advisory Committee meeting. SUMMARY... Communications System (Government Industry Planning and Management Branch), Department of Homeland Security,...

  6. Global water risks and national security: Building resilience (Invited)

    NASA Astrophysics Data System (ADS)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  7. National Security Technology Incubation Project Continuation Plan

    SciTech Connect

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  8. Counterproliferation: A National Security Priority. Speech text

    SciTech Connect

    Kaminski, P.G.

    1995-10-27

    Stemming the proliferation of weapons of mass destruction and their missile delivery systems - counterproliferation - is universally recognized as a significant national priority by all elements of the U.S. national security community. President Clinton, for example, emphasized in the National Security Strategy released in February of this year, that a key part of our strategy is to seek to stem the proliferation of such weapons and to develop an effective capability to deal with these threats. In May 1995, the National Military Strategy was issued by our nation`s senior military leader, General Shalikashvili, who described the threat of weapons of mass destruction as one of the ...four principal dangers which our military, in combination with other elements of national power must address.

  9. National Security Technology Incubation Strategic Plan

    SciTech Connect

    2007-01-01

    This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achieving sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to

  10. It's a national security policy, stupid

    SciTech Connect

    Isaacs, J.

    1993-09-01

    This article discusses the first few national security decisions of the Clinton administration. The first decision was to have the United States continue to honor the nuclear testing moratorium through September, 1994 (or until another nation tested first). The second decision of the Clinton administration was the independence of the Arms Control and Disarmament Agency (ACDA) from the State Department. The third decision was to formally denounce the Reagan Administration's interpretation of the US/Soviet Anti-Ballistic Missile Treaty. The issue of the financing of United States involvement in Somalia was also addressed. The implications of these policy decisions as related to national security are evaluated in this article.

  11. National Security Technology Incubator Action Plan

    SciTech Connect

    2008-02-28

    This report documents the action plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). This action plan serves as a tool in measuring progress in the development process and delivery of services for the NSTI program. Continuous review and evaluation of the action plan is necessary in the development process of the NSTI. The action plan includes detailed steps in developing the NSTI program based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Included are tasks required to implement the NSTI, developed within a work breakdown structure. In addition, a timeline is identified for each task.

  12. Cognitive models applied to human effectiveness in national security environments (ergonomics of augmented cognition system design and application).

    SciTech Connect

    Ntuen, Celestine; Winchester, Woodrow III

    2004-06-01

    In complex simulation systems where humans interact with computer-generated agents, information display and the interplay of virtual agents have become dominant media and modalities of interface design. This design strategy is reflected in augmented reality (AR), an environment where humans interact with computer-generated agents in real-time. AR systems can generate large amount of information, multiple solutions in less time, and perform far better in time-constrained problem solving. The capabilities of AR have been leveraged to augment cognition in human information processing. In this sort of augmented cognition (AC) work system, while technology has become the main source for information acquisition from the environment, the human sensory and memory capacities have failed to cope with the magnitude and scale of information they encounter. This situation generates opportunity for excessive cognitive workloads, a major factor in degraded human performance. From the human effectiveness point of view, research is needed to develop, model, and validate simulation tools that can measure the effectiveness of an AR technology used to support the amplification of human cognition. These tools will allow us to predict human performance for tasks executed under an AC tool construct. This paper presents an exploration of ergonomics issues relevant to AR and AC systems design. Additionally, proposed research to investigate those ergonomic issues is discussed.

  13. Nevada National Security Site Environmental Report 2013

    SciTech Connect

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  14. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2010-09-03

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  15. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2011-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  16. 75 FR 82039 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ...) Port Security Grants. (2) Global Supply Chain Security Policy Efforts. (3) Update to the Maritime... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of meeting. SUMMARY: The National Maritime Security Advisory Committee (NMSAC) will...

  17. Heavy Lift for National Security: The Ares V

    NASA Technical Reports Server (NTRS)

    Sumrall, Phil

    2009-01-01

    The NASA Ares Projects Office is developing the launch vehicles to move the United States and humanity beyond low earth orbit. Ares I is a crewed vehicle, and Ares V is a heavy lift vehicle being designed to launch cargo into LEO and transfer cargo and crews to the Moon. This is a snapshot of development and capabilities. Ares V is early in the requirements formulation stage of development pending the outcome of the Review of U.S. Human Space Flight Plans Committee and White House action. The Ares V vehicle will be considered a national asset, creating unmatched opportunities for human exploration, science, national security, and space business.

  18. Sensor Science for National Security

    SciTech Connect

    Hardy, Jim E; Warmack, Robert J Bruce; Lavrik, Nickolay V; Datskos, Panos G; BRITTONJr., CHARLES L.

    2009-01-01

    Oak Ridge National Laboratory (ORNL) has over 200 professionals engaged in measurement science research and development. This work includes transduction techniques, advanced microelectronics, signal and image processing, modeling and simulation, material synthesis and characterization, and system engineering issues for packaging, miniaturization, integration, and communications (e.g. wireless networks). ORNL is applying this expertise to detecting, preventing, and reversing the proliferation of weapons of mass destruction, deploying integrated systems for incident awareness, detection, and response, providing technology for detection of explosives, and delivering enhanced protection and new capabilities to first responders and warfighters. Sensor systems include micro- and nano-arrays, optical, chemical, and biological technologies. Electronics research has focused on low-power, low-cost, and wireless functionality. Signal processing advancements encompass data flow with conversion to information and knowledge for intelligent decision making.

  19. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS THE OFFICE OF ENERGY RESEARCH FINANCIAL ASSISTANCE.... Correspondence which includes the specific information in question shall be sent by registered mail to...

  20. New rules revamp national security prosecutions

    NASA Astrophysics Data System (ADS)

    Gwynne, Peter

    2016-06-01

    Following the collapse of recent prosecutions of Chinese-American scientists on national security grounds, the US Department of Justice (DOJ) has issued new rules on such lawsuits that will require top officials in Washington to review and supervise all cases that implicitly involve spying - rather than leaving decisions to local prosecutors.

  1. National security in the 1990s

    SciTech Connect

    Rich, M.D.

    1991-02-01

    The Rand Paper contains the text of a speech given at a luncheon co-sponsored by Town Hall of California and the Los Angeles Council of Engineers and Scientists on national security affairs in the 1990s. The speech was given at the Biltmore Hotel, Los Angeles, California, on February 19, 1991.

  2. 75 FR 705 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-05

    ... information relating to defense against transnational terrorism. Our democratic principles require that the... national security, which includes defense against transnational terrorism, and the original classification...- art technology within a U.S. weapon system; (5) reveal formally named or numbered U.S. military...

  3. Alternate Energy for National Security.

    NASA Astrophysics Data System (ADS)

    Rath, Bhakta

    2010-02-01

    Recent price fluctuations at the gas pump have brought our attention to the phenomenal increase of global energy consumption in recent years. It is now evident that we have almost reached a peak in global oil production. Several projections indicate that total world consumption of oil will rise by nearly 60 per cent between 1999 and 2020. In 1999 consumption was equivalent to 86 million barrels of oil per day, which has reached a peak of production extracted from most known oil reserves. These projections, if accurate, will present an unprecedented crisis to the global economy and industry. As an example, in the US, nearly 40 per cent of energy usage is provided by petroleum, of which nearly a third is used in transportation. The US Department of Defense (DOD) is the single largest buyer of fuel, amounting to, on the average, 13 million gallons per day. Additionally, these fuels have to meet different requirements that prevent use of ethanol additives and biodiesel. An aggressive search for alternate energy sources, both renewable and nonrenewable, is vital. The presentation will review national and DOD perspectives on the exploration of alternate energy with a focus on energy derivable from the ocean. )

  4. Scientific Openness and National Security at the National Laboratories

    NASA Astrophysics Data System (ADS)

    McTague, John

    2000-04-01

    The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.

  5. [System approach to national health security problems].

    PubMed

    Venediktov, D D

    1998-01-01

    P. K. Anokhin's basic works on functional systems, on space-time continuum and advanced reflection of the reality, on the physiological structure of a behavior act, as well as his fundamental philosophical and scientific postulated are most fruitful for analyzing and solving a number of biomedical, societal, and political problems, among them there are problems of national security in general and its demographic and health aspects. Individual and public health as a measure of balance between the organism (population) and its biosocial environment depends on the efficiency of relevant physiological and societal functional systems is one of the basic prerequisites of national security and timely recognition, avoiding and overcoming numerous challenges, dangers, and threats to the nation. General political and socioeconomic crisis in Russia adversely affects the population's dynamics and public health and it is manifested by depopulatory processes, low birth and high mortality and morbidity rates, growing violence and crime, psychoemotional stress, decreased immunity level of vast majority of population, especially that of children, elderly and other vulnerable groups. Environmental pollution and degradation have reached dangerous proportions. The national health system is unable to meet basic needs of the population. To overcome the crisis, systemic measures should be in the foundation of all health reform concepts and strategies. Monitoring national health, including modelling its future status, as well as progress in health system reforms should be another basic condition for overcoming the national health crisis. PMID:9567717

  6. Selecting RMF Controls for National Security Systems

    SciTech Connect

    Witzke, Edward L.

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  7. National Center for Nuclear Security - NCNS

    ScienceCinema

    None

    2016-07-12

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  8. National Center for Nuclear Security - NCNS

    SciTech Connect

    2014-11-12

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  9. 77 FR 26024 - National Maritime Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    ... SECURITY Coast Guard National Maritime Security Advisory Committee AGENCY: Coast Guard, DHS. ACTION... published in the Federal Register of May 1, 2012, a notice announcing a National Maritime Security Advisory... progress regarding multiple maritime security initiatives. If you have been adversely affected by the...

  10. 77 FR 1710 - National Maritime Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-11

    ... SECURITY Coast Guard National Maritime Security Advisory Committee AGENCY: Coast Guard, DHS. ACTION... published in the Federal Register of January 9, 2012, a notice announcing a National Maritime Security... regarding multiple maritime security initiatives. If you have been adversely affected by the delay...

  11. Nuclear Arms and National Security. 1983 National Issues Forum.

    ERIC Educational Resources Information Center

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  12. Nevada National Security Site Environmental Report 2011

    SciTech Connect

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  13. 75 FR 45154 - National Security Division; Agency Information Collection Activities:

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... National Security Division; Agency Information Collection Activities: Proposed Collection; Comments... (Foreign Agents). The Department of Justice (DOJ), National Security Division (NSD), will be submitting the... Division, Counterespionage Section/Registration Unit, Bond Building--Room 9300, Washington, DC 20530....

  14. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    none,

    2013-06-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: • DOE hazardous and non-hazardous non-radioactive classified waste • DOE low-level radioactive waste (LLW) • DOE mixed low-level waste (MLLW) • U.S. Department of Defense (DOD) classified waste The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  15. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2012-02-28

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  16. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National...: (1) Form SF-86, Questionnaire for National Security Positions, marked “CON” in Block 1,...

  17. 40 CFR 204.5-2 - National security exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act, any... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions....

  18. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  19. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  20. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  1. 76 FR 50719 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... 92-463, notice is hereby given of a forthcoming meeting of the National Security Education Board. The... requirements established by the David L. Boren National Security Education Act, Title VII of Public Law...

  2. 77 FR 27739 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-11

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... hereby given of a forthcoming meeting of the National Security Education Board. The purpose of the... established by the David L. Boren National Security Education Act, Title VII of Public Law 102- 183,...

  3. 77 FR 49439 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... hereby given of a forthcoming meeting of the National Security Education Board. The purpose ] of the... established by the David L. Boren National Security Education Act, Title VII of Public Law 102-183, as...

  4. 76 FR 28960 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... hereby given of a forthcoming meeting of the National Security Education Board. The purpose of the... established by the David L. Boren National Security Education Act, Title VII of Public Law 102- 183,...

  5. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  6. 14 CFR § 1260.31 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false National security. § 1260.31 Section Â... AGREEMENTS General Provisions § 1260.31 National security. National Security October 2000 Normally, NASA... performing on the grant who will have access to the information must obtain the appropriate...

  7. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  8. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  9. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  10. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  11. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  12. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  13. Data security on the national fusion grid

    SciTech Connect

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-06-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER.

  14. Computer Security: The Human Element.

    ERIC Educational Resources Information Center

    Guynes, Carl S.; Vanacek, Michael T.

    1981-01-01

    The security and effectiveness of a computer system are dependent on the personnel involved. Improved personnel and organizational procedures can significantly reduce the potential for computer fraud. (Author/MLF)

  15. Nevada National Security Site Environmental Report 2012

    SciTech Connect

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  16. Security Economics and Critical National Infrastructure

    NASA Astrophysics Data System (ADS)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  17. Overview of Scientific Freedom and National Security

    NASA Astrophysics Data System (ADS)

    Lerch, Irving

    2000-04-01

    The subject of our scrutiny is very much in the news, punctuated with nouns and modifiers both inflammatory and mundane such as espionage, justice, scientific accountability and scientific freedom. And while our discussion will focus on these issues, I want to raise some of the pragmatic questions that bear on the foundation of our support for international science. Beneath questions of guilt and the loss of secrets in the Wen Ho Lee case lay the inherent tension between the tradition of open exchange in the scientific enterprise and the need to protect the nation's security. How this balance is to be achieved in a democratic society has bedeviled us ever since the Manhattan project heralded the emergence of science and technology as instruments of great national power. If we do not find this balance, we run the risk of damaging some of the most important intellectual treasures that the US has produced the Department of Energy's national laboratories and the entire system that we call the international scientific enterprise. For while the superheated charges of lax security and criminal negligence have led some to call for ``firewalls" to isolate and protect the secrets in our weapons labs, such measures may have severe consequences for weapons and non-weapons labs alike and their many associated universities. It's estimated that from 70% to as much as 80% in the expansion of our economy is technology-driven, derived from the most productive system of scientific innovation in the world. This is also true of our national security. Science is indispensable to the development and maintenance of the nation's arsenals. The Department of Energy's Nuclear Stockpile Stewardship Program is central to the safety and reliability of American nuclear weapons and to our hope for a worldwide ban on nuclear tests. But this program will fail without a continuing intense development effort based on cutting-edge science. And a great deal of the science needed is being pursued in

  18. Y-12 National Security Complex Water Assessment

    SciTech Connect

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  19. 78 FR 16699 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... our public dockets in the January 17, 2008 issue of the Federal Register (73 FR 3316) Docket: Any... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of Federal Advisory Committee Meeting. SUMMARY: The National Maritime Security...

  20. 77 FR 51817 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-27

    ... the January 17, 2008 issue of the Federal Register (73 FR 3316). Docket: Any background information or... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of Federal Advisory Committee Meeting. SUMMARY: The National Maritime Security...

  1. 78 FR 19277 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-29

    ..., 2008 issue of the Federal Register (73 FR 3316). Docket: Any background information or presentations... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: United States Coast... published a notice of meeting for the National Maritime Security Advisory Committee (NMSAC) in the...

  2. National Human Genome Research Institute

    MedlinePlus

    ... Director Organization Reports & Publications Español The National Human Genome Research Institute conducts genetic and genomic research, funds ... study, led by researchers at the National Human Genome Research Institute and the Eunice Kennedy Shriver National ...

  3. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., and other groups dealing with national security, intelligence, or counterintelligence matters; (4... components of the Department as appropriate, with regard to intelligence, counterintelligence, or national... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national...

  4. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., and other groups dealing with national security, intelligence, or counterintelligence matters; (4... components of the Department as appropriate, with regard to intelligence, counterintelligence, or national... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national...

  5. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy... Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on March 24, 2010 from 10 a.m. to 12 p.m....

  6. Extreme Scale Computing to Secure the Nation

    SciTech Connect

    Brown, D L; McGraw, J R; Johnson, J R; Frincke, D

    2009-11-10

    Since the dawn of modern electronic computing in the mid 1940's, U.S. national security programs have been dominant users of every new generation of high-performance computer. Indeed, the first general-purpose electronic computer, ENIAC (the Electronic Numerical Integrator and Computer), was used to calculate the expected explosive yield of early thermonuclear weapons designs. Even the U. S. numerical weather prediction program, another early application for high-performance computing, was initially funded jointly by sponsors that included the U.S. Air Force and Navy, agencies interested in accurate weather predictions to support U.S. military operations. For the decades of the cold war, national security requirements continued to drive the development of high performance computing (HPC), including advancement of the computing hardware and development of sophisticated simulation codes to support weapons and military aircraft design, numerical weather prediction as well as data-intensive applications such as cryptography and cybersecurity U.S. national security concerns continue to drive the development of high-performance computers and software in the U.S. and in fact, events following the end of the cold war have driven an increase in the growth rate of computer performance at the high-end of the market. This mainly derives from our nation's observance of a moratorium on underground nuclear testing beginning in 1992, followed by our voluntary adherence to the Comprehensive Test Ban Treaty (CTBT) beginning in 1995. The CTBT prohibits further underground nuclear tests, which in the past had been a key component of the nation's science-based program for assuring the reliability, performance and safety of U.S. nuclear weapons. In response to this change, the U.S. Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship (SBSS) program in response to the Fiscal Year 1994 National Defense Authorization Act, which requires, 'in the absence of nuclear

  7. Global threats to human water security and river biodiversity.

    PubMed

    Vörösmarty, C J; McIntyre, P B; Gessner, M O; Dudgeon, D; Prusevich, A; Green, P; Glidden, S; Bunn, S E; Sullivan, C A; Liermann, C Reidy; Davies, P M

    2010-09-30

    Protecting the world's freshwater resources requires diagnosing threats over a broad range of scales, from global to local. Here we present the first worldwide synthesis to jointly consider human and biodiversity perspectives on water security using a spatial framework that quantifies multiple stressors and accounts for downstream impacts. We find that nearly 80% of the world's population is exposed to high levels of threat to water security. Massive investment in water technology enables rich nations to offset high stressor levels without remedying their underlying causes, whereas less wealthy nations remain vulnerable. A similar lack of precautionary investment jeopardizes biodiversity, with habitats associated with 65% of continental discharge classified as moderately to highly threatened. The cumulative threat framework offers a tool for prioritizing policy and management responses to this crisis, and underscores the necessity of limiting threats at their source instead of through costly remediation of symptoms in order to assure global water security for both humans and freshwater biodiversity.

  8. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  9. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  10. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  11. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  12. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... national security. (c)(1) The Chief, Controls Division, Office of Intelligence Liaison, Directorate for... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National...

  13. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... national security. (c)(1) The Chief, Controls Division, Office of Intelligence Liaison, Directorate for... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National...

  14. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... national security. (c)(1) The Chief, Controls Division, Office of Intelligence Liaison, Directorate for... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National...

  15. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... national security. (c)(1) The Chief, Controls Division, Office of Intelligence Liaison, Directorate for... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National...

  16. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  17. Nevada National Security Site Groundwater Program

    ScienceCinema

    None

    2016-07-12

    From 1951 to 1992, the Unites States government conducted 828 underground nuclear tests at the Nevada National Security Site. About one-third of these tests occurred near, below or within the water table - the very top portion of the groundwater layer where rock and soil are completely saturated with water. As a result, some groundwater was contaminated. The U.S. Department of Energy (DOE) began exploring the effects of groundwater contamination in the 1970s. Though contamination from underground testing has never been detected on public land, the DOE was committed to developing an advanced, reliable monitoring network that ensures the long-term protection of the public. An intensive groundwater investigation program was launched in 1989.

  18. Nevada National Security Site Groundwater Program

    SciTech Connect

    2010-03-25

    From 1951 to 1992, the Unites States government conducted 828 underground nuclear tests at the Nevada National Security Site. About one-third of these tests occurred near, below or within the water table - the very top portion of the groundwater layer where rock and soil are completely saturated with water. As a result, some groundwater was contaminated. The U.S. Department of Energy (DOE) began exploring the effects of groundwater contamination in the 1970s. Though contamination from underground testing has never been detected on public land, the DOE was committed to developing an advanced, reliable monitoring network that ensures the long-term protection of the public. An intensive groundwater investigation program was launched in 1989.

  19. Nevada National Security Site Radiation Protection Program

    SciTech Connect

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  20. Nevada National Security Site Radiological Control Manual

    SciTech Connect

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  1. Input from Key Stakeholders in the National Security Technology Incubator

    SciTech Connect

    2008-01-31

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  2. Neuroscience, Ethics, and National Security: The State of the Art

    PubMed Central

    Tennison, Michael N.; Moreno, Jonathan D.

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security. PMID:22448146

  3. Status of Educational Efforts in National Security Workforce

    SciTech Connect

    2008-03-31

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  4. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-12

    ... rule FR Doc. E9-28517, beginning on page 62531 in the issue of November 30, 2009, make the following... RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY: Information Security Oversight Office, NARA....

  5. 78 FR 48037 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    ... required security education training for employees of NRC licensees possessing security clearances so that... National Security Information, which was published in the Federal Register on January 5, 2010 (75 FR 707... implementation of the Executive Order, issued a final rule (75 FR 37254; June 28, 2010) amending 32 CFR...

  6. Jimmy Carter's National Security Policy: A World Order Critique.

    ERIC Educational Resources Information Center

    Johansen, Robert C.

    This essay evaluates the Carter administration's behavior on national security questions and appraises the extent to which it meets Carter's initial professed national security goals. These goals include the intention to reduce military expenditures, to halt the nuclear arms buildup of the United States and U.S.S.R., to prevent the spread of…

  7. 77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    .... Correction In the Federal Register of April 25, 2012, in FR Doc 2012-9979, on page 24728, in the third column... SECURITY President's National Security Telecommunications Advisory Committee; Correction AGENCY: National... Telecommunications Advisory Committee (NSTAC) meeting. The document contained incorrect information regarding...

  8. 40 CFR 91.1008 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE SPARK-IGNITION ENGINES Exclusion and Exemption of Marine SI Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... request a national security exemption for any marine SI engine, otherwise subject to this part, which...

  9. Arms Control and National Security: An Introduction. Advance Edition.

    ERIC Educational Resources Information Center

    Arms Control Association, Washington, DC.

    Suitable for use with high school students, this booklet on arms control and national security provides background information, describes basic concepts, reviews recent history, and offers suggestions for further reading. The first section, on American attitudes toward national security and arms control, defines five types of limits on weapons…

  10. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 501.2 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND... unauthorized disclosure of such information would pose a threat to the national security and that there is a... information would pose a threat to the national security. The authority of the Director under this...

  11. 76 FR 40296 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-08

    ... Order, Classified National Security Information, 75 FR 733, 3 CFR, 2009 Comp., p. 412; 32 CFR part 2001... without proper authority? Authority: 44 U.S.C. 2101 to 2118; 5 U.S.C. 552; E.O. 13526, 75 FR 707, 3 CFR... RECORDS ADMINISTRATION 36 CFR Part 1260 RIN 3095-AB64 Declassification of National Security...

  12. 77 FR 9214 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... Education Board. The purpose of the meeting is to review and make recommendations to the Secretary of Defense concerning requirements established by the David L. Boren National Security Education Act,...

  13. Nevada National Security Site Environmental Report 2010

    SciTech Connect

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  14. US national security policy. Revision. Final report

    SciTech Connect

    Not Available

    1986-03-01

    This essay is intended to survey the basic framework within which the United States will make national security decisions in the year 2010, focusing especially on American orientation toward the Atlantic (Europe) or the Pacific (Asia). Such a task for projecting the international environment some 30 years into the future is an intrinsically speculative intellectual exercise. The idea of this essay is that the existing international environment will more likely than not continue to be the pattern in 2010 -- primarily because of the constraints established by the existence of nuclear weapons and the probable continuance of the U.S.-Soviet rivalry as the central factor in world politics. This suggests that the relative importance the United States has given to the Atlantic/Europe and the Pacific/Asia since 1945 will not shift dramatically. Section III then examines circumstances that might bring about a significant change or revolution in world politics by 2010, and the impact that this situation might have on the Atlantic-Pacific equation. This situation has two important implications for the US Navy and the associated U.S. power-projection forces. First, in terms of their contribution to the central U.S. alliance system, they should develop the followthrough for the defeat of the Red Fleet that will remain their overriding objective. Second, in terms of its contribution to the peripheral U.S. alliance system, the USN should refine its ability to fight and win limited conflicts.

  15. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... System DEPARTMENT OF COMMERCE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of... prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National... favorable results. No national security material or documents shall be removed from a Department of...

  16. Design of the national health security preparedness index.

    PubMed

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  17. A deeper look at climate change and national security.

    SciTech Connect

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  18. ED security: a national telephone survey.

    PubMed

    Ellis, G L; Dehart, D A; Black, C; Gula, M J; Owens, A

    1994-03-01

    To determine current practices regarding security measures in the emergency department (ED), a random sample of 250 hospitals with EDs was surveyed by telephone. Security issues addressed included personnel (in-house security, contract guards, or police), hours of staffing in the ED, how security is armed, whether ED doors are locked at off-hours, and whether alarm buttons, direct phone lines, a paging code, closed circuit surveillance, metal detectors, and seclusion rooms are used. This information was stratified according to hospital size, ED census, rural/suburban/urban setting, teaching/nonteaching status, and region. Generally, on-site security presence increases with increasing hospital size and ED census, suburban and urban locations, and teaching status. Small, rural hospitals are more likely to lock the ED doors at off-hours, whereas the use of security codes does not clearly follow demographic trends. Larger hospitals in suburban and urban settings and having a teaching status are more likely to have secure/detention rooms and closed circuit surveillance. The use of alarm buttons and/or direct telephone lines varies widely, but is generally more common in larger, teaching hospitals, located in urban and suburban settings.

  19. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access to restricted data and national security information introduced into proceedings. Except as...

  20. External Service Providers to the National Security Technology Incubator

    SciTech Connect

    2008-02-28

    This report documents the identification and assessment of external service providers to the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant to Arrowhead Center, New Mexico State University. This report contains 1) a summary of the services to be provided by NSTI; 2) organizational descriptions of external service providers; and 3) a comparison of NSTI services and services offered by external providers.

  1. Expansion of National Security Agency Oversight Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-01

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held...

  3. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held...

  4. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... meeting. To discuss National Industrial Security Program policy matters. DATES: The meeting will be...

  5. Composing Alternatives to a National Security Language Policy

    ERIC Educational Resources Information Center

    Wible, Scott

    2009-01-01

    President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…

  6. The Curious National Security Pendulum: Openness and/or Censorship.

    ERIC Educational Resources Information Center

    Marwick, Christine M.

    1979-01-01

    Lawsuits illustrate the increasing concern over national security in regulating the security classification system, and government attitudes toward information have shifted from secrecy to openness to censorship. The Central Intelligence Agency's suppression of unclassified printed information is a case in point. (SW)

  7. 75 FR 22151 - National Maritime Security Advisory Committee; Vacancies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-27

    ....homeport.uscg.mil under Missions>Maritime Security>National Maritime Security Advisory Committee>Member... serve an additional term of office but must re-apply in accordance with this notice. Applicants with... the mission of the Coast Guard. If you are selected as a non-representative member, or as a member...

  8. National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook

    NASA Technical Reports Server (NTRS)

    Roback, E.

    1991-01-01

    The NASA Automated Information Security Handbook provides NASA's overall approach to automated information systems security including discussions of such aspects as: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers.

  9. A National Partnership for Careers in Public Safety and Security

    ERIC Educational Resources Information Center

    Coffee, Joseph

    2007-01-01

    A partnership of state, local and federal public safety agencies, secondary and postsecondary educational institutions, and professional and educational associations, the National Partnership for Careers in Law, Public Safety, Corrections and Security also serves as the lead organization for the Law, Public Safety, Corrections and Security Career…

  10. The Superpowers: Nuclear Weapons and National Security. Teacher's Guide. National Issues Forums in the Classroom.

    ERIC Educational Resources Information Center

    Levy, Tedd

    This teacher's guide is designed to accompany the National Issues Forums'"The Superpowers: Nuclear Weapons and National Security." Activities and ideas are provided to challenge students to debate and discuss the United States-Soviet related issues of nuclear weapons and national security. The guide is divided into sections that describe: (1)…

  11. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... statement “THIS ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1042.635.”. [73 FR 37243, June 30..., specialized electronic warfare systems, unique stealth performance requirements, and/or unique...

  12. Analytical Chemistry for Homeland Defense and National Security

    SciTech Connect

    S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  13. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... segregation and marking of such securities and investments may be accomplished by putting them in separate... of the examination, shall be attached to a completed Form N-17f-1 (17 CFR 274.219) and transmitted to... a member of a national securities exchange of any obligation under existing law or under the...

  14. The importance of establishing a national health security preparedness index.

    PubMed

    Lumpkin, John R; Miller, Yoon K; Inglesby, Tom; Links, Jonathan M; Schwartz, Angela T; Slemp, Catherine C; Burhans, Robert L; Blumenstock, James; Khan, Ali S

    2013-03-01

    Natural disasters, infectious disease epidemics, terrorism, and major events like the nuclear incident at Fukushima all pose major potential challenges to public health and security. Events such as the anthrax letters of 2001, Hurricanes Katrina, Irene, and Sandy, severe acute respiratory syndrome (SARS) and West Nile virus outbreaks, and the 2009 H1N1 influenza pandemic have demonstrated that public health, emergency management, and national security efforts are interconnected. These and other events have increased the national resolve and the resources committed to improving the national health security infrastructure. However, as fiscal pressures force federal, state, and local governments to examine spending, there is a growing need to demonstrate both what the investment in public health preparedness has bought and where gaps remain in our nation's health security. To address these needs, the Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (PHPR), is creating an annual measure of health security and preparedness at the national and state levels: the National Health Security Preparedness Index (NHSPI). PMID:23506403

  15. The importance of establishing a national health security preparedness index.

    PubMed

    Lumpkin, John R; Miller, Yoon K; Inglesby, Tom; Links, Jonathan M; Schwartz, Angela T; Slemp, Catherine C; Burhans, Robert L; Blumenstock, James; Khan, Ali S

    2013-03-01

    Natural disasters, infectious disease epidemics, terrorism, and major events like the nuclear incident at Fukushima all pose major potential challenges to public health and security. Events such as the anthrax letters of 2001, Hurricanes Katrina, Irene, and Sandy, severe acute respiratory syndrome (SARS) and West Nile virus outbreaks, and the 2009 H1N1 influenza pandemic have demonstrated that public health, emergency management, and national security efforts are interconnected. These and other events have increased the national resolve and the resources committed to improving the national health security infrastructure. However, as fiscal pressures force federal, state, and local governments to examine spending, there is a growing need to demonstrate both what the investment in public health preparedness has bought and where gaps remain in our nation's health security. To address these needs, the Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (PHPR), is creating an annual measure of health security and preparedness at the national and state levels: the National Health Security Preparedness Index (NHSPI).

  16. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  17. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  18. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  19. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  20. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  1. Classified Component Disposal at the Nevada National Security Site

    SciTech Connect

    Poling, J.; Arnold, P.; Saad, M.; DiSanza, F.; Cabble, K.

    2012-11-05

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012.

  2. Welcome to Los Alamos National Laboratory: A premier national security science laboratory

    SciTech Connect

    Wallace, Terry

    2012-06-25

    Dr Wallace presents visitors with an overview of LANL's national security science mission: stockpile stewardship, protecting against the nuclear threat, and energy security & emerging threats, which are underpinned by excellence in science/technology/engineering capabilities. He shows visitors a general Lab overview of budget, staff, and facilities before providing a more in-depth look at recent Global Security accomplishments and current programs.

  3. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  4. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  5. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 25 2014-07-01 2014-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  6. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  7. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 26 2012-07-01 2011-07-01 true National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  8. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false National security-classified information. 1256.46 Section 1256.46 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE ACCESS TO RECORDS AND DONATED HISTORICAL MATERIALS...

  9. Risk assessment of climate systems for national security.

    SciTech Connect

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul G; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  10. Marketing Plan for the National Security Technology Incubator

    SciTech Connect

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  11. Materials @ LANL: Solutions for National Security Challenges

    NASA Astrophysics Data System (ADS)

    Teter, David

    2012-10-01

    Materials science activities impact many programmatic missions at LANL including nuclear weapons, nuclear energy, renewable energy, global security and nonproliferation. An overview of the LANL materials science strategy and examples of materials science programs will be presented. Major materials leadership areas are in materials dynamics, actinides and correlated electron materials, materials in radiation extremes, energetic materials, integrated nanomaterials and complex functional materials. Los Alamos is also planning a large-scale, signature science facility called MaRIE (Matter Radiation Interactions in Extremes) to address in-situ characterization of materials in dynamic and radiation environments using multiple high energy probes. An overview of this facility will also be presented.

  12. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-01

    ... ] Industrial Security Program policy matters. Dated: February 23, 2012. Mary Ann Hadyka, Committee Management... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program...

  13. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... committee meeting, to discuss National Industrial Security Program policy matters. DATES: The meeting will... Management Officer. BILLING CODE 7515-01-P...

  14. A National Climate Change Adaptation Network for Protecting Water Security

    NASA Astrophysics Data System (ADS)

    Weaver, A.; Sauchyn, D.; Byrne, J. M.

    2009-12-01

    Water security and resource-dependent community-survival are being increasingly challenged as a consequence of climate change, and it is urgent that we plan now for the security of our water supplies which support our lives and livelihoods. However, the range of impacts of climate change on water availability, and the consequent environmental and human adaptations that are required, is so complex and serious that it will take the combined work of natural, health and social scientists working with industries and communities to solve them. Networks are needed that will identify crucial water issues under climate change at a range of scales in order to provide regionally-sensitive, solutions-oriented research and adaptation. We suggest national and supra-national water availability and community sustainability issues must be addressed by multidisciplinary research and adaptation networks. The work must be driven by a bottom-up research paradigm — science in the service of community and governance. We suggest that interdisciplinary teams of researchers, in partnership with community decision makers and local industries, are the best means to develop solutions as communities attempt to address future water demands, protect their homes from infrastructure damage, and meet their food, drinking water, and other essential resource requirements. The intention is to cover: the impact of climate change on Canadian natural resources, both marine and terrestrial; issues of long-term sustainability and resilience in human communities and the environments in which they are embedded; the making and moving of knowledge, be that between members of Indigenous and non-Indigenous communities, researchers of different disciplines, communities, industry, policymakers and the academy and the crucial involvement of the various orders of government in the response to water problems, under conditions of heightened uncertainty. Such an adaptation network must include a national

  15. 77 FR 19970 - Security Zones; 2012 Republican National Convention, Captain of the Port St. Petersburg Zone...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-03

    ... Convention as a National Special Security Event. National Special Security Events are significant events... Republican National Convention as a National Special Security Event. The security zones are necessary to..., 2008, issue of the Federal Register (73 FR 3316). Public Meeting We do not anticipate convening...

  16. Neutron Detection Alternatives to 3He for National Security Applications

    SciTech Connect

    Kouzes, Richard T.; Ely, James H.; Erikson, Luke E.; Kernan, Warnick J.; Lintereur, Azaree T.; Siciliano, Edward R.; Stephens, Daniel L.; Stromswold, David C.; Van Ginhoven, Renee M.; Woodring, Mitchell L.

    2010-11-21

    One of the main uses for 3He is in gas proportional counters for neutron detection. Large radiation detection systems deployed for homeland security and proliferation detection applications use such systems. Due to the large increase in use of 3He for homeland security and basic research, the supply has dwindled, and can no longer meet the demand. This has led to the search for an alternative technology to replace the use of 3He-based neutron detectors. In this paper, we review the testing of currently commercially available alternative technologies for neutron detection in large systems used in various national security applications.

  17. 76 FR 81359 - National Security Personnel System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ... issued on November 1, 2005 (70 FR 66116). The NSPS law was subsequently amended by section 1106 of Public... amendments resulted in revised DOD/OPM regulations, which were issued on September 26, 2008 (73 FR 56344) and January 16, 2009 (74 FR 2757). Section 1113 of the National Defense Authorization Act for Fiscal Year...

  18. The Intersection of National Security and Climate Change

    SciTech Connect

    Hund, Gretchen; Fankhauser, Jana G.; Kurzrok, Andrew J.; Sandusky, Jessica A.

    2014-07-29

    On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.

  19. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    ERIC Educational Resources Information Center

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  20. Nevada National Security Site Environmental Report 2011 Summary

    SciTech Connect

    Cathy Wills, ed

    2012-09-12

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  1. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  2. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  3. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  4. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  5. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  6. 17 CFR 240.11a1-4(T) - Bond transactions on national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Bond transactions on national securities exchanges. 240.11a1-4(T) Section 240.11a1-4(T) Commodity and Securities Exchanges SECURITIES AND....11a1-4(T) Bond transactions on national securities exchanges. A transaction in a bond, note,...

  7. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-11

    ... From the Federal Register Online via the Government Publishing Office ] NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY... made for the following committee meeting. To discuss National Industrial Security Program...

  8. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-09

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on July...

  9. 77 FR 41688 - Security Zones; 2012 Republican National Convention, Captain of the Port St. Petersburg Zone...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-16

    ... National Special Security Event. National Special Security Events are significant events, which, due to... Convention as a National Special Security Event. The security zones are necessary to protect convention..., FL in the Federal Register (77 FR 64). We received one comment on the proposed rule. Public...

  10. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 19 2013-07-01 2013-07-01 false National security exemption. 85.1708 Section 85.1708 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and...

  11. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 18 2011-07-01 2011-07-01 false National security exemption. 85.1708 Section 85.1708 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and...

  12. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 19 2014-07-01 2014-07-01 false National security exemption. 85.1708 Section 85.1708 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and...

  13. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708 Section 85.1708 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and...

  14. Identifying the Enemy: Social Categorization and National Security Policy

    ERIC Educational Resources Information Center

    Unsworth, Kristene

    2010-01-01

    This dissertation seeks to understand the interplay between informal articulations of social categories and formal instantiations of those categories in official language. Specifically, it explores the process of social categorization as it is used to identify threats to national security. The research employed a qualitative, document-based,…

  15. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... effectively coordinated; (2) Develop, enforce, and supervise the application of all federal criminal laws... as appropriate, to Government agencies on matters of national security law and policy; (6) Administer... and law; (11) Formulate policy alternatives and recommend action by the Department and other...

  16. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... maneuverability requirements. This applies to both remanufactured and freshly manufactured marine engines. Gas turbine engines are also exempt without a request if they will be owned by an agency of the Federal... ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1042.635.”....

  17. The National Security Language Initiative and the Teaching of Hindi

    ERIC Educational Resources Information Center

    Shinge, Manjula

    2008-01-01

    This article discusses the teaching of Hindi in the USA, with special reference to the National Security Language Initiative (NSLI). Asian Indian languages are briefly described, as are the growth and diversification of the Asian Indian population in the USA. The inclusion of Hindi in the NSLI, and the implications of this decision for the…

  18. Academics and National-Security Experts Must Work Together

    ERIC Educational Resources Information Center

    Gansler, Jacques S.; Gast, Alice P.

    2008-01-01

    In the years since the September 11, 2001, terrorist attacks, the federal government's policies that deal with national security have changed significantly. In an effort to prevent the results of science and engineering research from being misused or falling into the wrong hands, government agencies that support studies are placing restrictions on…

  19. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America. ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United...

  20. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America. ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United...

  1. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America. ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United...

  2. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America. ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United...

  3. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America. ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United...

  4. National Security and Information Technology: The New Regulatory Option?

    ERIC Educational Resources Information Center

    Irwin, Manley R.

    1987-01-01

    Summarizes recent developments in information technology research and development, telecommunication services, telephone manufacturing, telecommunication networks, information processing, and U.S. import/export policy. It is concluded that government regulation as a policy strategy depends on how one defines national security. (Author/CLB)

  5. Components of a Course on National Security Policy.

    ERIC Educational Resources Information Center

    Quester, George H.

    1987-01-01

    Describes the components of a course on the formation of national security policy. Includes information on the amount of emphasis and instructional approach to take with each component of the course. Components include the nature of strategy, the role of war in international politics, disarmament and arms control, nuclear weapons and nuclear war,…

  6. Achieving Youth Employment and National Security in Nigeria: TVET Imperatives

    ERIC Educational Resources Information Center

    Ogbuanya, T. C.; Ofonmbuk, Michael

    2015-01-01

    The rate of unemployment in Nigeria is alarming and could promote social vices some of which are kidnapping, armed robbery, child trafficking, Cultism, Drug peddling and ritual killing. These social vices could in no small measure constitute a threat to national security as a matter of fact. Therefore, the development of a workable Technical and…

  7. 76 FR 81827 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... Order, Classified National Security Information,'' 75 FR 733, 3 CFR, 2009 Comp., p. 412; 32 CFR Part...@nara.gov . ] SUPPLEMENTARY INFORMATION: On July 8, 2011, NARA published a proposed rule (76 FR 40296... without proper authority? Authority: 44 U.S.C. 2101 to 2118; 5 U.S.C. 552; E.O. 13526, 75 FR 707, 3...

  8. 75 FR 77783 - Designation of National Security Positions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-14

    ... classified information. For example, positions involving protection from terrorism have the potential to... include ``protecting the nation, its citizens and residents from acts of terrorism, espionage, or foreign...--Security Requirements for Government Employment (April 27, 1953), 18 FR 2489, 3 CFR 1949-1953 Comp., p....

  9. Department of Energy award DE-SC0004164 Climate and National Security: Securing Better Forecasts

    SciTech Connect

    Reno Harnish

    2011-08-16

    The Climate and National Security: Securing Better Forecasts symposium was attended by senior policy makers and distinguished scientists. The juxtaposition of these communities was creative and fruitful. They acknowledged they were speaking past each other. Scientists were urged to tell policy makers about even improbable outcomes while articulating clearly the uncertainties around the outcomes. As one policy maker put it, we are accustomed to making these types of decisions. These points were captured clearly in an article that appeared on the New York Times website and can be found with other conference materials most easily on our website, www.scripps.ucsd.edu/cens/. The symposium, generously supported by the NOAA/JIMO, benefitted the public by promoting scientifically informed decision making and by the transmission of objective information regarding climate change and national security.

  10. Human Health and Global Security. Relevance to Medical Education.

    ERIC Educational Resources Information Center

    Kornfeld, Howard

    1984-01-01

    Programs in human health and global security should be incorporated into medical school curricula. Information about nuclear arms proliferation and unmet human health needs will help physicians exert a critical leadership role. (SK)

  11. 78 FR 48076 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    ... National Security Information and Restricted Data AGENCY: Nuclear Regulatory Commission. ACTION: Proposed... INFORMATION AND RESTRICTED DATA 0 1. The authority citation for part 95 continues to read as follows... Information (75 FR 707; January 5, 2010), before derivatively classifying information and at least once...

  12. 78 FR 69286 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    ... Information and Restricted Data AGENCY: Nuclear Regulatory Commission. ACTION: Direct final rule; confirmation...; telephone: 301-415-3501; email: Daniel.Lenehan@nrc.gov . SUPPLEMENTARY INFORMATION: On August 7, 2013 (78 FR..., Classified National Security Information. In addition, this direct final rule allowed licensees...

  13. National Security Letters, the USA PATRIOT Act, and the Constitution: The Tensions between National Security and Civil Rights

    ERIC Educational Resources Information Center

    Gorham-Oscilowski, Ursula; Jaeger, Paul T.

    2008-01-01

    In response to the terrorist attacks of 9/11, the USA PATRIOT Act greatly expanded the ability of the Federal Bureau of Investigation to use National Security Letters (NSLs) in investigations and the contexts in which they could be used by relaxing the standards under which NSLs could be employed. NSLs allow investigators to acquire a significant…

  14. United States national security policy making and Vietnam

    SciTech Connect

    Davidson, M.W.

    1985-01-01

    The United States failed to achieve its goals in waging a war in Vietnam. This thesis endeavors to show that this failure was due to errors in the formulation of American national security policy regarding Vietnam. The policy making process went astray, at least in part, due to a narrowing of the role of senior military officers as national security policy makers. The restricted role of senior officers as national security policy makers adversely affected American policy formulation regarding Vietnam. The United States response to the coup against Diem in 1963 and the deployment of conventional American forces to ground combat in Vietnam, in 1965 were undertaken without a clear recognition of the considerable costs of the commitments being assumed. Senior military officers had prompted such a recognition in similar previous crises but were not in a policy making position to do so concerning Vietnam. The policymaking input that was absent was ethical counsel of a fundamental nature. Clausewitz viewed the mortality of a war as being embodied in the national will to fight that war. The absence of an accurate appreciation of the costs of a military solution in Vietnam denied civilian officials a critical policy making factor and contributed significantly to the defeat of the American purpose there.

  15. The Indian National Food Security Act, 2013: a commentary.

    PubMed

    Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura

    2014-06-01

    The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level. PMID:25076773

  16. The Indian National Food Security Act, 2013: a commentary.

    PubMed

    Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura

    2014-06-01

    The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level.

  17. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Physical Security § 95.25 Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... Information and/or Restricted Data depending upon the matter authorized to be stored in the security...

  18. Measuring Human Performance within Computer Security Incident Response Teams

    SciTech Connect

    McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel; Forsythe, James C.

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  19. 75 FR 25844 - Federal Advisory Committee; National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-10

    ....m. ADDRESSES: The meeting will be held at the National Security Education Program; 1101 Wilson Blvd..., National Security Education Program, 1101 Wilson Boulevard, Suite 1210, Rosslyn, Virginia 22209-2248;...

  20. A brief history of Sandia's National security missions.

    SciTech Connect

    Drewien, Celeste A.; O'Canna, Myra Lynn; Stikar, John Anthony.

    2014-09-01

    To help members of the workforce understand what factors contribute to Sandia National Laboratories national security mission, the authors describe the evolution of Sandias core mission and its other mission components. The mission of Sandia first as a division of Los Alamos and later as Sandia Corporation underlies our core nuclear weapon mission of today. Sandias mission changed in 1963 and twice more in the 1970s. This report should help staff and management appreciate the need for mission evolution. A clear definition and communication of a consistent corporate mission statement is still needed.

  1. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    NASA Astrophysics Data System (ADS)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive

  2. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    SciTech Connect

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    2000-06-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

  3. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... the strength of our national economy and the capacity of the United States to meet national security... imports on the national security. 705.4 Section 705.4 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE...

  4. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the strength of our national economy and the capacity of the United States to meet national security... imports on the national security. 705.4 Section 705.4 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE...

  5. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data... Restricted Data or other National Security Information to the issues in the preceeding, and its...

  6. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice... Restricted Data or National Security Information into the proceeding, it will file a notice of intent...

  7. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data...

  8. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Protection of restricted data and national security... Special Procedures Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing...

  9. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Protection of restricted data and national security... Special Procedures Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing...

  10. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data...

  11. The Impact of Migration Processes on the National Security of Kazakhstan

    ERIC Educational Resources Information Center

    Korganova, Saipzhamal S.; Taubayeva, Mirash Y.; Sultanov, Serik A.; Rysbayeva, Saule Zh.; Sultanova, Valida I.; Zhumabekov, Madiyr U.; Raximshikova, Mavluda K.

    2016-01-01

    The purpose of this study is to analyze the impact of migration processes on the national security of Kazakhstan. However, it should be noted that national security is an expression of national interests and it is provided by means of resources and efforts of a particular state. Consequently, social security is an expression of the public…

  12. 78 FR 31525 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... of the Secretary National Security Education Board; Notice of Federal Advisory Committee Meeting AGENCY: Under Secretary of Defense for Personnel and Readiness, Defense Language and National Security... following Federal advisory committee meeting of the National Security Education Board will take place....

  13. Repositioning Technical and Vocational Education and Training (TVET) for Youths Employment and National Security in Nigeria

    ERIC Educational Resources Information Center

    Ogbunaya, T. C.; Udoudo, Ekereobong S.

    2015-01-01

    The paper focused on repositioning Technical and Vocational Education and Training (TVET) for youth's employment and national security in Nigeria. It examined briefly the concepts of technical vocational education and training (TVET), youths, unemployment and national security as well as the effects of unemployment on national security in Nigeria.…

  14. Public perspectives on nuclear security. US national security surveys, 1993--1997

    SciTech Connect

    Herron, K.G.; Jenkins-Smith, H.C.

    1998-08-01

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between US and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.

  15. Oil market power and United States national security

    PubMed Central

    Stern, Roger

    2006-01-01

    It is widely believed that an oil weapon could impose scarcity upon the United States. Impending resource exhaustion is thought to exacerbate this threat. However, threat seems implausible when we consider strategic deficits of prospective weapon users and the improbability of impending resource exhaustion. Here, we explore a hypothesis relating oil to national security under a different assumption, abundance. We suggest that an oil cartel exerts market power to keep abundance at bay, commanding monopoly rents [or wealth transfers (wt)] that underwrite security threats. We then compare security threats attributed to the oil weapon to those that may arise from market power. We first reexamine whether oil is abundant or scarce by reviewing current development data, then we estimate a competitive price for oil. From this, we derive wt2004 collections by Persian Gulf states ≈ $132-178 × 109. We find that wt and the behavior of states collecting it interact to actuate security threats. Threats underwritten by wt are (i) the potential for emergence of a Persian Gulf superpower and (ii) terrorism. It is therefore oil market power, not oil per se, that actuates threats. We also describe a paradox in the relation of market power to the United States' defense doctrine of force projection to preempt a Gulf superpower. Because the superpower threat derives from wt, force alone cannot preempt it. A further paradox is that because foreign policy is premised on oil weapon fear, market power is appeased. Threats thereby grow unimpeded. PMID:16428291

  16. Ergonomics issues in national identity card for homeland security.

    PubMed

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security.

  17. Ergonomics issues in national identity card for homeland security.

    PubMed

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. PMID:22841592

  18. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    SciTech Connect

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  19. SDI (Strategic Defense Initiative) and national security policy. Research report

    SciTech Connect

    Davis, R.W.

    1988-04-01

    The paper attempts to answer the fundamental question of Can SDI make a significant contribution to US national security. It uses as its evaluation criteria historical arms-control measurements of stability, reduction in the probability of war, reduction in the consequences of war, economic benefits, and political benefits. A historical discussion of US nuclear strategy development along with Soviet thinking is provided as a backdrop to set the stage for an analysis of the reasons for President Reagan's March 1983 speech. The objectives of SDI are discussed along with the major concerns expressed by the program critics. Using the evaluation criteria defined above, the author analyzes SDI potential position in a long-term integrated national strategy that includes arms control and competitive strategies.

  20. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-08

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on March 20, 2013 from 10:00...

  1. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... From the Federal Register Online via the Government Publishing Office ] NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on November 14, 2012 from 10:00...

  2. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Information and Restricted Data. 95.35 Section 95.35 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data....

  3. Potential National Security Applications of Nuclear Resonance Fluorescence Methods

    SciTech Connect

    Warren, Glen A.; Peplowski, Patrick N.; Caggiano, Joseph A.

    2009-06-09

    The objective of this report is to document the initial investigation into the possible research issues related to the development of NRF-based national security applications. The report discusses several potential applications ranging from measuring uranium enrichment in UF6 canisters to characterization of gas samples. While these applications are varied, there are only a few research issues that need to be addressed to understand the limitation of NRF in solving these problems. These research issues range from source and detector development to measuring small samples. The next effort is to determine how best to answer the research issues, followed by a prioritization of those questions to ensure that the most important are addressed. These issues will be addressed through either analytical calculations, computer simulations, analysis of previous data or collection of new measurements. It will also be beneficial to conduct a thorough examination of a couple of the more promising applications in order to develop concrete examples of how NRF may be applied in specific situations. The goals are to develop an understanding of whether the application of NRF is limited by technology or physics in addressing national security applications, to gain a motivation to explore those possible applications, and to develop a research roadmap so that those possibilities may be made reality.

  4. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    SciTech Connect

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  5. Rivers in the Anthropocene: Mapping Human Water Security

    NASA Astrophysics Data System (ADS)

    Vorosmarty, C. J.; Green, P.

    2014-12-01

    Fresh water underpins countless benefits to society and is pivotal to the success of the food and energy sectors, industry and commerce, and the expanding urban domain. It provides essential cultural, recreational, and aesthetic values and also plays a critical role in the maintenance of ecosystem services and biodiversity. Recent analyses of water systems across the planet, summarized using high resolution, geospatial indicator maps of rivers, demonstrate that a wide array of stressors combine to produce a pattern of worldwide threat to much of the freshwater resource base that sustains human water supply and aquatic biodiversity. A pervasive, globally-significant pattern of management is evident in the contemporary setting, through which impairment accumulates as a function of wealth, but is then remedied by costly, after-the-fact technological investments. This strategy of treating symptoms while leaving unabated the underlying causes is practiced widely across rich countries, but it strands poor nations and much of the world's aquatic lifeforms at high levels of vulnerability. The seeds of such an approach to water management are hardly new and are evident throughout human history. This talk will explore the implications of these global realities and will focus on the role of 21st century engineering as in both contributing to the growing water crisis and stimulating innovation for more effective stewardship of our water resource systems. It will also present a first global synthesis of the geography of freshwater provisioning source areas, evaluating jointly the quantity and condition of freshwater produced from these areas, and the downstream populations served by these resources. A geospatial indicator is derived, the freshwater provisioning index for humans (FPIh), which constitutes an objective measure of the state of the resource base and its role in supporting human water security.

  6. Ares V: Game Changer for National Security Launch

    NASA Technical Reports Server (NTRS)

    Sumrall, Phil; Morris, Bruce

    2009-01-01

    NASA is designing the Ares V cargo launch vehicle to vastly expand exploration of the Moon begun in the Apollo program and enable the exploration of Mars and beyond. As the largest launcher in history, Ares V also represents a national asset offering unprecedented opportunities for new science, national security, and commercial missions of unmatched size and scope. The Ares V is the heavy-lift component of NASA's dual-launch architecture that will replace the current space shuttle fleet, complete the International Space Station, and establish a permanent human presence on the Moon as a stepping-stone to destinations beyond. During extensive independent and internal architecture and vehicle trade studies as part of the Exploration Systems Architecture Study (ESAS), NASA selected the Ares I crew launch vehicle and the Ares V to support future exploration. The smaller Ares I will launch the Orion crew exploration vehicle with four to six astronauts into orbit. The Ares V is designed to carry the Altair lunar lander into orbit, rendezvous with Orion, and send the mated spacecraft toward lunar orbit. The Ares V will be the largest and most powerful launch vehicle in history, providing unprecedented payload mass and volume to establish a permanent lunar outpost and explore significantly more of the lunar surface than was done during the Apollo missions. The Ares V consists of a Core Stage, two Reusable Solid Rocket Boosters (RSRBs), Earth Departure Stage (EDS), and a payload shroud. For lunar missions, the shroud would cover the Lunar Surface Access Module (LSAM). The Ares V Core Stage is 33 feet in diameter and 212 feet in length, making it the largest rocket stage ever built. It is the same diameter as the Saturn V first stage, the S-IC. However, its length is about the same as the combined length of the Saturn V first and second stages. The Core Stage uses a cluster of five Pratt & Whitney Rocketdyne RS-68B rocket engines, each supplying about 700,000 pounds of thrust

  7. Toward modeling regionally specific human security using GIS: case study Cambodia.

    PubMed

    Owen, Taylor; Slaymaker, Olav

    2005-08-01

    A new methodology for measuring human security is presented. The three stages of the methodology are: i) threat assessment, ii) data collection and organization, and iii) data visualization and analysis, using Geographic Information Systems. Results from a Cambodia case study are highlighted. The United Nations Development Program's notion of human security, which gives equal weight to economic, health, food, political, personal, and environmental factors, is used. Country-specific threats in each category are determined, and local, spatially referenced data are collected. In this paper, poverty, dengue fever, and tuberculosis are used as examples of the analytic process. Regions of Cambodia exposed to all three of these threats ("hot spots") are located, and spatial correlation between poverty, dengue fever, and tuberculosis is calculated. The methodology i) advances a broad concept of human security, ii) will potentially assist policy and decision makers, and iii) identifies research questions that cannot be resolved using single-sector analysis.

  8. 75 FR 76512 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Discontinue the Cost Basis Reporting Service December...

  9. Enhancing Nutrition Security via India's National Food Security Act: Using an Axe instead of a Scalpel?§

    PubMed Central

    Desai, Sonalde; Vanneman, Reeve

    2016-01-01

    In September 2013, India passed a historic National Food Security Act. This paper examines the potential impact of the two central pillars of this act - expansion of the Public Distribution System and strengthening of the Integrated Child Development Schemes – on child nutrition. Using new data from the India Human Development Survey of 2011-12, this paper shows that access to subsidized grains via PDS is not related to improved child nutrition, and while ICDS seems to be related to lower child undernutrition, it has a limited reach in spite of the universalization of the program. The paper suggests that a tiered strategy in dealing with child undernutrition that starts with the identification of undernourished children and districts and follows through with different strategies for dealing with severe, acute malnutrition, followed by a focus on moderate malnutrition, could be more effective than the existing focus on cereal distribution rooted in the NFSA. PMID:27034596

  10. Swords into plowshares: Military geology and national security projects

    SciTech Connect

    Neal, J.T.

    1994-12-31

    Military geology and national security projects are often comparable, achieving their rai-son d`etre in support of national goals, military operations, and/or systems-all for vital national interests. The application of Geoscience to these ends, especially engineering geology, has occurred from pole to pole and included every conceivable environment and natural condition. In the conduct of such projects, the Geosciences have advanced, and vice versa. Desert trafficability, most notably regarding playa surfaces, is both temporary and variable and not a persistent condition as some early authors believed. Playas in Australia, Iran, and the US show that saline efflorescence is removed following surface water dissolution and subsequent deflation, resulting in very hard crusts. Magadiite, a hydrous sodium silicate and possible precursor of bedded chert, was first discovered in North America at Alkali Lake, OR, during a military project. Pleistocene Lake Trinity, a small and mostly buried evaporate basin in the northern Jornada del Muerto, NM, was discovered during exploratory drilling in support of a military test program.

  11. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national...

  12. Magnetic Imaging: a New Tool for UK National Nuclear Security

    PubMed Central

    Darrer, Brendan J.; Watson, Joe C.; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-01

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications. PMID:25608957

  13. Magnetic imaging: a new tool for UK national nuclear security.

    PubMed

    Darrer, Brendan J; Watson, Joe C; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-01

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications.

  14. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    SciTech Connect

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  15. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  16. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  17. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  18. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  19. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... association promptly files a report on Form X-17A-19 including therewith, inter alia, information sufficient... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges...

  20. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on November 14, 2013 from 10:00 a... NISPPAC@nara.gov . Dated: October 21, 2013. Patrice Little Murray, Acting Committee Management...

  1. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on July 17, 2013 from 10:00 a.m... NISPPAC@nara.gov . Dated: June 19, 2013. Patrice Little Murray, Acting Committee Management...

  2. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-17

    ... Advisory Committee Meeting; Correction. SUMMARY: The Department of Homeland Security published a document... Alternate Designated Federal Officer, Department of Homeland Security, telephone (703) 235-5469. Correction... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF...

  3. 75 FR 38536 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ...) Sub-Committee. (3) DHS Global Supply Chain Security Strategy initiative. (4) Maritime Transportation Security Act update. (5) Update from CDC Strategy Working Group. (6) Update on the Small Vessel Security Strategy. Procedural This meeting is open to the public for the morning session and will also be...

  4. Scenario-Based Training on Human Errors Contributing to Security Incidents

    SciTech Connect

    Greitzer, Frank L.; Pond, Daniel J.; Jannotta, Marjorie

    2004-12-06

    Error assessment studies reveal that ''human errors'' are often the consequence of unsuitable environmental factors, ineffective systems, inappropriate task conditions, and individual actions or failures to act. The US Department of Energy (DOE) initiated a program to determine if system-induced human errors could also be contributing factors to security incidents. As the seminal basis for this work, the Enhanced Security Through Human Error Reduction (ESTHER) program at Los Alamos National Laboratory (LANL) produced a contributing factors data set and systems categorization for security related incidents attributed to human error. This material supports the development and delivery of training for security incident inquiry officials. While LANL's initial work focused on classroom training, a collaborative effort between LANL and Pacific Northwest National Laboratory (PNNL) has focused on delivering interactive e-Learning training applications based on ESTHER principles. Through training, inquiry officials will understand and be capable of applying the underlying human error control concepts to new or novel situations. Their performance requires a high degree of analysis and judgment to accomplish the associated cognitive and procedural tasks. To meet this requirement, we employed cognitive principles of instructional design to engage the learner in interactive, realistic, problem-centered activity; we constructed scenarios within a guided-discovery framework; and we utilized learner-centered developmental sequences leading to field application. To enhance the relevance and realism of the training experience, we employed 3-D modeling technologies in constructing interactive scenarios. This paper describes the application of cognitive learning principles, use of varied media, and the implementation challenges in developing a technology-rich, interactive security incident training program that includes Web-based training.

  5. American History and National Security: Supplementary Lessons for High School Courses.

    ERIC Educational Resources Information Center

    Patrick, John J., Ed.; And Others

    Effective citizen participation implies the acquisition of skills and knowledge necessary for discussing and deciding national security issues. This book was developed to provide teachers with resources to design and strengthen national security education. The 30 self-contained lessons supplement and enrich current textbook treatment of national…

  6. 77 FR 34029 - National Security Education Board Members Meeting; Cancellation of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-08

    .... SUMMARY: On May 11, 2012 (77 FR 27739), Department of Defense announced a meeting of the National Security... and National Security Education Office, 1101 Wilson Boulevard, Suite 1210, Arlington, VA 22209... Education Office (DLNSEO), 1101 Wilson Boulevard, Suite 1210, Arlington, Virginia 22209-2248; (703)...

  7. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... 10 Energy 2 2013-01-01 2013-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY...

  8. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... 10 Energy 2 2011-01-01 2011-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY...

  9. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... 10 Energy 2 2014-01-01 2014-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY...

  10. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... 10 Energy 2 2012-01-01 2012-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY...

  11. National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.

    ERIC Educational Resources Information Center

    Dane, Ernest B.

    To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…

  12. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division; interpretation of Executive Orders. 17.13 Section 17.13 Judicial Administration DEPARTMENT OF JUSTICE CLASSIFIED... Division; interpretation of Executive Orders. (a) The Assistant Attorney General for National Security or...

  13. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR... National Security Division Systems—limited access. (a) The following system of records is exempted...

  14. 75 FR 43492 - Federal Advisory Committee; National Security Education Board; Charter Renewal

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... of the Secretary Federal Advisory Committee; National Security Education Board; Charter Renewal... notice that it is renewing the charter for the National Security Education Board (hereafter referred to... desiring scholarships or fellowships, and institutions of higher education desiring grants under chapter...

  15. Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria

    ERIC Educational Resources Information Center

    Okolo, Nkiru Benjamin

    2016-01-01

    Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…

  16. National Security Science and Technology Initiative: Air Cargo Screening

    SciTech Connect

    Bingham, Philip R; White, Tim; Cespedes, Ernesto; Bowerman, Biays; Bush, John

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three explosive

  17. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  18. Need for a gender-sensitive human security framework: results of a quantitative study of human security and sexual violence in Djohong District, Cameroon

    PubMed Central

    2014-01-01

    Background Human security shifts traditional concepts of security from interstate conflict and the absence of war to the security of the individual. Broad definitions of human security include livelihoods and food security, health, psychosocial well-being, enjoyment of civil and political rights and freedom from oppression, and personal safety, in addition to absence of conflict. Methods In March 2010, we undertook a population-based health and livelihood study of female refugees from conflict-affected Central African Republic living in Djohong District, Cameroon and their female counterparts within the Cameroonian host community. Embedded within the survey instrument were indicators of human security derived from the Leaning-Arie model that defined three domains of psychosocial stability suggesting individuals and communities are most stable when their core attachments to home, community and the future are intact. Results While the female refugee human security outcomes describe a population successfully assimilated and thriving in their new environments based on these three domains, the ability of human security indicators to predict the presence or absence of lifetime and six-month sexual violence was inadequate. Using receiver operating characteristic (ROC) analysis, the study demonstrates that common human security indicators do not uncover either lifetime or recent prevalence of sexual violence. Conclusions These data suggest that current gender-blind approaches of describing human security are missing serious threats to the safety of one half of the population and that efforts to develop robust human security indicators should include those that specifically measure violence against women. PMID:24829613

  19. Health as human security in the occupied Palestinian territory.

    PubMed

    Batniji, Rajaie; Rabaia, Yoke; Nguyen-Gillham, Viet; Giacaman, Rita; Sarraj, Eyad; Punamaki, Raija-Leena; Saab, Hana; Boyce, Will

    2009-03-28

    We describe the threats to survival, development, and wellbeing in the occupied Palestinian territory using human security as a framework. Palestinian security has deteriorated rapidly since 2000. More than 6000 Palestinians have been killed by the Israeli military, with more than 1300 killed in the Gaza Strip during 22 days of aerial and ground attacks ending in January, 2009. Israeli destruction and control of infrastructure has severely restricted fuel supplies and access to water and sanitation. Palestinians are tortured in prisons and humiliated at Israeli checkpoints. The separation wall and the checkpoints prevent access to work, family, sites of worship, and health-care facilities. Poverty rates have risen sharply, and almost half of Palestinians are dependent on food aid. Social cohesion, which has kept Palestinian society intact, including the health-care system, is now strained. More than US$9 billion in international aid have not promoted development because Palestinians do not have basic security. International efforts focused on prevention of modifiable causes of insecurity, reinvigoration of international norms, support of Palestinian social resilience and institutions that protect them from threats, and a political solution are needed to improve human security in the occupied Palestinian territory. PMID:19268352

  20. 78 FR 8546 - National Center for Advancing Translational Sciences (NCATS) and National Human Genome Research...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-06

    ...) and National Human Genome Research Institute (NHGRI): Cooperative Research and Development Agreement... the National Human Genome Research Institute (NHGRI), the National Institutes of Health (NIH),...

  1. The science of human security: a response from political science.

    PubMed

    Roberts, David

    2008-01-01

    The concept of human security has developed in significance in the last decade to the point that its meaning and validity is hotly contested in the field of international relations, security, and development studies. A key consideration relates to its ambiguity at best and its amorphousness at worst. Medical scholarship proposes approaches that may render more meaningful the concept. However, collaboration and co-operation between political scientists and medical practitioners offers even greater potential to this vital programme. The latter offer the technical and methodological skills and approaches lacking in political science, whilst the former develop political frameworks to shift the causal focus towards human, institutional and structural agency in mass avoidable global civilian mortality. PMID:18456988

  2. 3 CFR - Implementation of the Executive Order, “Classified National Security Information”

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... security education and training programs, self-inspection programs, and measures designed to hold personnel... identity of a confidential human source or a human intelligence source; or (b) key design concepts...

  3. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-01

    .... Accordingly, this portion of the meeting will be closed to the public. (2) Global Supply Chain Security... Supply Chain Security Initiative. The Committee will receive an update and provide further guidance.... Department of Transportation, West Building Ground Floor, Room W12-140, 1200 New Jersey Avenue...

  4. Y-12 National Security Complex's Sustainable Recovery and Transformation - 12420

    SciTech Connect

    Jackson, Jan; Widman, Jeannette

    2012-07-01

    American Recovery and Reinvestment Act (ARRA) funds were used at the Y-12 National Security Complex (Y-12) to remove legacy materials from large contaminated excess facilities in order to prepare the facilities for demolition, demolish five excess buildings, and clean up sources of environmental contamination. The legacy materials and buildings presented many challenges and the potential hazards included depleted uranium and other radiological contaminants, lead, polychlorinated biphenyls, Freon, mold, mildew, asbestos, beryllium and mercury. Y-12 project teams have integrated sustainable waste management practices into each of the seven ARRA projects. The ARRA clean up efforts have resulted in the reduction of potential environmental, health, and safety risks posed by the excess facilities and sources of environmental contamination. Y-12's ARRA project teams focused on completing the activities in a sustainable, timely and safe manner. The site utilized a systematic material disposition evaluation process to ensure that materials were not automatically dis-positioned as waste. ARRA projects have recycled or reused over 1.3 million pounds of materials while preventing over 3 million vehicle miles traveled for waste disposal. Y-12 ARRA projects have worked over 2 million safe work hours without a lost time injury. The site has already begun to beneficially reuse land cleared by ARRA project activities to support sustainable transformation efforts. The Y-12 ARRA project activities have demonstrated that large complex projects can be completed sustainably and safely while maintaining an aggressive schedule. Through careful planning and execution, ARRA projects at the site have sustainably reduced the potential environmental, health, and safety risks posed to site employees and the community by the excess facilities and sources of environmental contamination. Y-12's systematic material disposition process ensured that materials were not automatically assumed to be

  5. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    SciTech Connect

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  6. Counter-Intelligence as a Chaotic Phenomenon and Its Importance in National Security

    NASA Astrophysics Data System (ADS)

    Kuloğlu, Gökhan; Gül, Zakir; Erçetin, Şefika Şule

    In today's rapidly changing globalized world, remarkably fast and important developments have been faced in the area of national security as in almost all other areas. Advancements in communication and transportation technologies have removed physical boundaries almost completely. National security institutions now have to fight against new and complicated security threats that go beyond the boundaries such as organized crimes and terror crimes. These ever-changing threats and dangerous environment which become more and more complex every single day force nations to review their current security structures and to take new and effective measures in the required areas in order to ensure their national security. As a matter of fact, counter-intelligence, which was quite important due to the frequency of spying acts during the Cold War but lost its importance after the Cold War had ended, has been one of these measures. Today, counterintelligence has once again become one of the most important functions in the fight against national security threats with changing dimensions. It is only possible for a nation to ensure its national security fully by having not only a defensive and passive approach but also offensive counter-intelligence.

  7. Humanizing The CEDA National Tournament.

    ERIC Educational Resources Information Center

    Collier, Linda M.

    A survey of the participants explored the competing interests involved at a national debate tournament, including: (1) how the desire to maximize competitive prowess trades off against socialization among students; (2) how increasing the number of elimination rounds for reasons of judge equalization adds another round to an already crowded…

  8. The Evolving Risk of Climate Change and National Security: People not Polar Bears

    NASA Astrophysics Data System (ADS)

    Titley, D.

    2014-12-01

    This talk will provide a general overview of climate change and discuss why this is a national security issue. Climate change is about people, about water, and about change itself. Understanding the rate of climate change, relative to the abilities of both humans and ecosystems to adapt is critical. I will briefly describe the multiple, independent lines of evidence that the climate is changing, and that the primary cause of this change is a change in atmospheric composition caused by the burning of fossil fuels. I will cover the history of climate change as seen within the U.S. Department of Defense and U.S. Navy, how this challenge is being addressed from budgetary, policy, and political angles, and what are the greatest challenges to national security that arise from climate change and in particular, the associated changes in the Arctic. I will conclude with an assessment of future challenges and opportunities regarding climate change, from science, policy, and political perspectives, and why we know enough to take significant action now, even if we don't know every detail about the future. In addition, this talk will address how to effectively talk about climate change through the use of analogies, plain, non-jargon English, and even a little humor.

  9. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-09

    ... notice regarding our public dockets in the January 17, 2008 issue of the Federal Register (73 FR 3316.... 109-347) NMSAC continues to be consulted in regards to the Global Supply Chain Security...

  10. National Security Agency Data Collection Review Act of 2014

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. EMP Threats to US National Security: Congressional Responses

    NASA Astrophysics Data System (ADS)

    Huessy, Peter

    2011-04-01

    The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.

  12. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is...

  13. 10 CFR 2.908 - Contents of notice of intent to introduce restricted data or other national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a) A party who intends to introduce Restricted Data or other National Security Information shall file...

  14. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited...

  15. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited...

  16. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited...

  17. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited...

  18. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited...

  19. A review of physical security robotics at Sandia National Laboratories

    SciTech Connect

    Roerig, S.C.

    1990-01-01

    As an outgrowth of research into physical security technologies, Sandia is investigating the role of robotics in security systems. Robotics may allow more effective utilization of guard forces, especially in scenarios where personnel would be exposed to harmful environments. Robots can provide intrusion detection and assessment functions for failed sensors or transient assets, can test existing fixed site sensors, and can gather additional intelligence and dispense delaying elements. The Robotic Security Vehicle (RSV) program for DOE/OSS is developing a fieldable prototype for an exterior physical security robot based upon a commercial four wheel drive vehicle. The RSV will be capable of driving itself, being driven remotely, or being driven by an onboard operator around a site and will utilize its sensors to alert an operator to unusual conditions. The Remote Security Station (RSS) program for the Defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior security systems. The RSS consists of an independent sensor pod, a mobile sensor platform and a control and display console. Sensor data fusion is used to optimize the system's intrusion detection performance. These programs are complementary, the RSV concentrates on developing autonomous mobility, while the RSS thrust is on mobile sensor employment. 3 figs.

  20. United Nations Conference on the Human Environment.

    ERIC Educational Resources Information Center

    United Nations General Assembly, New York, NY.

    Compiled in this document are several reports emanating from the United Nations Conference on the Human Environment, Stockholm, June 5-16, 1972. Included are (1) Provisional Agenda, (2) Annotations to the Provisional Agenda, (3) Provisional Rules of Procedure, (4) Draft Declaration on the Human Environment, (5) Planning and Management of Human…

  1. National Summit on Campus Public Safety. Strategies for Colleges and Universities in a Homeland Security Environment

    ERIC Educational Resources Information Center

    US Department of Justice, 2005

    2005-01-01

    The aftermath of September 11, 2001 prompted the reexamination of the nation's defenses and vulnerabilities in light of new realities. Every sector of society, particularly those who protect the well being of communities, required change. Safety and security operations on the nation's college and university campuses are no exception. The nation's…

  2. 78 FR 2953 - National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-15

    ... Agreement (CRADA) with NIST. NIST published a notice in the Federal Register on October 19, 2012 (77 FR... National Institute of Standards and Technology National Cybersecurity Center of Excellence (NCCoE) Secure.... This notice is the initial step for the National Cybersecurity Center of Excellence (NCCoE) in...

  3. 77 FR 57072 - Proposed Information Collection; Comment Request; National Security and Critical Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... Critical Technology Assessments of the U.S. Industrial Base AGENCY: Bureau of Industry and Security... of U.S. industrial base sectors deemed critical to U.S. national security. The information gathered... market segments in order to maintain a strong U.S. industrial base. II. Method of Collection...

  4. 77 FR 18283 - Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-27

    ... designate another AIP Member as a ``good control location.'' \\4\\ 17 CFR 240.15c3-3(b)(1). II. Self... COMMISSION Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and...-Dealer Members Meet Their Good Control Location Obligations for Uncertificated Securities March 21,...

  5. 77 FR 67410 - Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-09

    ... Structure) of NSCC's Rules. II. Self-Regulatory Organization's Statement of the Purpose of, and Statutory... COMMISSION Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and... (NSCC's Fee Structure) November 5, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act...

  6. 75 FR 4896 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-29

    ... From the Federal Register Online via the Government Publishing Office ] SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change To Eliminate Guarantee of Payment in Connection With the Envelope Settlement Service January 25, 2010. Pursuant to Section...

  7. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... article which is the subject of the investigation, the Secretary is required to take into consideration... Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of... affected by imports of the article....

  8. Post-Closure Inspection Letter Report for Corrective Action Units on the Nevada National Security Site

    SciTech Connect

    NSTec Environmental Restoration

    2011-05-26

    This letter serves as the post-closure inspection letter report for corrective action units on the Nevada National Security Site for calendar year 2011. Copies of completed inspection checklists are included in this report.

  9. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  10. Ballistic Missile Defense: National Security and the High Frontier of Space.

    ERIC Educational Resources Information Center

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  11. 15 CFR 930.122 - Necessary in the interest of national security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... COASTAL RESOURCE MANAGEMENT FEDERAL CONSISTENCY WITH APPROVED COASTAL MANAGEMENT PROGRAMS Appeal to the Secretary for Review Related to the Objectives of the Act and National Security Interests § 930.122... objectives....

  12. 77 FR 38093 - Meeting of National Council on the Humanities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-26

    ... ARTS AND THE HUMANITIES Meeting of National Council on the Humanities AGENCY: National Endowment for the Humanities, National Foundation on the Arts and the Humanities. ACTION: Notice of meeting. SUMMARY... that the National Council on the Humanities will meet for the following purposes: to advise...

  13. 76 FR 68511 - Meeting of National Council on the Humanities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-04

    ... ARTS AND THE HUMANITIES Meeting of National Council on the Humanities AGENCY: The National Endowment for the Humanities, National Foundation on the Arts and the Humanities. ACTION: Notice of meeting... hereby given that the National Council on the Humanities will meet in Washington, DC on November 17-...

  14. 76 FR 72427 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... Acting Director of the National Communications System no later than January 8, 2012, and must be... message. Fax: (703) 235-4981 Mail: Acting Director, National Communications System, National Protection... Priority Services for Next Generation Networks, a Cyber Code of Conduct and current NS/EP...

  15. Do needs for security and certainty predict cultural and economic conservatism? A cross-national analysis.

    PubMed

    Malka, Ariel; Soto, Christopher J; Inzlicht, Michael; Lelkes, Yphtach

    2014-06-01

    We examine whether individual differences in needs for security and certainty predict conservative (vs. liberal) position on both cultural and economic political issues and whether these effects are conditional on nation-level characteristics and individual-level political engagement. Analyses with cross-national data from 51 nations reveal that valuing conformity, security, and tradition over self-direction and stimulation (a) predicts ideological self-placement on the political right, but only among people high in political engagement and within relatively developed nations, ideologically constrained nations, and non-Eastern European nations, (b) reliably predicts right-wing cultural attitudes and does so more strongly within developed and ideologically constrained nations, and (c) on average predicts left-wing economic attitudes but does so more weakly among people high in political engagement, within ideologically constrained nations, and within non-Eastern European nations. These findings challenge the prevailing view that needs for security and certainty organically yield a broad right-wing ideology and that exposure to political discourse better equips people to select the broad ideology that is most need satisfying. Rather, these findings suggest that needs for security and certainty generally yield culturally conservative but economically left-wing preferences and that exposure to political discourse generally weakens the latter relation. We consider implications for the interactive influence of personality characteristics and social context on political attitudes and discuss the importance of assessing multiple attitude domains, assessing political engagement, and considering national characteristics when studying the psychological origins of political attitudes.

  16. Domestic Fuel for Enhancing National Security Act of 2011

    THOMAS, 112th Congress

    Sen. Murray, Patty [D-WA

    2011-05-25

    05/25/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (text of measure as introduced: CR S3345) (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. A Delicate Balance: National Security vs. Public Access

    ERIC Educational Resources Information Center

    Klein, Bonnie; Schwalb, Sandy

    2005-01-01

    Sometimes people want to see data that the government thinks should be kept under wraps. How does the Department of Defense balance the scales of justice while still ensuring information security? In the aftermath of September 11, 2001, the Defense Technical Information Center (DTIC) found itself in the spotlight as journalists, academics, and…

  18. 78 FR 55089 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-09

    ... speaker. FOR FURTHER INFORMATION CONTACT: Mr. Ryan Owens, ADFO of NMSAC, 2703 Martin Luther King Jr..., 2013. ADDRESSES: This meeting will be held at the new Coast Guard Headquarters, 2703 Martin Luther King Jr. Avenue SE., Washington, DC 20593, Room 6i10-01-b-17. Due to security at the new...

  19. The environmental dimension of national security: A test of systems analysis methods

    NASA Astrophysics Data System (ADS)

    Porfiriev, Boris N.

    1992-11-01

    The systems approach permits us to analyze national security as a cluster of interconnected elements, in which the environmental dimension appears to be the most important one. The environmental problem is divided into two main aspects: environmental security per se and the impact of environment on the overall status of a nation's security. It is argued here that the quality of life and health serve as both the main objective and the principal criterion of environmental security in a social system. Indices of these two factors are used in this article as indicators of the state of this type of security. They confirm that vast areas of Russia, the Ukraine, and Central Asia (especially the Aral Sea region) should be considered as presenting a substantial risk to local people and even producing global impacts on both natural and man-made systems. Environmental factors that destabilize national security are also divided into two groups: those that impact social systems directly and negatively (mainly natural disasters) and technological and sociopolitical agents that cause indirect impacts, in both war and peace time, as well as in the civil and military sectors of the economy. Developments in the former Soviet Union (the Commonwealth of Independent States) are used as an illustration of the consequences that such impacts may have on the status of national security.

  20. Classified Component Disposal at the Nevada National Security Site (NNSS) - 13454

    SciTech Connect

    Poling, Jeanne; Arnold, Pat; Saad, Max; DiSanza, Frank; Cabble, Kevin

    2013-07-01

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012. (authors)

  1. State of security at US colleges and universities: a national stakeholder assessment and recommendations.

    PubMed

    Greenberg, Sheldon F

    2007-09-01

    In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds. PMID:18388616

  2. 78 FR 8160 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... Designated Federal Officer, Stakeholder Engagement and Critical Infrastructure Resilience Division, National... Broadband Network. The report recommends the President advance a set of organizational streamlining,...

  3. The National Criticality Experiments Research Center at the Device Assembly Facility, Nevada National Security Site: Status and Capabilities, Summary Report

    SciTech Connect

    S. Bragg-Sitton; J. Bess; J. Werner

    2011-09-01

    The National Criticality Experiments Research Center (NCERC) was officially opened on August 29, 2011. Located within the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS), the NCERC has become a consolidation facility within the United States for critical configuration testing, particularly those involving highly enriched uranium (HEU). The DAF is a Department of Energy (DOE) owned facility that is operated by the National Nuclear Security Agency/Nevada Site Office (NNSA/NSO). User laboratories include the Lawrence Livermore National Laboratory (LLNL) and Los Alamos National Laboratory (LANL). Personnel bring their home lab qualifications and procedures with them to the DAF, such that non-site specific training need not be repeated to conduct work at DAF. The NNSS Management and Operating contractor is National Security Technologies, LLC (NSTec) and the NNSS Safeguards and Security contractor is Wackenhut Services. The complete report provides an overview and status of the available laboratories and test bays at NCERC, available test materials and test support configurations, and test requirements and limitations for performing sub-critical and critical tests. The current summary provides a brief summary of the facility status and the method by which experiments may be introduced to NCERC.

  4. United States Responses to Japanese Wartime Inhuman Experimentation after World War II: National Security and Wartime Exigency

    PubMed Central

    Brody, Howard; Leonard, Sarah E.; Nie, Jing-Bao; Weindling, Paul

    2015-01-01

    In 1945-46, representatives of the United States government made similar discoveries in both Germany and Japan, unearthing evidence of unethical experiments on human beings that could be viewed as war crimes. The outcomes in the two defeated nations, however, were strikingly different. In Germany, the U.S., influenced by the Canadian physician John Thompson, played a key role in bringing Nazi physicians to trial and publicizing their misdeeds. In Japan, the U.S. played an equally key role in concealing information about the biological warfare experiments and securing immunity from prosecution for the perpetrators. The greater force of appeals to national security and wartime exigency help to explain these different outcomes. PMID:24534743

  5. 32 CFR 156.5 - National security positions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... are set forth in E.O. 12968, as amended; E.O. 10865, 32 CFR parts 154-155; ICD 704; and DoD Regulation... security criteria and adjudicative standards are described in E.O. 12968, as amended; 32 CFR parts 147, 154... determinations in accordance with the procedures set forth in E.O. 12968, as amended; parts 154 and 155 of 32...

  6. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY... national security or foreign policy interests of the United States. BIS may impose foreign policy...

  7. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY... national security or foreign policy interests of the United States. BIS may impose foreign policy...

  8. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY... national security or foreign policy interests of the United States. BIS may impose foreign policy...

  9. Education in Conflict and Crisis for National Security.

    ERIC Educational Resources Information Center

    McClelland, Charles A.

    A basic assumption is that the level of conflict within and between nations will escalate over the next 50 years. Trying to "muddle through" using the tools and techniques of organized violence may yield national suicide. Therefore, complex conflict resolution skills need to be developed and used by some part of society to quell disorder before it…

  10. Religious Conflicts and Education in Nigeria: Implications for National Security

    ERIC Educational Resources Information Center

    Ushe, Ushe Mike

    2015-01-01

    The persistent religious conflicts and insecurity in Nigeria has given meaningful Nigerians a cause for deep concern in recent times. Many of them wonder why religion which used to be the cohesive factor and core of national unity, peaceful co-existence and national development has become a tool for political manipulation, violence, destruction of…

  11. Towards a policy for human security: psychosocial contributions.

    PubMed

    Tullio, Francesco

    2007-01-01

    Inspired by the correspondence between Einstein and Freud in 1936, this paper focuses on the multidimensional aspect of security, exploring its implications within the psychosocial approach. Reflections are therefore centred on the psychological aspects of conflict, on bio-psychic responses to violent solicitation and on ways in which individual emotions are managed and controlled by the State. Some social and economic mechanisms comprising the present global social scenario are explored: the intermesh between economic/industrial organisations and Security Institutions, and the consumerist economic model and its individual/collective consequences, ultimately environmental destruction. As suggested by Einstein, the creation of a supranational organisation would be an essential step towards an effective and economically sustainable international system. This can be achieved through a process that implies the evolution of cultural parameters and the transformation of national institutions. In this sense, the author suggests a decisive role for civil society organisations such as the International Physicians for the Prevention of Nuclear War (IPPNW). PMID:17987980

  12. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site - 13058

    SciTech Connect

    Wade, Scott A.; Knapp, Kathryn S.; Wills, Cathy A.

    2013-07-01

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950's to the early 1990's. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistant Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second

  13. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site

    SciTech Connect

    Scott A. Wade; Kathryn S. Knapp; Cathy A. Wills

    2013-02-24

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950s to the early 1990s. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistant Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second

  14. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  15. Higher Education as a Matter of National Security: Can a Democracy Plan Ahead?

    ERIC Educational Resources Information Center

    Skaggs, David

    2014-01-01

    What is often viewed as the fairly arcane business of determining and administering higher education policy is a matter of great national interest and, actually, a matter of national security. It thus makes a difference for American society in ways you may not have considered. The ability of the United States to protect itself and its interests…

  16. 78 FR 73202 - Review and Revision of the National Critical Infrastructure Security and Resilience (NCISR...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-05

    ... cybersecurity in securing physical assets. \\2\\ EO 13636 can be found at: http://www.gpo.gov/fdsys/pkg/FR-2013-02...) Research and Development (R&D) Plan Outline and Specific Questions Regarding the Content AGENCY: National... contribute highly relevant content for consideration in the development the National Critical...

  17. 77 FR 40779 - Assignment of National Security and Emergency Preparedness Communications Functions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-11

    ... Directive-1 of February 13, 2009 (Organization of the National Security Council System) (PPD-1). Sec. 2.2... President, Vice President, and senior national leadership, including: communications with or among ] the... leadership; Continuity of Government communications; and communications among the executive, judicial,...

  18. 78 FR 35076 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-11

    ... COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of... are submitted on a locked-in basis by self-regulatory organizations (``SROs'') (including national and... data for multiple trades to the point where the identity of the party actually responsible for...

  19. From Charity to Security: The Emergence of the National School Lunch Program

    ERIC Educational Resources Information Center

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  20. Lawrence Livermore National Security Cost Model Functional Management Assessment

    SciTech Connect

    Tevis, J; Hirahara, J; Thomas, B; Mendez, M

    2008-06-12

    is to make it easier to analyze the true cost of overhead so the costs can be effectively managed. For the current year, the overall the goal of keeping the total cost of an FTE to FY07 levels. This approach reflects the past practice of managing to rates rather than focusing on costs, although streamlined with the more simplified rate structure. Given all the challenges being faced with the contract transition, this was a reasonable interim tactic for dealing with the known cost increases such as fees and taxes. Nonetheless, in order to take full advantage of the opportunities that exist for making sound decisions for further reducing the rates themselves, the Laboratory needs to implement an ongoing and disciplined approach to understanding and managing overhead cost. ISSUE 2: The NIF has a significantly different rate structure than other Laboratory work. Because of its significant size and unique organizational structure as a major construction project, the National Ignition Facility (NIF) has indirect charges that vary from the norm. These variations were reviewed and approved by and disclosed to the NNSA in the Laboratory's past annual Disclosure Statements. In mid-FY 09, NIF will begin transition from a construction line item to an operational center. The reallocation of costs when this occurs could significantly impact the Laboratory's rates and rate structure planning for that transition from a cost- and rate- impact standpoint should begin soon. ISSUE 3: The new rate model must be finalized shortly in order to implement the model beginning in FY 09. As noted in Issue No.1, a Working Group has developed a simplified rate structure for the Lab to use for FY09. The Working Group has evaluated the cost impacts of the simplified rate structure at the major program level and identified a disparate impact in the Safeguards and Security area where a substantial increase in overhead cost allocation may need to be mitigated. The simplified rate structure will need to

  1. Bio-terrorism, human security and public health: can international law bring them together in an age of globalization?

    PubMed

    Aginam, Obijiofor

    2005-09-01

    Bio-terrorism, the use of a microorganism with the deliberate intent of causing infection, before and since the anthrax attacks in the United States in October 2001, has emerged as a real medical and public health threat. The link between bio-terrorism, human security and public health raises complex questions on the normative trajectories of international law, the mandates of international organizations, and global health governance. In May 2001, the World Health Assembly of the World Health Organization (WHO) passed a resolution entitled "Global Health Security: Epidemic Alert and Response" which inter alia, urged WHO member states to participate actively in the verification and validation of surveillance data and information concerning health emergencies of international concern. This article explores the links between bio-terrorism, human security and public health, and investigates the effectiveness of international legal mechanisms that link them in an age of globalization of public health. The article explores the interaction of WHO's 'soft-law' approaches to global health security, and the 'moribund' negotiations of the verification and monitoring protocol to the Biological Weapons Convention 1972. Can international law link bio-terrorism, public health and human security? Does the WHO collaborate with other international organizations within and outside the United Nations system to develop effective legal and governance approaches to bio-terrorism and global health security? The article concludes that the globalization of public health threats like bio-terrorism requires globalized legal approaches. PMID:16229381

  2. 77 FR 6813 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-09

    ... for Cybersecurity and Communications, an update on the Cloud Computing Subcommittee from Mr. Mark McLaughlin, Chair of the Cloud Computing Subcommittee, and an update on the National Public Safety...

  3. [Street food in the national agenda of food and nutrition security: an essay for sanitary qualification in Brazil].

    PubMed

    Bezerra, Aída Couto Dinucci; Mancuso, Ana Maria Cervato; Heitz, Sarah Jeanne Jorge

    2014-05-01

    In 2014, the World Cup will be staged in Brazil. Is Brazil able to ensure safe street food is on offer? This paper seeks to elicit reflection on some problems relating to the sale of street food, thereby contributing to highlight this theme in the food security agenda in Brazil. The scope of this study is exclusively street food. Care is taken not to reduce the broader concepts of food security and the importance of sanitary and hygienic handling is stressed as one of the core components of food and nutrition security. In this context the following aspects are discussed: the credibility of the official data on insanitary outbreaks related to street food; street food security compared to that in other eating environments; and the training of people to modify inadequate food handling practices. Thus, in the discussion about problems in the street food market it is essential to improve the quantity and quality of the training of food handlers in order to implement food and nutrition security as promoting the human right to adequate food and ensure that the topic is urgently included on the national calendar of public health debates.

  4. National Atmospheric Release Advisory Center (NARAC) Capabilities for Homeland Security

    SciTech Connect

    Sugiyama, G; Nasstrom, J; Baskett, R; Simpson, M

    2010-03-08

    The Department of Energy's National Atmospheric Release Advisory Center (NARAC) provides critical information during hazardous airborne releases as part of an integrated national preparedness and response strategy. Located at Lawrence Livermore National Laboratory, NARAC provides 24/7 tools and expert services to map the spread of hazardous material accidentally or intentionally released into the atmosphere. NARAC graphical products show affected areas and populations, potential casualties, and health effect or protective action guideline levels. LLNL experts produce quality-assured analyses based on field data to assist decision makers and responders. NARAC staff and collaborators conduct research and development into new science, tools, capabilities, and technologies in strategically important areas related to airborne transport and fate modeling and emergency response. This paper provides a brief overview of some of NARAC's activities, capabilities, and research and development.

  5. Transition-ready technologies and expertise from the Chemical and Biological National Security Program at LLNL

    SciTech Connect

    Folta, P A; McBride, M T

    2006-02-22

    HSARPA has initiated a new Bioinformatics and Assay Development solicitation, BIAD2 (BAA 06-01), to address a number of technology gaps and requirements for biodetection (www.hsarpabaa.com). This solicitation will leverage the vast research and development capabilities of the private sector and academia in order to meet the needs of HSARPA and Homeland Security. In order to meet these requirements, this solicitation will: (1) Develop and validate actionable assays for the public and private sector; (2) Develop and validate new assays and novel assay methodologies to enhance existing detection systems and enable future detection platforms; (3) Develop next generation assays which are robust against novel, emerging and engineered threats; (4) Develop novel assays that detect low levels of ribonucleic acid (RNA)-based viral threats in complex backgrounds; (5) Develop novel assays to characterize the viability, degree of virulence or toxicity, and countermeasure resistance of a biological agent; and (6) Develop new bioinformatics tools to support assay development and assay validation The Lawrence Livermore National Laboratory (LLNL) Bioassays and Signature Program (BSP) develops nationally-validated detection and identification assays to cover the full range of biological threat agents, starting from human, animal, and plant pathogens on the Select Agent list. The assays that have been co-developed by the CDC and the BSP are used internationally and represent the gold standard for molecular detection of select agent pathogens for the public health community. They are also used in the DHS environmental monitoring operations such as BioWatch and DHS National Security Special Events support. These reagents have been used to process and analyze more than 5 million samples and have delivered exceptional performance for the end users, with zero false positives since their deployment. Currently, highly-multiplexed nucleic acid assays that represent the ''next-generation'' in

  6. Secrecy and Physicists: Intersections of Science and National Security

    NASA Astrophysics Data System (ADS)

    Aftergood, Steven

    2010-02-01

    Physicists have been proponents as well as critics of government secrecy affecting their work. Enrico Fermi once wrote (in Physics Today) that ``Contrary to perhaps what is the most common belief about secrecy, secrecy was not started by generals, was not started by security officers, but was started by physicists.'' Yet Edward Teller, Frederick Seitz and others argued that secrecy in science and technology could profitably be reduced by 90% or more. Secrecy in physics is of course most pronounced in research related to nuclear weapons development. Though this is a longstanding concern it is still not a settled one. Disputes over nuclear weapons-related secrecy continue to resonate today as researchers and authors challenge the boundaries of official disclosure regarding the nuclear weapons enterprise. This paper will survey the current landscape of secrecy in science, and will discuss recent controversies involving publication of nuclear weapons physics, the infrastructure of nuclear research, and the prospects for secrecy reform. )

  7. REGULATION OF AUSTRALIAN MEDICAL PROFESSIONALS AND NATIONAL SECURITY: LESSONS FROM THREE CASE STUDIES.

    PubMed

    Faunce, Thomas; McKenna, Michael; Rayner, Johanna; Hawes, Jazmin

    2016-03-01

    In recent times, Australia's national security concerns have had controversial impacts on regulation of Australian medical practitioners in areas related to immigration detention. This column explores three recent case studies relevant to this issue. The first involves the enactment of the Australian Border Force Act 2015 (Cth), which has a significant impact on the regulation of medical professionals who work with people in immigration detention. The second involves the decision of the High Court of Australia in Plaintiff M68/2015 v Minister for Immigration and Border Protection [2016] HCA 1 that an amendment to Australian federal legislation justified sending children back to immigration detention centres in Papua New Guinea and Nauru. This legislation was previously heavily criticised by the Australian Human Rights Commissioner. The third concerns the deregistration of Tareq Kamleh, an Australian doctor of German-Palestinian heritage who came to public attention on ANZAC Day 2015 with his appearance online in a propaganda video for the Islamic State terrorist organisation al-Dawla al-Islamyia fil Iraq wa'al Sham, also known as Islamic State of Iraq and Syria (ISIS) or Daesh. Australia's professional regulatory system should presumptively respect professional virtues, such as loyalty to the relief of individual patient suffering, when dealing with doctors (whether in Australia or ISIS-occupied Syria) working under regimes whose principles appear inconsistent with those of ethics and human rights.

  8. REGULATION OF AUSTRALIAN MEDICAL PROFESSIONALS AND NATIONAL SECURITY: LESSONS FROM THREE CASE STUDIES.

    PubMed

    Faunce, Thomas; McKenna, Michael; Rayner, Johanna; Hawes, Jazmin

    2016-03-01

    In recent times, Australia's national security concerns have had controversial impacts on regulation of Australian medical practitioners in areas related to immigration detention. This column explores three recent case studies relevant to this issue. The first involves the enactment of the Australian Border Force Act 2015 (Cth), which has a significant impact on the regulation of medical professionals who work with people in immigration detention. The second involves the decision of the High Court of Australia in Plaintiff M68/2015 v Minister for Immigration and Border Protection [2016] HCA 1 that an amendment to Australian federal legislation justified sending children back to immigration detention centres in Papua New Guinea and Nauru. This legislation was previously heavily criticised by the Australian Human Rights Commissioner. The third concerns the deregistration of Tareq Kamleh, an Australian doctor of German-Palestinian heritage who came to public attention on ANZAC Day 2015 with his appearance online in a propaganda video for the Islamic State terrorist organisation al-Dawla al-Islamyia fil Iraq wa'al Sham, also known as Islamic State of Iraq and Syria (ISIS) or Daesh. Australia's professional regulatory system should presumptively respect professional virtues, such as loyalty to the relief of individual patient suffering, when dealing with doctors (whether in Australia or ISIS-occupied Syria) working under regimes whose principles appear inconsistent with those of ethics and human rights. PMID:27323633

  9. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... issued under the Trading With the Enemy Act (31 CFR 500.101 et seq.); criminal prosecutions under the... authority of the Office of Legal Counsel as established by 28 CFR 0.25. .... 1203); terrorist acts abroad, including murder, against United States nationals (18 U.S.C. 2332);...

  10. Lawrence Livermore National Laboratory`s Computer Security Short Subjects Videos: Hidden Password, The Incident, Dangerous Games and The Mess; Computer Security Awareness Guide

    SciTech Connect

    1993-12-31

    A video on computer security is described. Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education and Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1--3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices.

  11. 10 CFR 2.913 - Review of Restricted Data or other National Security Information received in evidence.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.913 Review of Restricted Data or other National Security Information received in evidence. At the close of the reception of... 10 Energy 1 2010-01-01 2010-01-01 false Review of Restricted Data or other National...

  12. Environmental Problems: A Global Security Threat. Report of the United Nations of the Next Decade Conference (24th, Hamilton Parish, Bermuda, June 18-23, 1989).

    ERIC Educational Resources Information Center

    Stanley Foundation, Muscatine, IA.

    The world's political structure and many economic practices are out of harmony with nature. This disharmony threatens environmentally sustainable growth and human survival. United Nations (UN) conference participants discussed the degree of political acceptance of concepts such as environmental security and sustainable development. Their reading…

  13. National Incorporation of Global Human Rights: Worldwide Expansion of National Human Rights Institutions, 1966-2004

    ERIC Educational Resources Information Center

    Koo, Jeong-Woo; Ramirez, Francisco O.

    2009-01-01

    Using an event history framework we analyze the adoption rate of national human rights institutions. Neo-realist perspective predicts adoption rates to be positively influenced by favorable national profiles that lower the costs and make it more reasonable to establish these institutions. From a world polity perspective adoption rates will be…

  14. Energy policies for resilience and national security. Final report

    SciTech Connect

    Lovins, A.B.; Lovins, L.H.

    1981-10-01

    The vulnerabilities of the U.S. energy system to accidental or deliberate disruptions are analyzed generically and specifically and shown to be disturbingly large. Since they arise from reliance on highly centralized technologies, increasing such reliance is likely to increase national energy vulnerability. A more efficient, diverse, dispersed, renewable energy system is shown to be inherently more resilient, to make major failures impossible, and to be compatible with consistent adherence to free-market principles.

  15. Sun-Burned: Space Weather's Impact on United States National Security

    NASA Astrophysics Data System (ADS)

    Stebbins, B.

    2014-12-01

    The heightened media attention surrounding the 2013-14 solar maximum presented an excellent opportunity to examine the ever-increasing vulnerability of US national security and its Department of Defense to space weather. This vulnerability exists for three principal reasons: 1) a massive US space-based infrastructure; 2) an almost exclusive reliance on an aging and stressed continental US power grid; and 3) a direct dependence upon a US economy adapted to the conveniences of space and uninterrupted power. I tailored my research and work for the national security policy maker and military strategists in an endeavor to initiate and inform a substantive dialogue on America's preparation for, and response to, a major solar event that would severely degrade core national security capabilities, such as military operations. Significant risk to the Department of Defense exists from powerful events that could impact its space-based infrastructure and even the terrestrial power grid. Given this ever-present and increasing risk to the United States, my work advocates raising the issue of space weather and its impacts to the level of a national security threat. With the current solar cycle having already peaked and the next projected solar maximum just a decade away, the government has a relatively small window to make policy decisions that prepare the nation and its Defense Department to mitigate impacts from these potentially catastrophic phenomena.

  16. Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria

    ERIC Educational Resources Information Center

    Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel

    2013-01-01

    Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…

  17. 17 CFR 240.19c-3 - Governing off-board trading by members of national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Governing off-board trading by... Members § 240.19c-3 Governing off-board trading by members of national securities exchanges. The rules of... in any reported security listed and registered on this exchange or as to which unlisted...

  18. 17 CFR 140.20 - Designation of senior official to oversee Commission use of national security information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Designation of senior official to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION ORGANIZATION, FUNCTIONS, AND PROCEDURES OF THE COMMISSION Functions § 140.20 Designation...

  19. 78 FR 14847 - Topaz Exchange, LLC; Notice of Filing of Application for Registration as a National Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-07

    ... COMMISSION Topaz Exchange, LLC; Notice of Filing of Application for Registration as a National Securities Exchange Under Section 6 of the Securities Exchange Act of 1934 March 1, 2013. On July 3, 2012, Topaz Exchange, LLC (``Topaz Exchange'' or ``Applicant'') submitted to the Securities and Exchange...

  20. The United Nations Human Space Technology Initiative

    NASA Astrophysics Data System (ADS)

    Balogh, Werner; Miyoshi, Takanori

    2016-07-01

    The United Nations Office for Outer Space Affairs (OOSA) launched the Human Space Technology Initiative (HSTI) in 2010 within the United Nations Programme on Space Applications, based on relevant recommendations of the Third United Nations Conference on the Exploration and Peaceful Uses of Outer Space (UNISPACE III). The activities of HSTI are characterized by the following "Three Pillars": International Cooperation, Outreach, and Capacity-building. For International Cooperation, OOSA and the Japan Aerospace Exploration Agency (JAXA) jointly launched a new programme entitled "KiboCUBE". KiboCUBE aims to provide educational or research institutions located in developing countries with opportunities to deploy cube satellites of their own design and manufacture from Japanese Experiment Module "Kibo" on-board the International Space Station (ISS). The Announcement of Opportunity was released on 8 September 2015 and the selected institution is to be announced by 1 August 2016. OOSA is also collaborating with WHO and with the COPUOS Expert Group on Space and Global Health to promote space technologies and ground- and space-based research activities that can contribute to improving global health. For Outreach, OOSA and the government of Costa Rica are jointly organising the United Nations/Costa Rica Workshop on Human Space Technology from 7 to 11 March 2016. Participants will exchange information on achievements in human space programmes and discuss how to promote international cooperation by further facilitating the participation of developing countries in human space exploration-related activities. Also, it will address the role of space industries in human space exploration and its related activities, considering that they have become significant stakeholders in this field. For Capacity-building, OOSA has been carrying out two activities: the Zero-Gravity Instrument Project (ZGIP) and the Drop Tower Experiment Series (DropTES). In ZGIP, OOSA has annually distributed

  1. 29 CFR 801.11 - Exemption for national defense and security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Exemption for national defense and security. 801.11 Section 801.11 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR OTHER LAWS APPLICATION OF THE EMPLOYEE POLYGRAPH PROTECTION ACT OF 1988 Exemptions § 801.11...

  2. 29 CFR 801.11 - Exemption for national defense and security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 3 2011-07-01 2011-07-01 false Exemption for national defense and security. 801.11 Section 801.11 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR OTHER LAWS APPLICATION OF THE EMPLOYEE POLYGRAPH PROTECTION ACT OF 1988 Exemptions § 801.11...

  3. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Negotiations involving national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal Property Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT...

  4. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Negotiations involving national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal Property Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT...

  5. 77 FR 70865 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Modify Addendum A (Fee Structure) of Its Rules and...)(ii). \\4\\ 17 CFR 240.19b-4(f)(2). I. Self-Regulatory Organization's Statement of the Terms...

  6. National Security in the Nuclear Age. A Proposed Booklist and Public Education Ideas for Libraries.

    ERIC Educational Resources Information Center

    Dane, Ernest B.

    A bibliography on national security in the nuclear age is divided into three sections. The first section describes a proposal calling for the compilation of a balanced and up-to-date collection of books and other materials on this issue to be included in all U.S. public libraries. Also discussed are selection criteria for the book list, project…

  7. Education Policy and National Security in Brazil in the Post-1964 Context

    ERIC Educational Resources Information Center

    Silveira, Rene Trentin

    2013-01-01

    The aim of this article is to analyse and show in detail the influence of the National Security and Development Doctrine, the main ideological prop of the 1964 civilian-military coup, on the education policy implemented by the regime. Special attention is given to the MEC-USAID agreements, the setting up of the Meira Matos Commission and the…

  8. 78 FR 42140 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-15

    ... COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing...), 78 FR 25496 (May 1, 2013). On May 20, 2013, the Commission extended the period of review of the Advance Notice, as modified by Amendment No. 1. Release No. 34-69605 (May 20, 2013), 78 FR 31616 (May...

  9. 78 FR 42127 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-15

    ... COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing.... Release No. 34-69313 (Apr. 4, 2013), 78 FR 21487 (Apr. 10, 2013). On April 19, 2013, NSCC filed Amendment... Amendment No. 1. Release No. 34-69620 (May 22, 2013), 78 FR 32292 (May 29, 2013). On June 11, 2013,...

  10. 76 FR 62439 - Order of Succession for the Office of Disaster Management and National Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-07

    ... URBAN DEVELOPMENT Order of Succession for the Office of Disaster Management and National Security AGENCY: Office of the Secretary, HUD. ACTION: Notice of order of succession. SUMMARY: In this notice, the Secretary of HUD designates the Order of Succession for the Office of Disaster Management and...

  11. Impacts of Psychological Science on National Security Agencies Post-9/11

    ERIC Educational Resources Information Center

    Brandon, Susan E.

    2011-01-01

    Psychologists have been an integral part of national security agencies since World War I, when psychological science helped in personnel selection. A robust infrastructure supporting wider applications of psychology to military and intelligence problems developed further during World War II and the years following, primarily in the areas of…

  12. 10 CFR 784.6 - National security considerations for waiver of certain sensitive inventions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security considerations for waiver of certain sensitive inventions. 784.6 Section 784.6 Energy DEPARTMENT OF ENERGY PATENT WAIVER REGULATION § 784.6... nuclear weapons programs or other atomic energy defense activities of the Department of Energy,...

  13. 10 CFR 784.6 - National security considerations for waiver of certain sensitive inventions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security considerations for waiver of certain sensitive inventions. 784.6 Section 784.6 Energy DEPARTMENT OF ENERGY PATENT WAIVER REGULATION § 784.6... nuclear weapons programs or other atomic energy defense activities of the Department of Energy,...

  14. Building a National Security Program at a Small School: Identifying Opportunities and Overcoming Challenges

    ERIC Educational Resources Information Center

    Grossman, Michael; Schortgen, Francis

    2016-01-01

    This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…

  15. United Nations Human Space Technology Initiative (HSTI)

    NASA Astrophysics Data System (ADS)

    Ochiai, Mika; Niu, Aimin; Steffens, Heike; Balogh, Werner; Haubold, Hans; Othman, Mazlan; Doi, Takao

    2014-11-01

    The Human Space Technology Initiative was launched in 2010 within the framework of the United Nations Programme on Space Applications implemented by the Office for Outer Space Affairs of the United Nations. It aims to involve more countries in activities related to human spaceflight and space exploration and to increase the benefits from the outcome of such activities through international cooperation, to make space exploration a truly international effort. The role of the Initiative in these efforts is to provide a platform to exchange information, foster collaboration between partners from spacefaring and non-spacefaring countries, and encourage emerging and developing countries to take part in space research and benefit from space applications. The Initiative organizes expert meetings and workshops annually to raise awareness of the current status of space exploration activities as well as of the benefits of utilizing human space technology and its applications. The Initiative is also carrying out primary science activities including the Zero-Gravity Instrument Project and the Drop Tower Experiment Series aimed at promoting capacity-building activities in microgravity science and education, particularly in developing countries.

  16. 78 FR 65387 - Meeting of National Council on the Humanities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-31

    ... ARTS AND THE HUMANITIES Meeting of National Council on the Humanities AGENCY: National Endowment for the Humanities. ACTION: Notice of meeting. SUMMARY: Pursuant to section 10(a)(2) of the Federal Advisory Committee Act (5 U.S.C. App.), notice is hereby given that the National Council on the...

  17. 75 FR 24754 - Meeting of National Council on the Humanities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-05

    ... THE ARTS AND THE HUMANITIES Meeting of National Council on the Humanities AGENCY: The National Endowment for the Humanities. ACTION: Notice of Meeting. Pursuant to the provisions of the Federal Advisory Committee Act (Pub. L. 92-463, as amended) notice is hereby given the National Council on the...

  18. 76 FR 9378 - Meeting of National Council on the Humanities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-17

    ... THE ARTS AND THE HUMANITIES Meeting of National Council on the Humanities AGENCY: The National Endowment for the Humanities. ACTION: Notice of meeting. Pursuant to the provisions of the Federal Advisory Committee Act (Pub. L. 92-463, as amended) notice is hereby given the National Council on the...

  19. 78 FR 11684 - Meeting of National Council on the Humanities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-19

    ... ARTS AND THE HUMANITIES Meeting of National Council on the Humanities AGENCY: National Endowment for the Humanities. ACTION: Notice of Meeting. SUMMARY: Pursuant to section 10(a)(2) of the Federal Advisory Committee Act (5 U.S.C. App.), notice is hereby given that the National Council on the...

  20. 77 FR 65587 - Meeting of National Council on the Humanities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-29

    ... ARTS AND THE HUMANITIES Meeting of National Council on the Humanities AGENCY: National Endowment for the Humanities. ACTION: Notice of Meeting. SUMMARY: Pursuant to section 10(a)(2) of the Federal Advisory Committee Act (5 U.S.C. App.), notice is hereby given that the National Council on the...

  1. 78 FR 37847 - Meeting of National Council on the Humanities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-24

    ... ARTS AND THE HUMANITIES Meeting of National Council on the Humanities AGENCY: National Endowment for the Humanities. ACTION: Notice of Meeting. SUMMARY: Pursuant to section 10(a)(2) of the Federal Advisory Committee Act (5 U.S.C. App.), notice is hereby given that the National Council on the...

  2. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... authorization determinations by national securities exchanges and associations. 240.19c-4 Section 240.19c-4... determinations by national securities exchanges and associations. (a) The rules of each exchange shall provide as... through an automated inter-dealer quotation system (“authorization”), or the continuance of...

  3. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... authorization determinations by national securities exchanges and associations. 240.19c-4 Section 240.19c-4... determinations by national securities exchanges and associations. (a) The rules of each exchange shall provide as... through an automated inter-dealer quotation system (“authorization”), or the continuance of...

  4. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... authorization determinations by national securities exchanges and associations. 240.19c-4 Section 240.19c-4... determinations by national securities exchanges and associations. (a) The rules of each exchange shall provide as... through an automated inter-dealer quotation system (“authorization”), or the continuance of...

  5. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President; (2) The White House staff; (3) Committees, commissions,...

  6. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President and Vice President; (2) The White House staff; (3)...

  7. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President and Vice President; (2) The White House staff; (3)...

  8. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President and Vice President; (2) The White House staff; (3)...

  9. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President; (2) The White House staff; (3) Committees, commissions,...

  10. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Security and Emergency Preparedness (NSEP) B Appendix B to Part 64 Telecommunication FEDERAL COMMUNICATIONS... Preparedness (NSEP) 1. Authority This appendix is issued pursuant to sections 1, 4(i), 201 through 205 and 303...; (d) National Coordinating Center; (e) National Security Emergency Preparedness...

  11. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Security and Emergency Preparedness (NSEP) B Appendix B to Part 64 Telecommunication FEDERAL COMMUNICATIONS... Preparedness (NSEP) 1. Authority This appendix is issued pursuant to sections 1, 4(i), 201 through 205 and 303...; (d) National Coordinating Center; (e) National Security Emergency Preparedness...

  12. Teaching about National Security: Instructional Strategies and Lessons for High School Courses in History, Government, Geography, Economics.

    ERIC Educational Resources Information Center

    Remy, Richard C.; And Others

    The instructional techniques illustrated in this book present a method of infusing national security issues into the five principal social studies courses of U.S. history, world history, U.S. government, economics, and geography. Chapter 1 discusses the meaning and evolution of the term national security in its general and educational contexts.…

  13. The Arctic as a test case for an assessment of climate impacts on national security.

    SciTech Connect

    Taylor, Mark A.; Zak, Bernard Daniel; Backus, George A.; Ivey, Mark D.; Boslough, Mark Bruce Elrick

    2008-11-01

    organizations. Because changes in the Arctic environment are happening so rapidly, a successful program will be one that can adapt very quickly to new information as it becomes available, and can provide decision makers with projections on the 1-5 year time scale over which the most disruptive, high-consequence changes are likely to occur. The greatest short-term impact would be to initiate exploratory simulations to discover new emergent and robust phenomena associated with one or more of the following changing systems: Arctic hydrological cycle, sea ice extent, ocean and atmospheric circulation, permafrost deterioration, carbon mobilization, Greenland ice sheet stability, and coastal erosion. Sandia can also contribute to new technology solutions for improved observations in the Arctic, which is currently a data-sparse region. Sensitivity analyses have the potential to identify thresholds which would enable the collaborative development of 'early warning' sensor systems to seek predicted phenomena that might be precursory to major, high-consequence changes. Much of this work will require improved regional climate models and advanced computing capabilities. Socio-economic modeling tools can help define human and national security consequences. Formal uncertainty quantification must be an integral part of any results that emerge from this work.

  14. [The national food and nutrition policy and its dialogue with the national food and nutrition security policy].

    PubMed

    Alves, Kelly Poliany de Souza; Jaime, Patricia Constante

    2014-11-01

    Food is one of the determinants and conditions of health and an inherent right of all people. The consequences of food and nutrition insecurity in the population, such as obesity, malnutrition and specific nutritional deficiencies, impact the health sector and have historically meant that it has assumed the responsibility for food and nutrition programs and policies in Brazil. However, ensuring food and nutrition security requires a combination of public policies, among which the National Food and Nutrition Policy of the Unified Health System (SUS) plays a fundamental role. This paper seeks to contribute to the debate on intersectoriality and health promotion based on presenting the National Food and Nutrition Policy and discussing its role as interface between the SUS and the National Food and Nutrition Security Policy and System. This perspective strongly suggests the combination of efforts to promote health and food and nutrition security in order to optimize initiatives developed in different sectors and accompanied by different policy councils that are not interrelated, enabling enhanced government and civil society action on the determinants of health and nutrition.

  15. CDZNTE ROOM-TEMPERATURE SEMICONDUCTOR GAMMA-RAY DETECTOR FOR NATIONAL-SECURITY APPLICATIONS.

    SciTech Connect

    CAMARDA,G.S.; BOLOTNIKOV, A.E.; CUI, Y.; HOSSAIN, A.; KOHMAN, K.T.; JAMES, R.B.

    2007-05-04

    One important mission of the Department of Energy's National Nuclear Security Administration is to develop reliable gamma-ray detectors to meet the widespread needs of users for effective techniques to detect and identify special nuclear- and radioactive-materials. Accordingly, the Nonproliferation and National Security Department at Brookhaven National Laboratory was tasked to evaluate existing technology and to develop improved room-temperature detectors based on semiconductors, such as CdZnTe (CZT). Our research covers two important areas: Improving the quality of CZT material, and exploring new CZT-based gamma-ray detectors. In this paper, we report on our recent findings from the material characterization and tests of actual CZT devices fabricated in our laboratory and from materials/detectors supplied by different commercial vendors. In particular, we emphasize the critical role of secondary phases in the current CZT material and issues in fabricating the CZT detectors, both of which affect their performance.

  16. Lawrence Livermore National Security CFO Processes Functional Management Assessment

    SciTech Connect

    Sparks, A; Sampson, D; Thomas, B; Mendez, M

    2008-06-12

    The scope of the Functional Management Assessment of the CFO included a review of the CFO Organizational Structure, including deployed financial services and the division of responsibilities and internal controls between CFO and other organizations that perform financial functions across the Laboratory. In addition, the assessment team solicited input from end users and reviewers. Three issues discussed are: ISSUE 1: Financial activities and cash transactions are occurring outside the CFO organization. Approximately $200M of non-purchase order spending occurs in seven areas outside CFO control (travel, relocation, special disbursements, IPO, legal, risk management, and freight). NIF financial services have not been integrated into the CFO organization and operate outside CFO control. Business risks--There is no single point of financial accountably; Currently within the CFO and Business and Operations organizations there is a lack of clarity of roles and responsibilities for financial activities; Financial talent within the laboratory is fragmented; and Inefficiencies exist based on the current structure; An example of the above business risks associated with organizational structure can be observed in the process for reimbursement of relocation costs to employees. Currently, Human Resources and Travel both administer portions of an employee's relocation. Costs are reviewed for compliance with FAR travel guidelines and for compliance with the offer letter but there is no financial review for allowability of costs nor is there a single point where the total relocation costs are reviewed. Through the e-pay system the check is processed by the CFO organization but there is no review by that organization. ISSUE 2: Impact of involuntary separation on current and future activities. 3 risks are: (1) Loss of internal controls--with the upcoming involuntary reductions there will be a loss of personnel with institutional knowledge which will increase the risk of losing

  17. 77 FR 10783 - Meeting of National Council on the Humanities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-23

    ... ARTS AND THE HUMANITIES Meeting of National Council on the Humanities AGENCY: The National Endowment for the Humanities. ACTION: Notice of meeting. Pursuant to the provisions of the Federal Advisory... Humanities will meet in Washington, DC on March 8-9, 2012. The purpose of the meeting is to advise...

  18. 75 FR 6729 - Meeting of National Council on the Humanities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-10

    ... THE ARTS AND THE HUMANITIES Meeting of National Council on the Humanities AGENCY: The National Endowment for the Humanities. ACTION: Notice of meeting. Pursuant to the provisions of the Federal Advisory... Humanities will meet in Washington, DC on February 25- 26, 2010. The purpose of the meeting is to advise...

  19. 75 FR 68007 - Meeting of National Council on the Humanities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-04

    ... THE ARTS AND THE HUMANITIES Meeting of National Council on the Humanities AGENCY: The National Endowment for the Humanities. ACTION: Notice of meeting. Pursuant to the provisions of the Federal Advisory... Humanities will meet in Washington, DC on November 18- 19, 2010. The purpose of the meeting is to advise...

  20. 75 FR 39052 - Meeting of National Council on the Humanities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-07

    ... ARTS AND THE HUMANITIES Meeting of National Council on the Humanities AGENCY: The National Endowment for the Humanities, ARTS. ACTION: Notice of meeting. Pursuant to the provisions of the Federal... the Humanities will meet in Washington, DC on July 22-23, 2010. The purpose of the meeting is...

  1. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    .... January 13, 2011. Written comments may be sent to the Deputy Manager, National Communications System...-mail message. Fax: (703) 235-4981. Mail: Deputy Manager, National Communications System, National... Executive Officer (CEO), Level 3 Communications, will call the meeting to order and provide opening...

  2. 76 FR 28056 - National Human Genome Research Institute; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Initial Review Group, Genome Research Review... Scientific Review, National Human Genome Research Institute, National Institutes of Health, Bethesda,...

  3. 77 FR 60706 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed.... Name of Committee: National Human Genome Research Institute Special Emphasis Panel; Special Emphasis... Officer, Scientific Review Branch, National Human Genome Research Institute, National Institutes of...

  4. 76 FR 58023 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-19

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Initial Review Group; Genome Research Review... Review, National Human Genome Research Institute, National Institutes of Health, Bethesda, MD 20892,...

  5. 78 FR 68856 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-15

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... Review Officer, Scientific Review Branch, National Human Genome Research Institute, National Institutes... of Federal Domestic Assistance Program Nos. 93.172, Human Genome Research, National Institutes...

  6. 75 FR 8374 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-24

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel, Revolutionary..., National Human Genome Research Institute, National Institutes of Health, 5635 Fishers Lane, Suite 4076,...

  7. Evolving perceptions of security - US National Security surveys 1993--1995. Progress report, September 30, 1995--November 14, 1995

    SciTech Connect

    Herron, K.G.; Jenkins-Smith, H.C.

    1996-06-01

    This study analyzes findings from a national survey of 2,490 randomly selected members of the US public conducted between September 30 and November 14, 1995. It provides an over time comparison of public perceptions about nuclear weapons risks and benefits and key nuclear policy issues between 1993 and 1995. Other areas of investigation include policy preferences regarding nuclear proliferation, terrorism, US/Russian nuclear cooperation, and personal security. Public perceptions of post-cold war security were found to be evolving in unexpected ways. The perceived threat of nuclear conflict involving the US had not declined, and the threat of nuclear conflict between other countries and fears of nuclear proliferation and terrorism had increased. Perceived risks associated with managing the US nuclear arsenal were also higher. Perceptions of external and domestic benefits from US nuclear weapons were not declining. Support was found for increasing funding for nuclear weapons safety, training, and maintenance, but most respondents favored decreasing funding for developing and testing new nuclear weapons. Strong support was evident for programs and funding to prevent nuclear proliferation and terrorism. Though skeptical that nuclear weapons can be eliminated, most respondents supported reducing the US nuclear arsenal, banning nuclear test explosions, and ending production of fissile materials to make nuclear weapons. Statistically significant relationships were found between perceptions of nuclear weapons risks and benefits and policy and spending preferences. Demographic variables and basic social and political beliefs were systematically related both to risk and benefit perceptions and policy and spending options.

  8. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  9. Proposed Methodology for Developing a National Strategy for Human Resource Development: Lessons Learned from a NNSA Workshop

    SciTech Connect

    Elkhamri, Oksana O.; Frazar, Sarah L.; Essner, Jonathan; Vergino, Eileen; Bissani, Mo; Apt, Kenneth E.; McClelland-Kerr, John; Mininni, Margot; VanSickle, Matthew; Kovacic, Donald

    2009-10-07

    This paper describes a recent National Nuclear Security Administration (NNSA) workshop on Human Resource Development, which was focused on the potential methodology for developing a National Human Resource strategy for nuclear power in emerging nuclear states. The need for indigenous human resource development (HRD) has been singled out as a key milestone by the International Atomic Energy Agency (IAEA) in its 2007 Milestones document. A number of countries considering nuclear energy have reiterated this need for experts and specialists to support a national nuclear program that is sustainable and secure. Many have expressed concern over how best to assure the long-term availability of crucial human resource, how to approach the workforce planning process, and how to determine the key elements of developing a national strategy.

  10. Technology transfer in a changing national security environment. Final report May-Nov 90

    SciTech Connect

    Finkler, R.A.; Boezer, G.L.; Foss, E.J.; Jorstad, N.D.; Ramsbotham, A.J.

    1990-12-01

    This paper examines U.S. export control, with particular emphasis on technology transfer as it affects our relationship with Japan. It describes the evolution of export control in the United States, including the Bucy Report, the impact of Afghanistan, and policy changes regarding the People's Republic of China. U.S. control mechanisms for critical technology currently in place are described; these include the Export Administration Regulations, the International Traffic in Arms Regulations (ITAR), and the Militarily Critical Technologies List (MCTL). The evolution of Japan's technology base and export control mechanisms are discussed, as well as its military capabilities. Japan and the United States have had different philosophies regarding export control, with the United States more likely to use controls as part of its foreign policy. However, U.S. export control policy is increasingly seen as having an important economic security aspect in addition to its national security objectives. Changes in Eastern Europe and the Soviet Union have placed the issue of export control in a new perspective. Therefore, the paper also examines in some detail the major developments in the European community which will affect the future technology environment and its relationship to national security. This paper was originally presented at a workshop of the Japan-U.S. Joint Study Group on Trade, Finance and Technology in East-West Economic Relations. A primary purpose of the paper was to enhance mutual understanding between the United States and Japan, and to facilitate the resolution of differences in the technology security arena.

  11. Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce

    SciTech Connect

    2008-06-30

    This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

  12. Disposal Activities and the Unique Waste Streams at the Nevada National Security Site (NNSS)

    SciTech Connect

    Arnold, P.

    2012-10-31

    This slide show documents waste disposal at the Nevada National Security Site. Topics covered include: radionuclide requirements for waste disposal; approved performance assessment (PA) for depleted uranium disposal; requirements; program approval; the Waste Acceptance Review Panel (WARP); description of the Radioactive Waste Acceptance Program (RWAP); facility evaluation; recent program accomplishments, nuclear facility safety changes; higher-activity waste stream disposal; and, large volume bulk waste streams.

  13. Nevada National Security Site Environmental Report 2012 Attachment A: Site Description

    SciTech Connect

    Wills, Cathy A

    2013-09-11

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  14. Nevada National Security Site Environmental Report 2013 Attachment A: Site Description

    SciTech Connect

    Wills, C.

    2014-09-09

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  15. Securing health and human rights: Sandwell's community health network.

    PubMed

    Al-Osaimi, Ali

    2008-01-01

    Minority communities face discrimination and abuse. The main health problems they face are those of severe and early chronic disease and poor well-being due to inequality in jobs, education and access to health care. The Sandwell community health network provides support workers to six major minority groups in Sandwell, providing information and access to skilled health services. Without securing health as a basic right for our minorities we perpetuate divisions in our society which cause mistrust, conflict and violence. The health system has a vital role to play in securing people's rights and campaigning for equality and justice for all our communities, to enhance community cohesion.

  16. The Role of the DOE Weapons Laboratories in a Changing National Security Environment: CNSS Papers No. 8, April 1988

    DOE R&D Accomplishments Database

    Hecker, S. S.

    1988-04-01

    The contributions of the Department of Energy (DOE) nuclear weapons laboratories to the nation's security are reviewed in testimony before the Subcommittee on Procurement and Military Nuclear Systems of the House Armed Services Committee. Also presented are contributions that technology will make in maintaining the strategic balance through deterrence, treaty verification, and a sound nuclear weapons complex as the nation prepares for significant arms control initiatives. The DOE nuclear weapons laboratories can contribute to the broader context of national security, one that recognizes that military strength can be maintained over the long term only if it is built upon the foundations of economic strength and energy security.

  17. The role of the DOE weapons laboratories in a changing national security environment: CNSS papers No. 8, April 1988

    SciTech Connect

    Hecker, S.S.

    1988-01-01

    The contributions of the Department of Energy (DOE) nuclear weapons laboratories to the nation's security are reviewed in testimony before the Subcommittee on Procurement and Military Nuclear Systems of the House Armed Services Committee. Also presented are contributions that technology will make in maintaining the strategic balance through deterrence, treaty verification, and a sound nuclear weapons complex as the nation prepares for significant arms control initiatives. The DOE nuclear weapons laboratories can contribute to the broader context of national security, one that recognizes that military strength can be maintained over the long term only if it is built upon the foundations of economic strength and energy security. 9 refs.

  18. Timely integration of safeguards and security with projects at Los Alamos National Laboratory

    SciTech Connect

    Price, R.; Blount, P. M.; Garcia, S. W.; Gonzales, R. L.; Salazar, J. B.; Campbell, C. H.

    2004-01-01

    The Safeguards and Security (S&S) Requirements Integration Team at Los Alamos National Laboratory (LANL) has developed and implemented an innovative management process that will be described in detail. This process systematically integrates S&S planning into construction, facility modifications or upgrades, mission changes, and operational projects. It extends and expands the opportunities provided by the DOE project management manual, DOE M 413.3-1. Through a series of LANL documents, a process is defined and implemented that formally identifies an S&S professional to oversee, coordinate, facilitate, and communicate among the identified S&S organizations and the project organizations over the life cycle of the project. The derived benefits, namely (1) elimination/reduction of re-work or costly retrofitting, (2) overall project cost savings because of timely and improved planning, (3) formal documentation, and (4) support of Integrated Safeguards and Security Management at LANL, will be discussed. How many times, during the construction of a new facility or the modification of an existing facility, have the persons responsible for the project waited until the last possible minute or until after construction is completed to approach the security organizations for their help in safeguarding and securing the facility? It's almost like, 'Oh, by the way, do we need access control and a fence around this building and just what are we going to do with our classified anyway?' Not only is it usually difficult; it's also typically expensive to retrofit or plan for safeguards and security after the fact. Safeguards and security organizations are often blamed for budget overruns and delays in facility occupancy and program startup, but these problems are usually due to poor front-end planning. In an effort to help projects engage safeguards and security in the pre-conceptual or conceptual stages, we implemented a high level formality of operations. We established institutional

  19. An assessment of various household food security measures in Hawaiì has implications for national food security research and monitoring.

    PubMed

    Derrickson, J P; Fisher, A G; Anderson, J E; Brown, A C

    2001-03-01

    The Core Food Security Module (CFSM), the national food security monitoring tool, requires three affirmative responses to categorize households as food insecure. If this tool is unreliable or inaccurate, vulnerable segments of our population may be adversely affected. The objectives of the present study were to assess the credibility of applying the CFSM categorical measure to a population sample from Hawaiì and to assess the concurrent validity of the CFSM, the new face-valid measure and measures adapted from the Radimer/Cornell (RC) measure and Community Childhood Hunger Identification Project. The sample included 1469 respondents gathered through a statewide telephone sample and 144 food pantry recipients. Responses to the 18 CFSM questions were used to create all four measures. The credibility of the CFSM categorical measure was also assessed via comparisons with individual items and with the 1995 national modal CFSM response pattern. Categorical measures were compared across food security prevalence estimates and indices of income and vegetable intake and with the CFSM scale measure. Differences in the modal response pattern between samples affected CFSM categorization. Only 36% of households followed the Hawaiì modal response pattern, and categorization was not consistent with the content of key items. Although 85% of the households were classified as food secure by the CFSM, only 78% were classified as food secure with each of the other food security measures. Concurrent validity of all measures was confirmed. A reassessment of the national CFSM categorical measure appears warranted.

  20. 75 FR 52538 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-26

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel. Date: November 19-20..., Scientific Review Officer, Scientific Review Branch, National Human Genome Research Institute,...

  1. 78 FR 20933 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-08

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel Loan Repayment Program... applications. Place: National Human Genome Research Institute, Room 3055, 5635 Fishers Lane, Rockville,...

  2. 77 FR 61770 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-11

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel; Genomic Medicine RFAs..., Human Genome Research, National Institutes of Health, HHS) ] Dated: October 4, 2012. David...

  3. 76 FR 35223 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-16

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel, Sequencing Centers...D, Scientific Review Officer, Scientific Review Branch, National Human Genome Research...

  4. 78 FR 14806 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-07

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel: Clinically Relevant... grant applications. Place: National Human Genome Research Institute, 4th Floor Conference Room,...

  5. 76 FR 65204 - National Human Genome Research Institute; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-20

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel; Genomic Resource...: Rudy O. Pozzatti, Ph.D., Scientific Review Officer, Scientific Review Branch, National Human...

  6. 78 FR 61851 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-04

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel Extramural Gene... review and evaluate grant applications. Place: National Human Genome Research Institute, 4076...

  7. 77 FR 28888 - National Human Genome Research Institute Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-16

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute Notice of Closed... of Committee: National Human Genome Research Institute Initial Review Group; Genome Research Review... applications. Place: National Human Genome Research Institute, 3635 Fishers Lane, Suite 4076, ] Rockville,...

  8. 78 FR 64222 - National Human Genome Research Institute; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-28

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Initial Review Group; Genome Research Review..., Ph.D., Scientific Review Officer, Office of Scientific Review, National Human Genome...

  9. Research Universities and the Future of America: Ten Breakthrough Actions Vital to Our Nation's Prosperity and Security

    ERIC Educational Resources Information Center

    National Academies Press, 2012

    2012-01-01

    "Research Universities and the Future of America" presents critically important strategies for ensuring that our nation's research universities contribute strongly to America's prosperity, security, and national goals. Widely considered the best in the world, our nation's research universities today confront significant financial pressures,…

  10. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 3 2013-10-01 2013-10-01 false Priority Access Service (PAS) for National.... 64, App. B Appendix B to Part 64—Priority Access Service (PAS) for National Security and Emergency... meaning as in Appendix A to Part 64: (a) Assignment; (b) Government; (c) National Communications...

  11. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...). Editorial Note: For Federal Register citations affecting Form X-15AA-1, see the List of CFR Sections... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or...

  12. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...). Editorial Note: For Federal Register citations affecting Form X-15AA-1, see the List of CFR Sections... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or...

  13. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...). Editorial Note: For Federal Register citations affecting Form X-15AA-1, see the List of CFR Sections... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or...

  14. Preliminary Findings on the Health of the Nation Outcome Scales for Children and Adolescents in an Inpatient Secure Adolescent Unit

    ERIC Educational Resources Information Center

    Hunt, Jenny; Wheatley, Malcolm

    2009-01-01

    To date there is limited research examining the use of the Health of the Nation Outcome Scales for Children and Adolescents (HoNOSCA) with adolescents in secure care. The aim of this article is to examine the inter-rater reliability, concurrent validity and clinical utility of HoNOSCA in an adolescent secure psychiatric unit. Twenty-four…

  15. 75 FR 4595 - BATS Y-Exchange, Inc.; Notice of Filing of Application for Registration as a National Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-28

    ... COMMISSION BATS Y-Exchange, Inc.; Notice of Filing of Application for Registration as a National Securities... Y-Exchange, Inc. (``BATS Y Exchange'') submitted to the Securities and Exchange Commission... publishing this notice to solicit comments on BATS Y Exchange's Form 1. The Commission will take...

  16. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...). Editorial Note: For Federal Register citations affecting Form X-15AA-1, see the List of CFR Sections... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or...

  17. U.S. national security through global technical engagement presentation to composite group A : homeland and international operations.

    SciTech Connect

    Abeyta, Henry J.

    2010-05-01

    This talk will discuss Sandia's Global Security Program focused on reducing proliferation and terrorism threats to U.S. national security through global technical engagement. Elements include nuclear and radiological risks, biological and chemical risks, and multi-threat risk reduction. Also, recent work addressing the need to better integrate nonproliferation, arms control, counterterrorism, and nuclear deterrent objectives will be discussed.

  18. Acceptance Factors Influencing Adoption of National Institute of Standards and Technology Information Security Standards: A Quantitative Study

    ERIC Educational Resources Information Center

    Kiriakou, Charles M.

    2012-01-01

    Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…

  19. Closure Report for Corrective Action Unit 566: EMAD Compound, Nevada National Security Site, Nevada with ROTC-1, Revision 0

    SciTech Connect

    Mark Krauss

    2011-06-01

    This Closure Report (CR) presents information supporting the closure of Corrective Action Unit (CAU) 566: EMAD Compound, Nevada National Security Site, Nevada. Corrective Action Unit 566 comprises Corrective Action Site (CAS) 25-99-20, EMAD Compound, located within Area 25 of the Nevada National Security Site. The purpose of this CR is to provide documentation supporting the completed corrective actions and provide data confirming that the closure objectives for CAU 566 were met. To achieve this, the following actions were performed: • Review the current site conditions, including the concentration and extent of contamination. • Implement any corrective actions necessary to protect human health and the environment. • Properly dispose of corrective action and investigation wastes. • Document Notice of Completion and closure of CAU 566 issued by the Nevada Division of Environmental Protection. From October 2010 through May 2011, closure activities were performed as set forth in the Streamlined Approach for Environmental Restoration Plan for CAU 566: EMAD Compound, Nevada National Security Site, Nevada. The purposes of the activities as defined during the data quality objectives process were as follows: • Determine whether contaminants of concern (COCs) are present. • If COCs are present, determine their nature and extent, implement appropriate corrective actions, and properly dispose of wastes. Analytes detected during the closure activities were evaluated against final action levels (FALs) to determine COCs for CAU 566. Assessment of the data from collected soil samples, and from radiological and visual surveys of the site, indicates the FALs were exceeded for polychlorinated biphenyls (PCBs), semivolatile organic compounds (SVOCs), and radioactivity. Corrective actions were implemented to remove the following: • Radiologically contaminated soil assumed greater than FAL at two locations • Radiologically contaminated soil assumed greater than FAL with

  20. Nevada National Security Site-Directed Research and Development FY 2011 Annual Report

    SciTech Connect

    Howard Bender, comp.

    2012-04-25

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  1. Is The Obesity Epidemic A National Security Issue Around The Globe?

    PubMed Central

    Popkin, Barry M.

    2013-01-01

    Purpose of review To understand how obesity affects national security by focusing on three case study countries—the United States, China, and Mexico. Recent findings While in the United States and Mexico, over two-thirds of adults are overweight and obese compared to about 29% of Chinese, large increases in the prevalence of overweight and obesity have occurred in all three countries in the past two decades. National security is affected in the US ranges both from an economic perspective-- increasing health care problems and costs to the point where our labor costs have reached uncompetitive cost levels, and from a military preparedness perspective, namely our overweight soldiers are unable to perform normal activities and functions required of soldiers. In both Mexico and China, it is the economic and health system costs that are dominant concerns, both the costs of obesity-related medical care and the productivity of the work force are creating potential long-term effects on economic competitiveness. Summary Obesity is adversely affecting the welfare, economic, and in some cases military security of these three countries. PMID:21543976

  2. Food security, poverty, and human development in the United States.

    PubMed

    Cook, John T; Frank, Deborah A

    2008-01-01

    Access to food is essential to optimal development and function in children and adults. Food security, food insecurity, and hunger have been defined and a U.S. Food Security Scale was developed and is administered annually by the Census Bureau in its Current Population Survey. The eight child-referenced items now make up a Children's Food Security Scale. This review summarizes the data on household and children's food insecurity and its relationship with children's health and development and with mothers' depressive symptoms. It is demonstrable that food insecurity is a prevalent risk to the growth, health, cognitive, and behavioral potential of America's poor and near-poor children. Infants and toddlers in particular are at risk from food insecurity even at the lowest levels of severity, and the data indicate an "invisible epidemic" of a serious condition. Food insecurity is readily measured and rapidly remediable through policy changes, which a country like the United States, unlike many others, is fully capable of implementing. The food and distribution resources exist; the only constraint is political will.

  3. The Security of Russia's Nuclear Arsenal: The Human Factor

    SciTech Connect

    Ball, D.Y.

    1999-10-12

    Assertions by the Russian military that all of their nuclear weapons are secure against theft and that nuclear units within the military are somehow insulated from the problems plaguing the Russian military should not be accepted uncritically. Accordingly, we should not give unwarranted credence to the pronouncements of military figures like Cal.-Gen. Igor Valynkin, Chief of the Defense Ministry's 12th Main Directorate, which oversees the country's nuclear arsenal. He contends that ''Russian nuclear weapons are under reliable supervision'' and that ''talk about the unreliability of our control over nuclear weapons has only one pragmatic goal--to convince international society that the country is incapable of maintaining nuclear safety and to introduce international oversight over those weapons, as it is done, for example, in Iraq.'' While the comparison to Iraq is preposterous, many analysts might agree with Valynkin's sanguine appraisal of the security of Russia's nuclear weapons. In contrast, I argue that the numerous difficulties confronting the military as a whole should cause concern in the West over the security of the Russian nuclear arsenal.

  4. Why do nations matter? The struggle for belonging and security in an uncertain world.

    PubMed

    Skey, Michael

    2013-03-01

    This paper explores the reasons why national forms of identification and organization (might) matter in the contemporary era. In contrast to the majority of macro-sociological work dealing with this topic, I develop an analytical framework that draws together recent research on everyday nationalism with micro-sociological and psychological studies pointing to the importance of routine practices, institutional arrangements and symbolic systems in contributing to a relatively settled sense of identity, place and community. The second part of the paper focuses on the hierarchies of belonging that operate within a given national setting. Of particular interest is the largely taken-for-granted status of the ethnic majority and the degree to which it underpins claims to belonging and entitlement that are used to secure key allocative and authoritative resources. PMID:23488702

  5. International and national security applications of cryogenic detectors - mostly nuclear safeguards

    SciTech Connect

    Rabin, Michael W

    2009-01-01

    As with science, so with security - in both arenas, the extraordinary sensitivity of cryogenic sensors enables high-confidence detection and high-precision measurement even of the faintest signals. Science applications are more mature, but several national and international security applications have been identified where cryogenic detectors have high potential payoff. International safeguards and nuclear forensics are areas needing new technology and methods to boost speed, sensitivity, precision and accuracy. Successfully applied, improved nuclear materials analysis will help constrain nuclear materials diversion pathways and contribute to treaty verification. Cryogenic microcalorimeter detectors for X-ray, gamma ray, neutron, and alpha particle spectrometry are under development with these aims in mind. In each case the unsurpassed energy resolution of microcalorimeters reveals previously invi sible spectral features of nuclear materials. Preliminary results of quantitative analysis indicate substantial improvements are still possible, but significant work will be required to fully understand the ultimate performance limits.

  6. DOE integrated safeguards and security (DISS) system a nation-wide distributed information system for personnel security

    SciTech Connect

    Block, B.

    1997-06-05

    DISS uses secure client-server and relational database technology across open networks to address the problems of security clearance request processing and tracking of security clearances for the Department of energy. The system supports the entire process from data entry by the prospective clearance holders through tracking of all DOE clearances, and use of standard DOE badges in automated access control systems throughout the DOE complex.

  7. Computer science security research and human subjects: emerging considerations for research ethics boards.

    PubMed

    Buchanan, Elizabeth; Aycock, John; Dexter, Scott; Dittrich, David; Hvizdak, Erin

    2011-06-01

    This paper explores the growing concerns with computer science research, and in particular, computer security research and its relationship with the committees that review human subjects research. It offers cases that review boards are likely to confront, and provides a context for appropriate consideration of such research, as issues of bots, clouds, and worms enter the discourse of human subjects review.

  8. Mitigation Policy Scenario of Space Debris Threat Related with National Security

    NASA Astrophysics Data System (ADS)

    Herdiansyah, Herdis; Frimawaty, Evy; Munir, Ahmad

    2016-02-01

    The development of air space recently entered a new phase, when the space issues correlated with the future of a country. In past time, the space authorization was related with advancing technology by many space mission and various satellite launchings, or it could be said that who ruled technology will rule the space. Therefore, the numerous satellites in the space could be a threat for the countries which are mainly located in the path of the satellite, especially in the equatorial region including Indonesia. This study aims to create a policy scenario in mitigating the threat of space debris. The results showed that although space debris was not threatened national security for now, but the potential and its impact on the future potentially harmful. The threats of orbit circulation for some experts considered as a threat for national security, because its danger potential which caused by space debris could significantly damage the affected areas. However, until now Indonesia has no comprehensive mitigation strategy for space matters although it has been ratified by the United Nations Convention.

  9. Deterrence and National Security in the Face of an Amorphous Threat

    SciTech Connect

    Werne, R

    2001-01-05

    The National Security threats that we face today and, in turn, the National Security . requirements, are more diverse and complex than they were during the Cold-War from 1945-1990. During that period, and bolstered by the experiences of World Wars I and II, US National Security policy was focused on the stabilization of post WW II country boundaries and containment of the Soviet block and China. The result was the bipolar world in which the nuclear and conventional forces of the United States, the Soviet Union, and their respective allies ensured a measure of political stability through a military stalemate of world wide proportions. The practical result was that large scale changes in national borders were unlikely, but internal conflict within countries, and local conflicts between neighboring countries could still occur, albeit with participation from one or both of the Superpower camps. US National Security Policy was designed primarily for stabilization of the bipolar world on the military front and for competition with the Soviet Union and China on economic and political fronts. The collapse of the Soviet Union changed the global picture. The bipolar world and its military stalemate appear to be gone for the moment and the threat which was the foundation for US National Security policy has changed significantly. Some will argue that China has intentions of replacing the Soviet Union as a military superpower and thus recreate the bipolar world. Furthermore, Russia still has significant nuclear forces and has recently talked of lowering the nuclear threshold in an apparent attempt to make up for its weakened conventional forces. Clearly the threat of large scale nuclear war is much reduced, but not gone entirely. Having acknowledged the Chinese and Russian threats, what does the global picture look like today? The boundaries of most countries are secure but there are significant frictions, that have, or could lead, to armed conflict. Most of these are today

  10. NATIONAL HUMAN EXPOSURE ASSESSMENT SURVEY (NHEXAS): OPPORTUNITIES AND LESSONS LEARNED

    EPA Science Inventory

    The National Human Exposure Assessment Survey (NHEXAS) in its fullest sense is a conceptual design, which upon implementation, will have long-term implications to exposure research and assessment. The ultimate goal is to document national distribution of human exposure to pote...

  11. The mechanisms of human recognition as a guideline for security feature development

    NASA Astrophysics Data System (ADS)

    Schaede, Johannes; Lohweg, Volker

    2006-02-01

    Security features for automated processing and / or forensic identification of bank notes have proven to reliably recognize and select counterfeit bank notes in circulation. As a result of this development the decisive first line of defense is the public, where either the criminal fraternities or opportunity counterfeiters try to place their antisocial products. Therefore those security features, which fit into the range of subconscious recognition and habitual knowledge, are those of major importance in application and development. This paper tries to answer some questions how the human recognition, its well-developed functionality and how these through evolution-acquired capabilities may considerably influence the improvement of public security features in bank notes.

  12. Medical countermeasures for national security: a new government role in the pharmaceuticalization of society.

    PubMed

    Elbe, Stefan; Roemer-Mahler, Anne; Long, Christopher

    2015-04-01

    How do governments contribute to the pharmaceuticalization of society? Whilst the pivotal role of industry is extensively documented, this article shows that governments too are accelerating, intensifying and opening up new trajectories of pharmaceuticalization in society. Governments are becoming more deeply invested in pharmaceuticals because their national security strategies now aspire to defend populations against health-based threats like bioterrorism and pandemics. To counter those threats, governments are acquiring and stockpiling a panoply of 'medical countermeasures' such as antivirals, next-generation vaccines, antibiotics and anti-toxins. More than that, governments are actively incentivizing the development of many new medical countermeasures--principally by marshaling the state's unique powers to introduce exceptional measures in the name of protecting national security. At least five extraordinary policy interventions have been introduced by governments with the aim of stimulating the commercial development of novel medical countermeasures: (1) allocating earmarked public funds, (2) granting comprehensive legal protections to pharmaceutical companies against injury compensation claims, (3) introducing bespoke pathways for regulatory approval, (4) instantiating extraordinary emergency use procedures allowing for the use of unapproved medicines, and (5) designing innovative logistical distribution systems for mass drug administration outside of clinical settings. Those combined efforts, the article argues, are spawning a new, government-led and quite exceptional medical countermeasure regime operating beyond the conventional boundaries of pharmaceutical development and regulation. In the first comprehensive analysis of the pharmaceuticalization dynamics at play in national security policy, this article unearths the detailed array of policy interventions through which governments too are becoming more deeply imbricated in the pharmaceuticalization of

  13. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    SciTech Connect

    Farnham, Irene; Marutzky, Sam

    2014-12-01

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  14. Post-Closure Inspection Letter Report for Corrective Action Units on the Nevada National Security Site

    SciTech Connect

    Boehleke, R. F.

    2014-05-06

    This letter serves as the post-closure inspection letter report for Corrective Action Units (CAUs) on the Nevada National Security Site for calendar year 2013. The inspections identified maintenance and repair is required at the following sites: sign and/or fence repair is necessary at CAUs 113, 137, 139, 140, 143, 262, 370, 371, 372, 374, 476, 478, 529, 542, and 560; animal burrows were identified at CAU 547; and erosion was identified at CAUs 366, 367, 383, 551, and 574. In addition, the following use restrictions were removed during 2013 and will no longer be inspected in 2014: 165, 357, and 528.

  15. Nevada National Security Site 2013 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect

    Hudson, David B

    2014-02-13

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2013 results. Beginning with this report, analysis results for leachate collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included.

  16. Multi-discipline Waste Acceptance Process at the Nevada National Security Site - 13573

    SciTech Connect

    Carilli, Jhon T.; Krenzien, Susan K.

    2013-07-01

    The Nevada National Security Site low-level radioactive waste disposal facility acceptance process requires multiple disciplines to ensure the protection of workers, the public, and the environment. These disciplines, which include waste acceptance, nuclear criticality, safety, permitting, operations, and performance assessment, combine into the overall waste acceptance process to assess low-level radioactive waste streams for disposal at the Area 5 Radioactive Waste Management Site. Four waste streams recently highlighted the integration of these disciplines: the Oak Ridge Radioisotope Thermoelectric Generators and Consolidated Edison Uranium Solidification Project material, West Valley Melter, and classified waste. (authors)

  17. National Center for Nuclear Security: The Nuclear Forensics Project (F2012)

    SciTech Connect

    Klingensmith, A. L.

    2012-03-21

    These presentation visuals introduce the National Center for Nuclear Security. Its chartered mission is to enhance the Nation’s verification and detection capabilities in support of nuclear arms control and nonproliferation through R&D activities at the NNSS. It has three focus areas: Treaty Verification Technologies, Nonproliferation Technologies, and Technical Nuclear Forensics. The objectives of nuclear forensics are to reduce uncertainty in the nuclear forensics process & improve the scientific defensibility of nuclear forensics conclusions when applied to nearsurface nuclear detonations. Research is in four key areas: Nuclear Physics, Debris collection and analysis, Prompt diagnostics, and Radiochemistry.

  18. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    SciTech Connect

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-12-29

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  19. Quantitative analysis of Indonesia's reserves and energy security as an evaluation by the nation in facing global competition

    NASA Astrophysics Data System (ADS)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-12-01

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  20. Security challenges in integration of a PHR-S into a standards based national EHR.

    PubMed

    Mense, Alexander; Hoheiser Pförtner, Franz; Sauermann, Stefan

    2014-01-01

    Health related data provided by patients themselves is expected to play a major role in future healthcare. Data from personal health devices, vaccination records, health diaries or observations of daily living, for instance, is stored in personal health records (PHR) which are maintained by personal health record systems (PHR-S). Combining this information with medical records provided by healthcare providers in electronic health records (EHR) is one of the next steps towards "personal care". Austria currently sets up a nationwide EHR system that incorporates all healthcare providers and is technically based on international standards (IHE, HL7, OASIS, ...). Looking at the expected potential of merging PHR and EHR data it is worth to analyse integration approaches. Although knowing that an integration requires the coordination of processes, information models and technical architectures, this paper specifically focuses on security issues by evaluating general security requirements for a PHR-S (based on HL7 PHR-S FM), comparing them with the information security specifications for the Austrian's national EHR (based on ISO/IES 27000 series) and identifying the main challenges as well as possible approaches.

  1. Human detection in sensitive security areas through recognition of omega shapes using MACH filters

    NASA Astrophysics Data System (ADS)

    Rehman, Saad; Riaz, Farhan; Hassan, Ali; Liaquat, Muwahida; Young, Rupert

    2015-03-01

    Human detection has gained considerable importance in aggravated security scenarios over recent times. An effective security application relies strongly on detailed information regarding the scene under consideration. A larger accumulation of humans than the number of personal authorized to visit a security controlled area must be effectively detected, amicably alarmed and immediately monitored. A framework involving a novel combination of some existing techniques allows an immediate detection of an undesirable crowd in a region under observation. Frame differencing provides a clear visibility of moving objects while highlighting those objects in each frame acquired by a real time camera. Training of a correlation pattern recognition based filter on desired shapes such as elliptical representations of human faces (variants of an Omega Shape) yields correct detections. The inherent ability of correlation pattern recognition filters caters for angular rotations in the target object and renders decision regarding the existence of the number of persons exceeding an allowed figure in the monitored area.

  2. 77 FR 5035 - National Human Genome Research Institute; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-01

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel Sequencing Technology... Genome Research Institute, National Institutes of Health, 5635 Fishers Lane, Suite 4076, MSC...

  3. 76 FR 63932 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-14

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel, ENCODE Technology RFA... Genome Research, National Institutes of Health, HHS) Dated: October 7, 2011 . Jennifer S....

  4. The people's role in U.S. national health security: past, present, and future.

    PubMed

    Schoch-Spana, Monica

    2012-03-01

    Over the past decade, assumptions have been made and unmade about what officials can expect of average people confronting a bioterrorist attack or other major health incident. The reframing of the public in national discourse and doctrine from a panic-stricken mob to a band of hearty survivors is a positive development and more realistic in terms of the empirical record. So, too, is the realization that citizen contributions to national health security encompass not only individual preparedness and volunteerism but also mutual aid and collective deliberation of the tough choices posed by health disasters. In projecting what needs to occur over the next 10 years in biosecurity, 2 priority challenges emerge: retaining the lesson that a public prone to panic, social disorder, and civil unrest is a myth, and building an infrastructure to bolster the public's full contributions to health emergency management.

  5. Countries at Risk: Heightened Human Security Risk to States With Transboundary Water Resources and Instability

    NASA Astrophysics Data System (ADS)

    Veilleux, J. C.; Sullivan, G. S.; Paola, C.; Starget, A.; Watson, J. E.; Hwang, Y. J.; Picucci, J. A.; Choi, C. S.

    2014-12-01

    The Countries at Risk project is a global assessment of countries with transboundary water resources that are at risk for conflict because of high human security instability. Building upon Basins at Risk (BAR) research, our team used updated Transboundary Freshwater Dispute Database georeferenced social and environmental data, quantitative data from global indices, and qualitative data from news media sources. Our assessment considered a combination of analyzing 15 global indices related to water or human security to identify which countries scored as highest risk in each index. From this information, we were able to assess the highest risk countries' human security risk by using a new human security measurement tool, as well as comparing this analysis to the World Bank's Fragile States Index and the experimental Human Security Index. In addition, we identified which countries have the highest number of shared basins, the highest percentage of territory covered by a transboundary basin, and the highest dependency of withdrawal from transboundary waters from outside their country boundaries. By synthesizing these social and environmental data assessments, we identified five countries to analyze as case studies. These five countries are Afghanistan, China, Iraq, Moldova, and Sudan. We created a series of 30 maps to spatial analyze the relationship between the transboundary basins and social and environmental parameters to include population, institutional capacity, and physical geography by country. Finally, we synthesized our spatial analysis, Human Security Key scores, and current events scored by using the BAR scale to determine what aspects and which basins are most at risk with each country in our case studies and how this concerns future global water resources.

  6. 75 FR 10488 - National Human Genome Research Institute; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel; NHGRI MAP Review... Human Genome Research Institute Special Emphasis Panel; LRP 2010 Teleconference. Date: April 7,...

  7. Nevada National Security Site Environmental Report 2011 Attachment A: Site Description

    SciTech Connect

    Cathy Wills, ed.

    2012-09-12

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2011. Included are subsections that summarize the site's geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site's environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  8. Emergency medical consequence planning and management for national special security events after September 11: Boston 2004.

    PubMed

    Kade, Kristy A; Brinsfield, Kathryn H; Serino, Richard A; Savoia, Elena; Koh, Howard K

    2008-10-01

    The post-September 11 era has prompted unprecedented attention to medical preparations for national special security events (NSSE), requiring extraordinary planning and coordination among federal, state, and local agencies. For an NSSE, the US Secret Service (USSS) serves as the lead agency for all security operations and coordinates with relevant partners to provide for the safety and welfare of participants. For the 2004 Democratic National Convention (DNC), designated an NSSE, the USSS tasked the Boston Emergency Medical Services (BEMS) of the Boston Public Health Commission with the design and implementation of health services related to the Convention. In this article, we describe the planning and development of BEMS' robust 2004 DNC Medical Consequence Management Plan, addressing the following activities: public health surveillance, on-site medical care, surge capacity in the event of a mass casualty incident, and management of federal response assets. Lessons learned from enhanced medical planning for the 2004 DNC may serve as an effective model for future mass gathering events. PMID:18688202

  9. 33 CFR 165.164 - Security Zones: Dignitary Arrival/Departure and United Nations Meetings, New York, NY.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    .../Departure and United Nations Meetings, New York, NY. 165.164 Section 165.164 Navigation and Navigable Waters... Guard District § 165.164 Security Zones: Dignitary Arrival/Departure and United Nations Meetings, New... information broadcasts. (b) Regulations. (1) The general regulations contained in 33 CFR 165.33 apply. (2)...

  10. Los Alamos National Security, LLC Request for Information from industrial entities that desire to commercialize Laboratory-developed Extremely Low Resource Optical Identifier (ELROI) tech

    SciTech Connect

    Erickson, Michael Charles

    2015-11-10

    Los Alamos National Security, LLC (LANS) is the manager and operator of the Los Alamos National Laboratory for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. LANS is a mission-centric Federally Funded Research and Development Center focused on solving the most critical national security challenges through science and engineering for both government and private customers.

  11. Use of the National Driver Register in the U.S. Department of Energy Human Reliability Program

    SciTech Connect

    Phillip M. Kannan, Center for Human Reliability Studies

    2007-01-01

    The National Driver Register (NDR) is a complex information network established and maintained by the Secretary of the Department of Transportation (DOT) under the National Driver Register Act of 1982. This report analyzes the question of whether information from the NDR is available to officials making Human Reliability Program (HRP) certification and recertification decisions and to Department of Energy (DOE) personnel security specialists making access authorization determinations.

  12. Securing America’s Future. Realizing the Potential of the Department of Energy’s National Laboratories

    SciTech Connect

    Glauthier, T. J.; Cohon, Jared L.; Augustine, Norman R.; Austin, Wanda M.; Elachi, Charles; Fleury, Paul A.; Hockfield, Susan J.; Meserve, Richard A.; Murray, Cherry A.

    2015-10-23

    The Department of Energy (DOE) laboratories are national assets that have contributed profoundly to the Nation’s security, scientific leadership, and economic competitiveness. In recognition of the continuing and evolving threats to our security and the dramatic increase in global economic and scientific competition, the laboratories are and will continue to be vitally important. Yet, the contributions of the National Laboratories are not inevitable, nor have they realized their full potential. This final report of the Commission to Review the Effectiveness of the National Energy Laboratories recommends ways the laboratories could overcome challenges to more efficiently and effectively accomplish the work for which they are uniquely suited.

  13. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    SciTech Connect

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  14. Audited credential delegation: a usable security solution for the virtual physiological human toolkit.

    PubMed

    Haidar, Ali N; Zasada, Stefan J; Coveney, Peter V; Abdallah, Ali E; Beckles, Bruce; Jones, Mike A S

    2011-06-01

    We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username-password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale. PMID:22670214

  15. Securing health through food systems: an initiative of the nutrition consortium of the National Health Research Institutes in Taiwan and Asia Pacific regional partners as a network.

    PubMed

    Wahlqvist, Mark L; Kuo, Ken N

    2009-01-01

    There are growing concerns about the health impacts of climate change with ecosystem degradation and global warming, finite reserves of non-renewable energy, water shortages in food-producing regions, limits to contemporary agriculture with its dependence on exhaustible petrochemical nitrogen and rock phosphate fertilizers, and failure of the global financial system. To date, health security has meant attention to safe environments especially water, sanitation and waste disposal; and access to health care and its affordability. Its dependency on food security (safety, sufficiency, sustainability, and satisfaction which requires diversity and quality) has been under-estimated because the current and imminent risks have increased and extended to more populations, because these may be less tractable and because the nature, extent and dynamics of nutritionally-related health are better appreciated. As a step towards more collaborative food and health systems, the National Health Research Institutes in Taiwan has created an interdisciplinary Nutrition Consortium (NC) with research and policy agendas. The NC held a food in Health Security (FIHS) in the Asia Pacific region roundtable in conjunction with the World Vegetable Center based in Tainan, supported by the National Science Council and Academia Sinica in Taiwan and the Australian Academies of Science and of Science Technology and Engineering, August 2-5th 2009 in Taiwan. A FIHS Network is being established to further the initiative. It should form part of the broader Human Security agenda.

  16. Securing health through food systems: an initiative of the nutrition consortium of the National Health Research Institutes in Taiwan and Asia Pacific regional partners as a network.

    PubMed

    Wahlqvist, Mark L; Kuo, Ken N

    2009-01-01

    There are growing concerns about the health impacts of climate change with ecosystem degradation and global warming, finite reserves of non-renewable energy, water shortages in food-producing regions, limits to contemporary agriculture with its dependence on exhaustible petrochemical nitrogen and rock phosphate fertilizers, and failure of the global financial system. To date, health security has meant attention to safe environments especially water, sanitation and waste disposal; and access to health care and its affordability. Its dependency on food security (safety, sufficiency, sustainability, and satisfaction which requires diversity and quality) has been under-estimated because the current and imminent risks have increased and extended to more populations, because these may be less tractable and because the nature, extent and dynamics of nutritionally-related health are better appreciated. As a step towards more collaborative food and health systems, the National Health Research Institutes in Taiwan has created an interdisciplinary Nutrition Consortium (NC) with research and policy agendas. The NC held a food in Health Security (FIHS) in the Asia Pacific region roundtable in conjunction with the World Vegetable Center based in Tainan, supported by the National Science Council and Academia Sinica in Taiwan and the Australian Academies of Science and of Science Technology and Engineering, August 2-5th 2009 in Taiwan. A FIHS Network is being established to further the initiative. It should form part of the broader Human Security agenda. PMID:19965334

  17. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  18. Human detection and motion analysis at security points

    NASA Astrophysics Data System (ADS)

    Ozer, I. Burak; Lv, Tiehan; Wolf, Wayne H.

    2003-08-01

    This paper presents a real-time video surveillance system for the recognition of specific human activities. Specifically, the proposed automatic motion analysis is used as an on-line alarm system to detect abnormal situations in a campus environment. A smart multi-camera system developed at Princeton University is extended for use in smart environments in which the camera detects the presence of multiple persons as well as their gestures and their interaction in real-time.

  19. Why the poor pay with their lives: oil pipeline vandalisation, fires and human security in Nigeria.

    PubMed

    Onuoha, Freedom C

    2009-07-01

    Since its discovery in Nigeria in 1956 crude oil has been a source of mixed blessing to the country. It is believed to have generated enormous wealth, but it has also claimed a great many lives. Scholarly attention on the impact of oil on security in Nigeria has largely focused on internal conflicts rather than on how disasters associated with oil pipeline vandalisation have impacted on human security in terms of causing bodily injuries and death, destroying livelihoods and fracturing families. This paper examines how pipeline vandalisation affects human security in these ways. It identifies women and children as those who are hardest hit and questions why the poor are the most vulnerable in oil pipeline disasters in this country. It recommends the adoption of a comprehensive and integrated framework of disaster management that will ensure prompt response to key early warning signs, risk-reduction and appropriate mitigation and management strategies.

  20. A human engineering and ergonomic evaluation of the security access panel interface

    SciTech Connect

    Hartney, C.; Banks, W.W.

    1995-02-01

    The purpose of this study was to empirically determine which of several security hardware interface designs produced the highest levels of end-user performance and acceptance. The FESSP Security Alarms and Monitoring Systems program area commissioned the authors study as decision support for upgrading the Argus security system`s primary user interface so that Argus equipment will support the new DOE and DoD security access badges. Twenty-two test subjects were repeatedly tested using six remote access panel (RAP) designs. Lawrence Livermore National Laboratory (LLNL) uses one of these interface designs in its security access booths. Along with the RAP B insert-style reader, the authors tested five prototype RAP variants, each with a different style of swipe badge reader, through which a badge is moved or swiped. The authors asked the untrained test subjects to use each RAP while they described how they thought they should respond so that the system would operate correctly in reading the magnetic strip on a security badge. With each RAP variant, subjects were required to make four successful card reads (swipes) in which the card reader correctly read and logged the transaction. After each trial, a subject completed a 10-item interface acceptance evaluation before approaching the next RAP. After interacting with the RAP interfaces (for a total of the six RAP trials), each subject completed a 7-item overview evaluation that compared and ranked the five experimental RAPs, using the original (RAP B) insert style as a standard.

  1. 75 FR 19984 - National Human Genome Research Institute; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-16

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed...: Camilla E. Day, PhD, Scientific Review Officer, CIDR, National Human Genome Research Institute, National... Review Branch, National Human Genome Research Institute, National Institutes of Health, 5635 Fishers...

  2. The Potential of Human Rights Education for Conflict Prevention and Security

    ERIC Educational Resources Information Center

    Davies, Lynn

    2010-01-01

    This paper examines the contribution of human rights education (HRE) to conflict prevention and to the promotion of security. It outlines the difficulties in evaluating the long-term impact of HRE, but then proposes five benefits of a rights-based approach to education--rights as secular, man-made, requiring transparency, enabling freedom from…

  3. ASSESSING BIOACCUMULATION FOR DERIVING NATIONAL HUMAN HEALTH WATER QUALITY CRITERIA

    EPA Science Inventory

    The United States Environmental Protection Agency is revising its methodology for deriving national ambient water quality criteria (AWQC) to protect human health. A component of this guidance involves assessing the potential for chemical bioaccumulation in commonly consumed fish ...

  4. Lawrence Livermore National Laboratory Safeguards and Security quarterly progress report to the Department of Energy Office of Safeguards and Security

    SciTech Connect

    Ruhter, W.D.; Al-Ayat, R.; Cole, C.E.; Thomas, L.L.

    1991-01-01

    The Safeguards Technology Program (STP) at Livermore supports the Technology Development Program of the Office of Safeguards and Security (OSS) in three subprogram areas (tasks): 1. Science and Technology Base Development Intelligent Actinide Analysis System Deterioration of Pu Isotopic Analysis with Neutron Damage to HPGe Detectors 2. Onsite Test and Evaluation and Facility Support Isotopic Analysis of Plutonium Samples Enriched in {sup 238}Pu Actinide Isotopic Analysis System for Los Alamos Plutonium-Handling Facility 3. International Safeguards MGA Workshop Transportable X-Ray Fluorescence Analysis System. The report describes the activities in Safeguards Technology and Systems studies, computer security and Advanced Laser Isotope Systems safeguards. 3 refs., 3 figs. (JF)

  5. Security, Extremism and Education: Safeguarding or Surveillance?

    ERIC Educational Resources Information Center

    Davies, Lynn

    2016-01-01

    This article analyses how education is positioned in the current concerns about security and extremism. This means firstly examining the different meanings of security (national, human and societal) and who provides security for whom. Initially, a central dilemma is acknowledged: that schooling appears to be simultaneously irrelevant to the huge…

  6. Computer Security Awareness Guide for Department of Energy Laboratories, Government Agencies, and others for use with Lawrence Livermore National Laboratory`s (LLNL): Computer security short subjects videos

    SciTech Connect

    Not Available

    1993-12-31

    Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education & Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1-3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices. Leaders may incorporate the Short Subjects into presentations. After talking about a subject area, one of the Short Subjects may be shown to highlight that subject matter. Another method for sharing them could be to show a Short Subject first and then lead a discussion about its topic. The cast of characters and a bit of information about their personalities in the LLNL Computer Security Short Subjects is included in this report.

  7. Toward sustainable management of national parks in Japan: securing local community and stakeholder participation.

    PubMed

    Hiwasaki, Lisa

    2005-06-01

    Japan's national park system constitutes a potentially viable mechanism for securing local community participation and building stakeholder consensus for sustainable park management, although the potential of this system is yet to be fully maximized. This article gives an overview of the system of protecting natural resources in Japan, focusing on the national park system. Parks are managed by zoning and regulation, which is unique in that land is not "set aside" for nature conservation, but designated as national park wherever the need to preserve "scenic beauty" has been recognized, regardless of land ownership or land use. Although resource conservation under this system has been problematic, it has advantages, especially in terms of community participation. This article demonstrates that in order to reach the system's potential, the park authority must act as coordinator of stakeholders and facilitator of bottom-up approaches to decision-making. In order to do this, steps that must be taken include the following: identifying the various stakeholders in park management and defining the "local community"; clarifying the roles and responsibilities of each stakeholder; and supporting consensus-building among stakeholders regarding the objectives and long-term vision of each park. By taking these steps, it would be possible to build a park management system that overrides government boundaries and involves local communities. This will enable the park authority to address the challenges facing Japan's complex system of conserving natural resources, and move towards sustainable management of natural resources in Japan.

  8. Ballistic missile proliferation a national security focus for the 21st century. Research report

    SciTech Connect

    Peterson, J.F.

    1994-04-21

    The global proliferation of ballistic missiles and weapons of mass destruction (WMD) has become one of the most immediate and dangerous threats to U.S. national security. Ballistic missiles were used in four of the last six major wars. Some 190 missiles were fired by Iraqis over a six week period at Iranian cities in 1988, during the 'War of the Cities'. Iraq's firing of Scuds against coalition forces and Israel during the Gulf War provided a vivid reminder of the threat these weapons can present to the world community. During the 1980's, many Third World countries assigned a high priority to the acquisition of ballistic missiles. By 1991, more than 20 of these nations either possessed ballistic missiles or were attempting to obtain them. Today 43 nations possess ballistic missiles. Seventeen of these probably have a nuclear weapon capability, with 20 of them possessing also a chemical or biological capability. This paper seeks to: define the military challenge ballistic missiles represent; review current U.S. counter-proliferation and nonproliferation initiatives and, finally make recommendations on other potential methods or considerations to reduce ballistic missile proliferation.

  9. Development of Secure and Sustainable Nuclear Infrastructure in Emerging Nuclear Nations Such as Vietnam

    SciTech Connect

    Shipwash, Jacqueline L; Kovacic, Donald N

    2008-01-01

    Infrastructure Preparedness and Vietnam Jacqueline L. Shipwash and Donald N. Kovacic (shipwashjl@ornl.gov, 865-241-9129, and kovacicdn@ornl.gov, 865-576-1459) Oak Ridge National Laboratory, Oak Ridge, Tennessee 37831 The global expansion of nuclear energy will require international cooperation to ensure that nuclear materials, facilities, and sensitive technologies are not diverted to non-peaceful uses. Developing countries will require assistance to ensure the effective regulation, management, and operation of their nuclear programs to achieve best practices in nuclear nonproliferation. A developing nation has many hurdles to pass before it can give assurances to the international community that it is capable of implementing a sustainable nuclear energy program. In August of this year, the U.S. Department of Energy and the Ministry of Science and Technology of the Socialist Republic of Vietnam signed an arrangement for Information Exchange and Cooperation on the Peaceful Uses of Nuclear Energy. This event signals an era of cooperation between the U.S. and Vietnam in the area of nuclear nonproliferation. This paper will address how DOE is supporting the development of secure and sustainable infrastructures in emerging nuclear nations such as Vietnam.

  10. Predicting the Impact of Climate Change on U.S. Power Grids and Its Wider Implications on National Security

    SciTech Connect

    Wong, Pak C.; Leung, Lai-Yung R.; Lu, Ning; Paget, Maria L.; Correia, James; Jiang, Wei; Mackey, Patrick S.; Taylor, Zachary T.; Xie, YuLong; Xu, Jianhua; Unwin, Stephen D.; Sanfilippo, Antonio P.

    2009-03-23

    We discuss our technosocial analytics research and devel-opment on predicting and assessing the impact of climate change on U.S. power-grids and the wider implications for national security. The ongoing efforts extend cutting-edge modeling theories derived from climate, energy, social sciences, and national security domains to form a unified system coupled with an interactive visual interface for technosocial analysis. The goal of the system is to create viable future scenarios that address both technical and social factors involved in the model domains. These scenarios enable policy makers to formulate a coherent, unified strategy towards building a safe and secure society. The paper gives an executive summary of our efforts in the past fiscal year and provides a glimpse of our work planned for the second year of the three-year project being conducted at the Pacific Northwest National Laboratory.

  11. AIDS activists secure approval for human growth hormone (Serostim).

    PubMed

    1996-01-01

    The Food and Drug Administration (FDA) has given a verbal commitment to accelerated approval for recombinant human growth hormone (Serostim) for AIDS-associated wasting syndrome. The drug, manufactured by Serono Laboratories, is the first of its kind that directly affects the metabolic dysfunction of AIDS-related wasting. The approval came on the heels of a meeting with AIDS activists, Serono Laboratories, and the FDA. Serono committed, at the meeting's conclusion, to submit finalized documents to the FDA within a week. ACT UP Golden Gate won a victory when the wholesale price cap of the drug was set at $36,000.00 annually, despite the company's original demand of $75,000.00 or more.

  12. The Human Environment. . .New Challenge for the United Nations.

    ERIC Educational Resources Information Center

    United Nations, New York, NY.

    A general overview of problems, current activities, and future action related to the human environment is delineated in this United Nations pamphlet. Reviewed first is the challenge facing the United Nations to promote common interest in protecting the earth's life-sustaining essentials. Following this, world scientific and technological strides…

  13. U. S. National Report on the Human Environment.

    ERIC Educational Resources Information Center

    Department of State, Washington, DC.

    This document constitutes the response of the United States to the request that members of the United Nations participating in the Conference on the Human Environment in Stockholm prepare national reports describing their environmental problems and discuss actions being taken to resolve them. In addition, members were asked to identify topics of…

  14. 78 FR 61803 - National Arts and Humanities Month, 2013

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-04

    ... Documents#0;#0; #0; #0;Title 3-- #0;The President ] Proclamation 9027 of September 30, 2013 National Arts... our history, America has advanced not only because of our people's will or our leaders' vision, but... American. During National Arts and Humanities Month, we celebrate the rich heritage of arts and...

  15. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  16. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    SciTech Connect

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  17. Annual Storm Water Report for the Y-12 National Security Complex Oak Ridge, Tennessee

    SciTech Connect

    Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  18. Dr. Inside and Dr. Outside: Physicists Involved With National Security and Foreign Policy

    NASA Astrophysics Data System (ADS)

    Zimmerman, Peter D.

    2009-05-01

    Physicists have had a special interest in American national security and arms control since at least the Manhattan Project. They have served our country in uniform and in the career civil service. Some have left academic careers for brief periods to work as political appointees, consultants, or resident scholars and then returned to an academic life, but often with changed goals. Some have tried government life and left nearly immediately, while others dipped a toe in and decided to stay. I will look at real-life examples, mostly using real names, drawn from my career and circle of colleagues to try to explain why some physicists have been extremely successful, why others have not, and what happens to a physicist who moved to Washington and decides to stay. I will also discuss routes into public service for those interesting in giving it a try.

  19. Analysis of physical training of security inspectors at Los Alamos National Laboratory: A preliminary report

    SciTech Connect

    Burkhalter, H.E.; Tietjen, G.L.; Sessions, J.C.; Hook, T.R.

    1989-11-01

    One-half and one-mile runs and 40-yard dash times were analyzed for security inspectors (SIs) at Los Alamos National Laboratory. The effectiveness of grip-strength conditioning was also determined. Both males and females met running sprint standards well within the limits established by the Department of Energy, and there were no adverse effects among any age decades or either gender. Reducing training from three to two days per week resulted in a statistically significant decrease in qualification performance. Increase in grip strength was noted in the left hand only when SIs trained two days per week for nine weeks. Further analysis should determine the appropriate training frequency for this population. These results suggest that no significant improvement is derived from aerobic training occurring less than three days per week. 7 refs., 19 figs.

  20. Annual Storm Water Report for the Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    Clean Water Compliance Section of the Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.