Sample records for nuclear attacks

  1. Rays as weapons.

    PubMed

    Vogel, H

    2007-08-01

    Ionizing radiation is being regarded as life threatening. Therefore, accidents in nuclear power plants are considered equal threatening as nuclear bomb explosions, and attacks with dirty bombs are thought as dangerous as nuclear weapon explosions. However, there are differences between a nuclear bomb explosion, the largest imaginable accident in a nuclear power plant, and an attack with a dirty bomb. It is intended to point them out. The processes are described, which damage in a nuclear bomb explosion, in the largest imaginable accident in a nuclear power plant, and in an attack with a dirty bomb. Their effects are compared with each other, i.e. explosion, heat, shock wave (blast), ionizing radiation, and fallout. In the center of the explosion of a nuclear bomb, the temperature rises to 100Mio degrees C, this induces damaging heat radiation and shock wave. In the largest imaginable accident in a nuclear power plant and in the conventional explosion of a dirty bomb, the temperature may rise up to 3000 degrees C, heat radiation and blast are limited to a short distance. In nuclear power plants, explosions due to oxyhydrogen gas or steam may occur. In nuclear explosions the dispersed radioactive material (fall out) consists mainly of isotopes with short half-life, in nuclear power plants and in dirty bomb attacks with longer half-life. The amount of fall out is comparable in nuclear bomb explosions with that in the largest imaginable accident in a nuclear power plant, it is smaller in attacks with dirty bombs. An explosion in a nuclear power plant even in the largest imaginable accident is not a nuclear explosion. In Hiroshima and Nagasaki, there were 200,000 victims nearly all by heat and blast, some 300 died by ionizing radiation. In Chernobyl, there have been less than 100 victims due to ionizing radiation up till now. A dirty bomb kills possibly with the explosion of conventional explosive, the dispersed radioactive material may damage individuals. The incorporation of irradiating substances may kill and be difficult to detect (Litvinenko). A new form of (government supported) terrorism/crime appears possible. The differences are important between a nuclear weapon explosion, the largest imaginable accident in a nuclear power plant, and an attack with a dirty bomb. Nuclear weapons kill by heat and blast; in the largest imaginable accident in a nuclear power plant, they are less strong and limited to the plant; an attack with a dirty bomb is as life threatening as an ("ordinary") bomb attack, dispersed radiating material may be a risk for individuals.

  2. Radiological threat assessment and the Federal Response Plan--a gap analysis.

    PubMed

    Conklin, W Craig; Liotta, Philip L

    2005-11-01

    The ability of the federal government to effectively and efficiently respond to nuclear or radiological terrorist attacks has been the subject of intense discussion and analysis for many years. Because of recent terrorist activities and intelligence information, there is strong sentiment that it is not a question of if, but when, a radiological or nuclear terrorist attack will occur. As a result, there is considerable concern that the federal government may not be adequately prepared to respond to an attack involving a radiological dispersal device or improvised nuclear device. In response to these concerns, federal departments and agencies have initiated actions to develop a better understanding of the magnitude of the radiological/nuclear terrorist threat, assess the ability of the federal government to support state and local responses to such attacks, and improve the Nation's ability to prepare for, respond to, and recover from these types of attacks. In an era of limited fiscal growth and competing priorities, the federal government will have to enhance its collaboration with state and local governments, the private sector, and academia to ensure that the Nation is capable of responding to a terrorist attack involving radioactive or nuclear material.

  3. Planning guidance for emergency response to a hypothetical nuclear attack on Riyadh, Saudi Arabia

    NASA Astrophysics Data System (ADS)

    Shubayr, Nasser Ali M.

    The threat of nuclear attack will remain imminent in an ever-advancing society. Saudi Arabia is not immune to this threat. This dissertation establishes planning guidance for response to a nuclear attack on Riyadh, the capital of Saudi Arabia, based on a hypothetical scenario of a nuclear detonation. A case scenario of a one-megaton thermonuclear bomb detonated at ground level over Riyadh is used to support the thesis. Previous nuclear tests and the Hiroshima and Nagasaki bombings have been used to present possible effects on Riyadh. US planning guidance and lessons learned from the Chernobyl and Fukushima nuclear plants accidents have been used to develop the emergency response guidance. The planning guidance outlines a rapid response to the nuclear detonation. Four damage zones have been identified; severe damage zone, moderate damage zone, light damage zone and dangerous fallout zone. Actions that are recommended, and those that should be avoided, have been determined for each zone. Shelter/ evacuation evaluation for blast-affected and fallout-affected areas is the basis for the recommendation that shelter in place is the best decision for the first hours to days after the attack. Guidelines for medical care response and population monitoring and decontamination are included to reduce the early and long-term effects of the attack. Recommendations to the Saudi Arabian authorities have been made to facilitate suitable preparedness and response for such an event.

  4. Nuclear War Survival Skills

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kearny, C.H.

    The purpose of this book is to provide Americans with information and instructions that will significantly increase their chances of surviving a possible nuclear attack. It brings together field-tested instructions that, if followed by a large fraction of Americans during a crisis that preceded an attack, could save millions of lives. The author is convinced that the vulnerability of our country to nuclear threat or attack must be reduced and that the wide dissemination of the information contained in this book would help achieve that objective of our overall defense strategy.

  5. The Limits of Cyberspace Deterrence

    DTIC Science & Technology

    2014-01-01

    networks are secure, this protection would also take the form of deterring, preventing, detect- ing, and defending against cyber attacks . As a result...tar- get into inaction. In a nuclear scenario, all nations are aware of the American ability to attribute a nuclear attack to its source, U.S...through degraded environment and improving ability to attribute and defeat attacks on systems and infrastructure. Military must provide broad range of

  6. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chu, Tsong L.

    The Stuxnet attack at the Natanz facility is an example of a targeted and successful cyber attack on a nuclear facility. Snowden's release of National Security Agency documents demonstrated the consequences of the insider threat. More recently, the United States tried to attack North Korea but failed, South Korea was attempting to attack North Korea, and both applied Stuxnet-like approaches. These sophisticated targeted attacks differ from web-site hacking events that are reported almost daily in the news mainly because targeted attacks require detailed design and operation information of the systems attacked and/or are often carried out by insiders. For instance,more » in order to minimize disruption of facilities around the world, Stuxnet remained idle until it recognized the specific configuration of the Natanz facility, demonstrating that the attackers possessed extremely detailed information about the facility. Such targeted cyber attacks could become a national-level military weapon and be used in coercion of hostile countries.« less

  7. Soviet short-range nuclear forces: flexible response or flexible aggression. Student essay

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, T.R.

    1987-03-23

    This essay takes a critical look at Soviet short-range nuclear forces in an effort to identify Soviet capabilities to fight a limited nuclear war with NATO. From an analysis of Soviet military art, weapon-system capabilities and tactics, the author concludes that the Soviets have developed a viable limited-nuclear-attack option. Unless NATO reacts to this option, the limited nuclear attack may become favored Soviet option and result in the rapid defeat of NATO.

  8. Survival of the relocated population of the U. S. after a nuclear attack. Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Haaland, C.M.; Chester, C.V.; Wigner, E.P.

    1976-06-01

    The feasibility of continued survival after a hypothetical nuclear attack is evaluated for people relocated from high-risk areas during the crisis period before the attack. The attack consists of 6559 MT, of which 5951 MT are ground bursts on military, industrial, and urban targets. Relocated people are assumed to be adequately protected from fallout radiation by shelters of various kinds. The major problems in the postattack situation will be the control of exposure to fallout radiation, and prevention of severe food shortages to several tens of millions of people.

  9. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What?

    ERIC Educational Resources Information Center

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  10. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abbott, Shannon

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, andmore » proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.« less

  11. Nuclear terrorism - Threat or not?

    NASA Astrophysics Data System (ADS)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  12. Protecting the United States Against Terrorist Nuclear Attacks: A System of Systems Approach

    DTIC Science & Technology

    2001-10-25

    for retribution that might be applied to nations may not be useful against other groups doesn’t mean that no useful measures can be found. Arrest and...more—have been applied in response to the 9/11/2001 attacks, and similar measures were taken in the wake of the Aum Shinrikyo attack, the World...and nuclear materials. More could be done bilaterally, including expanded cooperation on security measures, relevant economic development assistance4

  13. The Future of Air Power in the Aftermath of the Gulf War

    DTIC Science & Technology

    1992-07-01

    strategic-nuclear capabilities, for which the deterrence of direct nuclear attack against the United States itself was always a lesser-included case of a...conflicts, when there are only low-value, low-contrast targets in most cases . In regard to the 20 US MILITARY STRATEGY geographic setting, the attack...navigated over their intended targets to drop laser-guided glide bombs within three feet of the aim points, with the concurrent filming of the attack

  14. Options for Accelerating Economic Recovery after Nuclear Attack. Volume 3

    DTIC Science & Technology

    1979-07-01

    speed of data processing. It really ought to be possible to program computers with likely locations of needs, and then locations of ablebodied people...that a number of existing programs and institutions were imple- mented when public concerns over the risk of nuclear war were considerably higher...natural disasters are funded as programs if such programs would also be appropriate to the post-nuclear attack situation. This logic has a compelling

  15. Expedient Emergency Sanitation Measures

    DTIC Science & Technology

    1989-03-01

    maintaining or restoring adequate sanitation in a widespread emergency. In the event of a major earthquake or nuclear attack, sewage collection and...sanitation in a widespread emergency. In the event of a major earthquake or nuclear attack, sewage collection and treatment systems, electric power and...Handbook of Chlorination, Von Nostrand Reinhold, New York, 1972, and Appendix C. 12 chlorine disinfection. The cysts of the protozoa Entamoeba

  16. Fallout risk following a major nuclear attack on the United States.

    PubMed

    Harvey, T F; Shapiro, C S; Wittler, R F

    1992-01-01

    Fallout distributions are calculated for nuclear attacks on the contiguous United States. Four attack scenarios are treated, including counterforce and counterforce-countervalue attacks, for meteorological conditions associated with a typical day in summer and one in winter. The countervalue attacks contain mostly airbursts. To determine fallout effects, the population surviving the prompt effects is first calculated. For the prompt effects, a "conflagration-type" model is used. The counterforce attack produces about 8 million prompt deaths, and the counterforce-countervalue case projects 98 million prompt deaths. Partial relocation before attack to low-risk fallout areas at least 15 km from potential strategic targets would result in a decrease in projections of deaths by tens of millions. For fallout risk calculations, only the dose received in the first 48 h (the early or local fallout) is considered. Populations are assumed to be sheltered, with a shelter protection factor profile that varies for a large urban area, a small urban area, or a rural area. With these profiles, without relocation, the fallout fatalities for all four attack scenarios are calculated to be less than one million people. This can be compared to fallout fatalities of about 10 million for a hypothetical unsheltered "phantom" population.

  17. Radiological Effects of Nuclear War.

    ERIC Educational Resources Information Center

    Shapiro, Charles S.

    1988-01-01

    Described are the global effects of nuclear war. Discussed are radiation dosages, limited nuclear attacks, strategic arms reductions, and other results reported at the workshop on nuclear war issues in Moscow in March 1988. (CW)

  18. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's abilitymore » to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.« less

  19. Sustaining U.S. Nuclear Submarine Design Capabilities

    DTIC Science & Technology

    2007-01-01

    lost learning because there is an inherent novelty to each succeeding design effort, but on the other hand, higher 2 Note there is a unique “do...Nautilus 1 1954 Attack Seawolf 1 1957 Attack Skate 4 1958–1959 Attack Skipjack 6 1959–1961 Attack Triton 1 1959 Attack George Washington 5 1960–1962...development, electric motors and controls development, or equipment acoustic analysis (listed to the right of the pyramid). All of these skills have some

  20. In Time of Emergency. A Citizen's Handbook on Nuclear Attack and Natural Disasters.

    ERIC Educational Resources Information Center

    Office of Civil Defense (DOD), Washington, DC.

    A major emergency affecting a large number of people may occur anytime and any place. Natural disasters such as a flood, tornado, fire, hurricane, blizzard or earthquake, or an enemy nuclear attack on the United States may all constitute a major emergency. In any type of general disaster, lives can be saved if people are prepared for the emergency…

  1. Fallout risk following a major nuclear attack on the United States

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harvey, T.F.; Shapiro, C.S.; Wittler, R.F.

    Fallout distributions are calculated for nuclear attacks on the contiguous United States. Four attack scenarios are treated, including counterforce and counterforce-countervalue attacks, for meteorological conditions associated with a typical day in summer and one in winter. The countervalue attacks contain mostly airbursts. To determine fallout effects, the population surviving the prompt effects is first calculated. For the prompt effects, a 'conflagration-type' model is used. The counterforce attack produces about 8 million prompt deaths, and the counterforce-countervalue case projects 98 million prompt deaths. Partial relocation before attack to low-risk fallout areas at least 15 km from potential strategic targets would resultmore » in a decrease in projections of deaths by tens of millions. For fallout risk calculations, only the dose received in the first 48 h (the early or local fallout) is considered. Populations are assumed to be sheltered, with a shelter protection factor profile that varies for a large urban area, a small urban area, or a rural area. With these profiles, without relocation, the fallout fatalities for all four attack scenarios are calculated to be less than one million people. This can be compared to fallout fatalities of about 10 million for a hypothetical unsheltered 'phantom' population.« less

  2. Naval War College. Volume 60, Number 2, Spring 2007

    DTIC Science & Technology

    2007-01-01

    attacks of grave conse- quences. The aspiration of this small-wars force element is to prevent even one nuclear, biological , or chemical weapon attack...153 Preventive Attack and Weapons of Mass...Default screen Bioethics and Armed Conflict: Moral Dilemmas of Medicine and War, by Michael L. Gross reviewed by Arthur M. Smith, MD

  3. Fear of Terrorism in New York After the September 11 Terrorist Attacks: Implications for Emergency Mental Health and Preparedness

    PubMed Central

    Boscarino, Joseph A.; Figley, Charles R.; Adams, Richard E.

    2009-01-01

    To examine the public’s response to future terrorist attacks, we surveyed 1,001 New Yorkers in the community one year after the September 11 attacks. Overall, New Yorkers were very concerned about future terrorist attacks and also concerned about attacks involving biological or nuclear weapons. In addition, while most New Yorkers reported that if a biological or nuclear attack occurred they would evaluate available information before evacuating, a significant number reported they would immediately evacuate, regardless of police or public health communications to the contrary. The level of public concern was significantly higher on all measures among New York City and Long Island residents (downstate) compared to the rest of the state. A model predicting higher fear of terrorism indicated that downstate residents, women, those 45 to 64 years old, African Americans and Hispanics, those with less education/income, and those more likely to flee, were more fearful of future attacks. In addition, making disaster preparations and carefully evaluating emergency information also predicted a higher level of fear as well. A second model predicting who would flee suggested that those more likely to evaluate available information were less likely to immediately evacuate, while those with a higher fear of future attacks were more likely to flee the area. Given these findings and the possibility of future attacks, mental health professionals need to be more involved in preparedness efforts, especially related to the psychological impact of attacks involving weapons of mass destruction. PMID:14730761

  4. Fear of terrorism in New York after the September 11 terrorist attacks: implications for emergency mental health and preparedness.

    PubMed

    Boscarino, Joseph A; Figley, Charles R; Adams, Richard E

    2003-01-01

    To examine the public's response to future terrorist attacks, we surveyed 1,001 New Yorkers in the community one year after the September 11 attacks. Overall, New Yorkers were very concerned about future terrorist attacks and also concerned about attacks involving biological or nuclear weapons. In addition, while most New Yorkers reported that if a biological or nuclear attack occurred they would evaluate available information before evacuating, a significant number reported they would immediately evacuate, regardless of police or public health communications to the contrary. The level of public concern was significantly higher on all measures among New York City and Long Island residents (downstate) compared to the rest of the state. A model predicting higher fear of terrorism indicated that downstate residents, women, those 45 to 64 years old, African Americans and Hispanics, those with less education/income, and those more likely to flee, were more fearful of future attacks. In addition, making disaster preparations and carefully evaluating emergency information also predicted a higher level of fear as well. A second model predicting who would flee suggested that those more likely to evaluate available information were less likely to immediately evacuate, while those with a higher fear of future attacks were more likely to flee the area. Given these findings and the possibility of future attacks, mental health professionals need to be more involved in preparedness efforts, especially related to the psychological impact of attacks involving weapons of mass destruction.

  5. 10 CFR 50.13 - Attacks and destructive acts by enemies of the United States; and defense activities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Attacks and destructive acts by enemies of the United States; and defense activities. 50.13 Section 50.13 Energy NUCLEAR REGULATORY COMMISSION DOMESTIC... the effects of (a) attacks and destructive acts, including sabotage, directed against the facility by...

  6. 10 CFR 50.13 - Attacks and destructive acts by enemies of the United States; and defense activities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Attacks and destructive acts by enemies of the United States; and defense activities. 50.13 Section 50.13 Energy NUCLEAR REGULATORY COMMISSION DOMESTIC... the effects of (a) attacks and destructive acts, including sabotage, directed against the facility by...

  7. 10 CFR 50.13 - Attacks and destructive acts by enemies of the United States; and defense activities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Attacks and destructive acts by enemies of the United States; and defense activities. 50.13 Section 50.13 Energy NUCLEAR REGULATORY COMMISSION DOMESTIC... the effects of (a) attacks and destructive acts, including sabotage, directed against the facility by...

  8. 10 CFR 50.13 - Attacks and destructive acts by enemies of the United States; and defense activities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Attacks and destructive acts by enemies of the United States; and defense activities. 50.13 Section 50.13 Energy NUCLEAR REGULATORY COMMISSION DOMESTIC... the effects of (a) attacks and destructive acts, including sabotage, directed against the facility by...

  9. Technical approaches to reducing the threat of nuclear terrorism

    NASA Astrophysics Data System (ADS)

    Priedhorsky, William C.

    2005-04-01

    The threat of a nuclear attack on the United States by terrorists using a smuggled weapon is now considered more likely than an attack by a nuclear-armed ballistic missle. Consequently it is important to understand what can be done to detect and intercept a nuclear weapon being smuggled into the United States. A significant quantity of smuggled nuclear material has been intercepted already, but science and technology have so far contributed little to its interception. The critical special nuclear materials, plutonium and highly enriched uranium, are only weakly radioactive and detection of their radioactivity is limited both by atmospheric attenuation and by competition with natural backgrounds. Although many schemes for long-range detection of radioactivity have been proposed, none so far appears feasible. Detection of nuclear radiation can be improved using new technologies and sensing systems, but it will still be possible only at relatively small distances. Consequently the best approach to containing dangerous nuclear materials is at their sources; containment within lengthy borders and large areas is extremely difficult.

  10. Counter-Chemical, Biological, Radiological, and Nuclear Operations

    DTIC Science & Technology

    2007-01-26

    environment. (Page 10) Consequence management activities serve to reduce the effects of a CBRN attack or event, and assist in the restoration of...can be used quite effectively as attack agents. Toxic Industrial Chemicals (TICs), Toxic Industrial Materials (TIMs), and other potentially...CBRN pillars. Consequence Management Consequence management (CM) activities serve to reduce the effects of a CBRN attack or event, and assist in

  11. The New Era of Counterforce

    NASA Astrophysics Data System (ADS)

    Lieber, Keir

    Nuclear deterrence rests on the survivability of nuclear arsenals. For much of the nuclear age, counterforce disarming attacks those aimed at eliminating nuclear forces were nearly impossible because of the ability of potential victims to hide and protect their weapons. However, technological developments are eroding this foundation of nuclear deterrence. Advances rooted in the computer revolution have made nuclear forces around the world far more vulnerable than before. Specifically, two key approaches that countries have relied on to ensure arsenal survivability since the dawn of the nuclear age hardening and concealment have been undercut by leaps in weapons accuracy and a revolution in remote sensing. Various models, methods, and evidence demonstrate the emergence of new possibilities for counterforce disarming strikes. In short, the task of securing nuclear arsenals against attack is a far greater challenge than it was in the past. The new era of counterforce challenges the basis for confidence in contemporary deterrence stability, raises critical issues for national and international security policy, and sheds light on one of the enduring theoretical puzzles of the nuclear era: why international security competition has endured in the shadow of the nuclear revolution.

  12. Combined Radiation and Thermal Injury after Nuclear Attack

    DTIC Science & Technology

    1990-01-01

    0T’Fit f-copy Combined Radiation and Thermal Injury 04 After Nuclear Attack , (M) William K. Becker, Teresa M. Buescher, William G. Cioffi, William F...Chicago, 1979, pp. 5-61. 4. Reiss, E., Stirman, J. A., Artz, C . P., et al. Fluid and electrolyte balance in burns. JAMA 152:1309- 1313, 1953. 5...et al. Septicemia in burn injury. J Trauma 1:22-31,1961. 7. Moncrief , J. A., Lindberg, R. B., Switzer, W. E., et al. Use of topical antibacterial

  13. The medical implications of nuclear war

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Solomon, F.; Marston, R.Q.

    1986-01-01

    This volume is divided into five parts. The first provides an overview of the physical and environmental effects of nuclear war, setting the stage for later sections that address the medical impact of various types of nuclear attack. Part III reviews the demand for medical resources after a nuclear attack and estimates the actual supply likely to be available. If a single one-megaton bomb were exploded over the city of Detroit, for example, it is calculated that survivors would need about forty times the number of burn beds currently available throughout the entire United States. Contributors to Part IV addressmore » the nuclear arms race from a psychosocial point of view: How does the threat of nuclear war affect the attitudes and behavior of adults and children. Studies provide evidence that many young children are worried about the possibility of nuclear war; most learn about nuclear war from television or the media and rarely discuss it with their parents. Finally in this section is a call for improving the screening system used to select nuclear weapons handlers.« less

  14. The Radioactive Contamination of Food Following Nuclear Attack

    PubMed Central

    Massey, E. E.

    1967-01-01

    The relative radiation hazards from early and delayed fallout following a nuclear attack have been reviewed. It is indicated that the hazard to life from whole-body gamma irradiation from early fallout far outweighs the hazard from radioactive contamination of food. Nevertheless, because of the possible effects of iodine-131, the consumption by infants of fresh milk from animals which have ingested contaminated fodder should be avoided if possible during the first few weeks after attack. During the same period, water from covered supplies should be used in preference to that from open reservoirs. It is more important, however, to alleviate hunger and thirst in both man and animal than to prevent the temporary ingestion of food which may be contaminated by fallout. PMID:6071130

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lewis, G.N.; Postol, T.A.

    Long-range nuclear-armed cruise missiles are highly accurate and are capable of reaching most targets within the United States and the Commonwealth of Independent States (CIS) from launch points beyond their borders. Neither the United States nor the CIS has air surveillance systems capable of providing reliable warning against cruise missiles. Thus it is possible that a small-scale cruise missile attack could go entirely undetected until the nuclear weapons arrived over their targets. Such an attack could destroy the other country's entire strategic bomber force on the ground and severely damage its strategic command and control system, perhaps to the pointmore » of endangering the ability of its ICBM force to be launched on warning. This capability makes long-range nuclear cruise missiles potentially one of the most destabilizing of all nuclear weapons.« less

  16. Adult Public Education for Nuclear Terrorism: An Analysis of Cold War and War on Terror Preparedness Discourses

    ERIC Educational Resources Information Center

    Fisher, Debra A.

    2014-01-01

    The nuclear terrorist threat is far greater today than ever before, but the United States is unprepared to respond to the aftermath of a nuclear attack, whether perpetrated by rogue nuclear countries or the terrorist groups they support. Following the detonation of an improvised nuclear device (IND), citizens, not government personnel, become the…

  17. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chu, Tsong-Lun; Varuttamaseni, Athi; Baek, Joo-Seok

    This paper provides an approach for developing potential attacks on I and C systems of NPPs and assessing their consequences. An important concept is that the NPPs were not designed to cope with Stuxnet-type of attacks (and any other cyber attacks). That is, the plants were only designed for design basis accidents. The safety margins and redundancies built in the design are all based on design basis accidents. They may be helpful in mitigating cyberattacks, but may not be adequate.

  18. CPAD: Cyber-Physical Attack Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ferragut, Erik M; Laska, Jason A

    The CPAD technology relates to anomaly detection and more specifically to cyber physical attack detection. It infers underlying physical relationships between components by analyzing the sensor measurements of a system. It then uses these measurements to detect signs of a non-physically realizable state, which is indicative of an integrity attack on the system. CPAD can be used on any highly-instrumented cyber-physical system to detect integrity attacks and identify the component or components compromised. It has applications to power transmission and distribution, nuclear and industrial plants, and complex vehicles.

  19. Current nuclear threats and possible responses

    NASA Astrophysics Data System (ADS)

    Lamb, Frederick K.

    2005-04-01

    Over the last 50 years, the United States has spent more than 100 billion developing and building a variety of systems intended to defend its territory against intercontinental-range ballistic missiles. Most of these systems never became operational and ultimately all were judged ineffective. The United States is currently spending about 10 billion per year developing technologies and systems intended to defend against missiles that might be acquired in the future by North Korea or Iran. This presentation will discuss these efforts ad whether they are likely to be more effective than those of the past. It will also discuss the proper role of anti-ballistic programs at a time when the threat of a nuclear attack on the U.S. by terrorists armed with nuclear weapons is thought to be much higher than the threat of an attack by nuclear-armed ballistic missles.

  20. The Threats to Survival in a Nuclear Environment.

    DTIC Science & Technology

    1987-05-01

    second threat to survival in a nuclear attack is the blast or shock wave. Deen and Browning, in How to Survive a Nuclear Disaster , state, "It has been... Nuclear Disaster . Piscataway, NJ: A Grayson-Russell Book, New Century P’u-S1Tshers, 198t. 1S. Martin, Thomas 1., Jr. and Latham, Ronald C. Strategqy

  1. Predicting the remaining service life of concrete

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clifton, J.F.

    1991-11-01

    Nuclear power plants are providing, currently, about 17 percent of the U.S. electricity and many of these plants are approaching their licensed life of 40 years. The U.S. Nuclear Regulatory Commission and the Department of Energy`s Oak Ridge National Laboratory are carrying out a program to develop a methodology for assessing the remaining safe-life of the concrete components and structures in nuclear power plants. This program has the overall objective of identifying potential structural safety issues, as well as acceptance criteria, for use in evaluations of nuclear power plants for continued service. The National Institute of Standards and Technology (NIST)more » is contributing to this program by identifying and analyzing methods for predicting the remaining life of in-service concrete materials. This report examines the basis for predicting the remaining service lives of concrete materials of nuclear power facilities. Methods for predicting the service life of new and in-service concrete materials are analyzed. These methods include (1) estimates based on experience, (2) comparison of performance, (3) accelerated testing, (4) stochastic methods, and (5) mathematical modeling. New approaches for predicting the remaining service lives of concrete materials are proposed and recommendations for their further development given. Degradation processes are discussed based on considerations of their mechanisms, likelihood of occurrence, manifestations, and detection. They include corrosion, sulfate attack, alkali-aggregate reactions, frost attack, leaching, radiation, salt crystallization, and microbiological attack.« less

  2. Nuclear pulse. II - Ensuring delivery of the doomsday signal

    NASA Astrophysics Data System (ADS)

    Broad, W. J.

    1981-06-01

    The ability of the communications systems on which U.S. strategic forces depend to survive the electromagnetic pulse (EMP) effects of a nuclear blast in the upper atmosphere is examined. It is shown that the Bell system telephone network, Autovon, on which much military communication presently depends, is especially vulnerable to EMP; while satellite and microwave communications networks are expected to be more resistant to attack. Satellites are, though, vulnerable to killer-satellite attack. Much promise is seen in the conversion of ground communications links to fiber-optic form, which is inherently highly resistant to EMP. A nuclear bomb detonated 200 miles above Nebraska would affect communications equipment throughout the contiguous U.S. with peak fields of 500,000 volts/meter.

  3. 44 CFR Appendix 1 to Part 323 - List of Essential Survival Items

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS GUIDANCE ON PRIORITY USE OF RESOURCES IN IMMEDIATE POST ATTACK... event of a nuclear attack. Supply-requirements studies and assessments for these items will be made to... preattack to insure adequate supplies. The aforementioned supply-requirements studies will be undertaken to...

  4. 44 CFR Appendix 1 to Part 323 - List of Essential Survival Items

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS GUIDANCE ON PRIORITY USE OF RESOURCES IN IMMEDIATE POST ATTACK... event of a nuclear attack. Supply-requirements studies and assessments for these items will be made to... preattack to insure adequate supplies. The aforementioned supply-requirements studies will be undertaken to...

  5. Countering Putins Nuclear-Backed Aggression with a Continuous Nuclear-Capable Bomber Presence

    DTIC Science & Technology

    2016-05-13

    backed aggression can only be answered by a visible increase in nuclear capability in Europe. A nuclear-capable bomber force that permanently rotates ...permanently rotates through the EUCOM Area of Responsibility (AOR) would provide the United States with the ability to attack Putin’s strategy in three ways...One nuclear detonation in Europe would change the world. A BMD system cannot promise countries that it will negate every Russian nuclear missile

  6. Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.

    Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less

  7. Assessing the Risk of Inadvertent Nuclear War Between India and Pakistan

    DTIC Science & Technology

    2002-12-01

    stories/review.htm>. 5 avoided partly as a result of this. Hundreds of nuclear weapons tests were conducted, proving the technical capability of...sites in Cuba. The results of such an attack could have been disastrous, putting conventional systems in direct contact with nuclear systems, and... nuclear weapons and their delivery systems. Finally, India and Pakistan’s nuclear doctrines are compared. These comparisons yield important results

  8. Historical Office of the Office of the Secretary of Defense

    Science.gov Websites

    Contact DOD History Secretaries of Defense Pentagon History Renovations 9/11 Attack Images Pentagon Displays 9/11 Attack Publications Secretaries of Defense Historical Series Acquisition History Cold War Oral History Transcripts National Security Personnel System and British Nuclear History Oral History

  9. The Decisionmaking Context in the U.S. Department of the Navy. A Primer for Cost Analysts

    DTIC Science & Technology

    1994-01-01

    surface ships, a nuclear attack submarine, and maritime patrol aircraft. See Crawshaw (1993), 23 A notional BBG included three or more guided-missile...cruisers or destroyers, and one or more attack submarines to provide ASW support. 24See Crawshaw (1993). SAGs may also include attack submarines. 18...February 1992. Crawshaw , Robert 0., "What Is a Maritime Action Group?" Proceed- ings, U.S. Naval Institute, January 1993, pp. 28-31. Decisions and

  10. JPRS Report, Soviet Union, Aviation & Cosmonautics, No. 5, May 1988

    DTIC Science & Technology

    1988-10-28

    about the air combat over the beach on the Bay of Pigs and about the pilots who in 1961, during the aggression launched by hirelings of U.S...number of aircraft. Attack aircraft (the principal strike component) include nuclear-weapons carrying A-6E Intruder and A-7E Corsair attack aircraft...based air and the adoption of new, modern combat aircraft. In particular, lightweight A-7E Corsair attack planes and F-4S Phan- tom II fighters are

  11. Emergency Support Function 15 Standard Operating Procedures

    DTIC Science & Technology

    2013-08-01

    learned from numerous incidents to include the BP oil spill, the Fukushima nuclear incident, Hurricane Sandy and the Boston Marathon attack. Guidance is...Staffing  Operations  Activation  Incident Operations  Case Study - 2013 Boston Marathon Bombing  Case Study - 2011 Fukushima Nuclear Crisis...Quick Summary  Radiological Dispersal Device (RDD)  Improvised Nuclear Device (IND)  Federal Response  Case Studies – 2011 Fukushima Nuclear

  12. Nuclear security policy in the context of counter-terrorism in Cambodia

    NASA Astrophysics Data System (ADS)

    Khun, Vuthy; Wongsawaeng, Doonyapong

    2016-01-01

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.

  13. A Programmable Liquid Collimator for Both Coded Aperture Adaptive Imaging and Multiplexed Compton Scatter Tomography

    DTIC Science & Technology

    2012-03-01

    environments where a source is either weak or shielded. A vehicle of this type could survey large areas after a nuclear attack or a nuclear reactor accident...to prevent its detection by γ-rays. The best application for unmanned vehicles is the detection of radioactive material after a nuclear reactor ...accident or a nuclear weapon detonation [70]. Whether by a nuclear detonation or a nuclear reactor accident, highly radioactive substances could be dis

  14. Reservists prep first responders for Pope's visit > Air Force Reserve

    Science.gov Websites

    -area first responders on how to respond in the event of a nuclear or radiological terrorist attack Nuclear Incident Response course, July 7-8, at the Montgomery County Fire Academy, in advance of Pope mass. The course is offered through the Defense Nuclear Weapons School, Kirtland Air Force Base, New

  15. US public perspectives on security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.; Silva, Carol L.

    2012-02-01

    We report findings from a national Internet survey and a subset of questions administered by telephone in mid-2011 on public assessments of contemporary and emerging interstate nuclear threats, support for strategic arms control, and preferences for responding to limited nuclear attacks on the United States. Additionally, we analyze public views of the threat of terrorism, including cyber attacks, assessments of progress in the struggle against terrorism, and preferences for responding to an act of radiological terrorism against the United States. Also, we report findings from an Internet survey and a subset of questions administered by telephone among the American publicmore » in mid-2011 on US energy and environmental security. Key areas of investigation include public views on energy requirements, preferences for energy sources, energy conservation versus development, energy independence, implications of events at Fukushima, Japan, for US public support of nuclear generation, preferences for managing used nuclear fuel, and trust in nuclear risk assessments from government and other public sources. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.« less

  16. Appraisal of Scientific Resources for Emergency Management.

    DTIC Science & Technology

    1983-09-01

    water, communications, computers, and oil refineries or storage facilities. In addition, the growth of the number of operative nuclear power plants ...one from a nuclear power plant accident); one involved hazardous waste disposal problems; and finally two involved wartime scenarios, one focusing on...pro- tection research, radiological protection from nuclear power plant accidents, concepts and operation of public shelters, and post attack

  17. The climatic effects of nuclear war

    NASA Technical Reports Server (NTRS)

    Turco, R. P.; Toon, O. B.; Ackerman, T. P.; Pollack, J. B.; Sagan, C.

    1984-01-01

    The effects of various US-USSR nuclear-exchange scenarios on global climate are investigated by means of computer simulations, summarizing the results of Turco et al. (1983) and follow-up studies using 3D global-circulation models. A nuclear-scenario model is used to determine the amounts of dust, smoke, radioactivity, and pyrotoxins generated by a particular type of nuclear exchange (such as a general 5,000-Mt exchange, a 1,000-Mt limited exchange, a 5,000-Mt hard-target counterforce attack, and a 100-Mt attack on cities only): a particle-microphysics model predicts the evolution of the dust and smoke particles; and a radiative-convective climate model estimates the effects of the dust and smoke clouds on the global radiation budget. The findings are presented in graphs, diagrams, and a table. Thick clouds blocking most sunlight over the Northern Hemisphere midlatitudes for weeks or months and producing ground-temperature reductions of 20-40 C, disruption of global circulation patterns, and rapid spread of clouds to the Southern Hemisphere are among the 'nuclear-winter' effects predicted for the 5,000-Mt baseline case. The catastrophic consequences for plant, animal, and human populations are considered, and the revision of superpower nuclear strategies is urged.

  18. Fabricating niobium test loops for the SP-100 space reactor

    NASA Technical Reports Server (NTRS)

    Bryhan, Anthony J.; Chan, Ricky C.

    1993-01-01

    This article describes the successful fabrication, operation, and evaluation of a series of niobium-alloy (Nb-1 Zr and PWC-11) thermal convection loops designed to contain and circulate molten lithium at 1,350 K. These loops were used to establish the fabrication variables of significance for a nuclear power supply for space. Approximately 200 weldments were evaluated for their tendency to be attacked by lithium as a function of varying atmospheric contamination. No attack occurred for any weldment free of contamination, with or without heat treatment, and no welds accidentally deviated from purity. The threshold oxygen content for weldment attack was determined to be 170-200 ppm. Attack varied directly with weldment oxygen and nitrogen contents.

  19. A new methodology for estimating nuclear casualties as a function of time.

    PubMed

    Zirkle, Robert A; Walsh, Terri J; Disraelly, Deena S; Curling, Carl A

    2011-09-01

    The Human Response Injury Profile (HRIP) nuclear methodology provides an estimate of casualties occurring as a consequence of nuclear attacks against military targets for planning purposes. The approach develops user-defined, time-based casualty and fatality estimates based on progressions of underlying symptoms and their severity changes over time. This paper provides a description of the HRIP nuclear methodology and its development, including inputs, human response and the casualty estimation process.

  20. Nuclear security policy in the context of counter-terrorism in Cambodia

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Khun, Vuthy, E-mail: vuthy.khun@gmail.com; Wongsawaeng, Doonyapong

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the contextmore » of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.« less

  1. Low brain magnesium in migraine

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ramadan, N.M.; Halvorson, H.; Vande-Linde, A.

    1989-10-01

    Brain magnesium was measured in migraine patients and control subjects using in vivo 31-Phosphorus Nuclear Magnetic Resonance Spectroscopy. pMg and pH were calculated from the chemical shifts between Pi, PCr and ATP signals. Magnesium levels were low during a migraine attack without changes in pH. We hypothesize that low brain magnesium is an important factor in the mechanism of the migraine attack.

  2. The Potential for Normal Political Relations between the United States and Iran Following Presidential Elections in Each Country

    DTIC Science & Technology

    2009-05-01

    of the only two known nuclear attacks in the world, those being the attacks on Hiroshima and Nagasaki. The first weapon known as little boy was......Iran have to come to the table with the U.S.? 45 CONCLUSION Now the man who has risen to the top finds himself with new concerns

  3. Development and Application of a Model of Fallout Shelter Stay Times.

    DTIC Science & Technology

    1978-12-29

    post-attack environment is a disaster, and that human response to a nuclear disaster is an extropolation of human response to natural disasters...Soviet reaction to a nuclear disaster . This technique is not limited to fallout shelter studies. If an appropriate data base exists, subjects such as

  4. Bytes: Weapons of Mass Disruption

    DTIC Science & Technology

    2002-04-01

    advances compound the problems of protecting complex global infrastructures from attacks. How should the U.S. integrate the many disparate...deploy and sustain military forces.".16 According to the direst of information warfare theories , all computer systems are vulnerable to attack. The...Crisis Show of Force Punitive Strikes Armed Intervention Regional Conflict Regional War Global Conventional War Strategic Nuclear War IW & C2W area of

  5. Preparing for the 2009 Nuclear Posture Review: Post-Cold War Nuclear Deterrence and the 2001 NPR Debate

    DTIC Science & Technology

    2008-12-01

    of relying upon the minimalist idea of maintaining strategic deterrence only to prevent nuclear attack.[87] Joseph Pilat agrees and tries to make...Record Straight,” The Washington Quarterly 28, no. 3 (Summer 2005): 136. 87. Payne (2005), Op. Cit., 140. 88. Pilat , Op. Cit., 43. 89. Payne (2005...152. 91. Payne (2005), Op. Cit., 142. 92. Ibid., 146. 93. Joseph F. Pilat , “The New Triad,” in Wirtz and Larson, eds., Nuclear Transformation

  6. Assessing the Influence of the United States’ Nuclear Deterrent on the China-Japan Security Relationship

    DTIC Science & Technology

    2010-12-01

    Comprehensive Test Ban Treaty DF Deng Feng (“East Wind”) EASR East Asia Strategy Review GPALS Global Protection Against Limited Attacks ICBM......massive retaliation because it provided little recourse other than a global nuclear war. These fears were underscored during the Berlin Crisis of

  7. Extended Deterrence and Allied Assurance: Key Concepts and Current Challenges for U.S. Policy

    DTIC Science & Technology

    2013-09-01

    include adversary nuclear forces and stockpiles) in the pre- satellite era required a strategy using large numbers of bombers, large numbers of...radar and sensor capabilities related to TMD, activities Canberra considered important to “bolstering 59 the [U.S.-Australia] alliance.” 146 In...external attack; with potential adversaries developing anti- satellite 90 capabilities, and conducting cyber incursions and attacks against U.S. and

  8. Nuclear forensics: Soil content

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beebe, Merilyn Amy

    Nuclear Forensics is a growing field that is concerned with all stages of the process of creating and detonating a nuclear weapon. The main goal is to prevent nuclear attack by locating and securing nuclear material before it can be used in an aggressive manner. This stage of the process is mostly paperwork; laws, regulations, treaties, and declarations made by individual countries or by the UN Security Council. There is some preliminary leg work done in the form of field testing detection equipment and tracking down orphan materials; however, none of these have yielded any spectacular or useful results. Inmore » the event of a nuclear attack, the first step is to analyze the post detonation debris to aid in the identification of the responsible party. This aspect of the nuclear forensics process, while reactive in nature, is more scientific. A rock sample taken from the detonation site can be dissolved into liquid form and analyzed to determine its chemical composition. The chemical analysis of spent nuclear material can provide valuable information if properly processed and analyzed. In order to accurately evaluate the results, scientists require information on the natural occurring elements in the detonation zone. From this information, scientists can determine what percentage of the element originated in the bomb itself rather than the environment. To this end, element concentrations in soils from sixty-nine different cities are given, along with activity concentrations for uranium, thorium, potassium, and radium in various building materials. These data are used in the analysis program Python.« less

  9. Mixed-Initiative Human-Robot Interaction: Definition, Taxonomy, and Survey

    DTIC Science & Technology

    2015-01-01

    response situations (i.e., harmful for human lives) that range from natural disasters (e.g., Fukushima nuclear plant meltdown [1]) to terrorist attacks... Fukushima Daiichi Nuclear Power Plants using mobile rescue robots," Journal of Field Robotics, vol. 30, pp. 44-63, 2013. [2] A. Davids, "Urban search...operating environment can be uncertain, unstructured, and hostile. The damaged Fukushima nuclear plant‟s high radiation level not only posed danger to

  10. The problem of missile defence

    NASA Astrophysics Data System (ADS)

    Webber, Philip

    2014-05-01

    The idea of building a missile system to defend a nation from the horrors of nuclear attack first entered the public consciousness in the 1980s, when US president Ronald Reagan - backed by prominent (and controversial) scientific advisers such as the physicist Edward Teller - promoted the Strategic Defense Initiative as a supposedly impenetrable shield against the Soviet Union's nuclear arsenal.

  11. Conduct of Occupational Health During Major Disasters: A Comparison of Literature on Occupational Health Issues in the World Trade Center Terrorist Attack and the Fukushima Nuclear Power Plant Accident.

    PubMed

    Toyoda, Hiroyuki; Mori, Koji

    2017-01-01

    Workers who respond to large-scale disasters can be exposed to health hazards that do not exist in routine work. It is assumed that learning from past cases is effective for preparing for and responding to such problems, but published information is still insufficient. Accordingly, we conducted a literature review about the health issues and occupational health activities at the World Trade Center (WTC) terrorist attack and at the Fukushima Nuclear Power Plant accident to investigate how occupational health activities during disasters should be conducted. Seven studies about the WTC attack were extracted and categorized into the following topics: "in relation to emergency systems including occupational health management"; "in relation to improvement and prevention of health effects and occupational hygiene"; and "in relation to care systems aimed at mitigating health effects." Studies about the Fukushima Nuclear Power Plant accident have been used in a previous review. We conclude that, to prevent health effects in workers who respond to large-scale disasters, it is necessary to incorporate occupational health regulations into the national response plan, and to develop practical support functions that enable support to continue for an extended period, training systems for workers with opportunities to report accidents, and care systems to mitigate the health effects.

  12. Facility Targeting, Protection and Mission Decision Making Using the VISAC Code

    NASA Technical Reports Server (NTRS)

    Morris, Robert H.; Sulfredge, C. David

    2011-01-01

    The Visual Interactive Site Analysis Code (VISAC) has been used by DTRA and several other agencies to aid in targeting facilities and to predict the associated collateral effects for the go, no go mission decision making process. VISAC integrates the three concepts of target geometric modeling, damage assessment capabilities, and an event/fault tree methodology for evaluating accident/incident consequences. It can analyze a variety of accidents/incidents at nuclear or industrial facilities, ranging from simple component sabotage to an attack with military or terrorist weapons. For nuclear facilities, VISAC predicts the facility damage, estimated downtime, amount and timing of any radionuclides released. Used in conjunction with DTRA's HPAC code, VISAC also can analyze transport and dispersion of the radionuclides, levels of contamination of the surrounding area, and the population at risk. VISAC has also been used by the NRC to aid in the development of protective measures for nuclear facilities that may be subjected to attacks by car/truck bombs.

  13. An Important Issue: Non-Proliferation of Nuclear Weapons

    NASA Astrophysics Data System (ADS)

    Castellano, Doc

    2001-03-01

    Historic Facts and Philosophy: In August, 1947, I participated in a secret meeting concerning the validity and use of a hydrogen bomb. I vigorously supported a ``Super Manhattan Project" to build an ``H" bomb. My philosophy at the time was `bigger and better,' to ensure that no nation attacked the U.S. Our retaliation with ``H" bombs vs. ``A" bombs would be too overwhelming for any nation to risk attacking us should they obtain their own ``A" bombs. Thus, all nations would be forced to use diplomacy. I am older and wiser, and am now convinced that World Test Ban Treaties, non-proliferation of nuclear weapons, and space free of any military weapons is the best policy for all nations and humanity. With current nuclear testing at nearby Yucca Flats, Nevada, Vandenberg AF/Missile site, Cal Tech, etc., I therefore propose that our new APS California Division form a three-person committee to tabulate all pertinent data and submit it to a qualified expert for review and further action. Comments and suggestions are invited.

  14. Construction of a Cyber Attack Model for Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Varuttamaseni, Athi; Bari, Robert A.; Youngblood, Robert

    The consideration of how one compromised digital equipment can impact neighboring equipment is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional PRA. This means potential sequences of events that may occur during an attack may be missedmore » if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to a class of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analysis of large systems.« less

  15. Health implications of radiological terrorism: Perspectives from Israel

    PubMed Central

    Hagby, Moti; Goldberg, Avishay; Becker, Steven; Schwartz, Dagan; Bar-Dayan, Yaron

    2009-01-01

    September 11th events taught us, members of the medical community, that we need to prepared for the worst. Nuclear terror is no longer science fiction. Radiological weapons of mass terror come in three flavors: The first one is nuclear. Since 1992, there have been six known cases of highly enriched uranium or plutonium being intercepted by authorities as it passed in or out of the former Soviet Union. Constructing a nuclear fission weapon requires high-level expertise, substantial facilities, and lots of money. All three of which would be difficult, although not impossible, for a terrorist group to pull off without state support. However, terrorists could carry out potential mass destruction without sophisticated weaponry by targeting nuclear facilities using conventional bombs or hijacked aircrafts. Terror attacks could also carry out mass panic and radioactive contamination of people and environment by dispersal of radioactive materials with or without the use of conventional explosive devices. Most medical and para-medical personnel are not familiar with CBRN terror and radiation casualties. To lessen the impact of those potential attacks and provide care for the greatest number of potential survivors, the community as a whole – and the medical community in particular – must acquire the knowledge of the various signs and symptoms of exposure to irradiation and radioactive contamination as well as have a planned response once such an attack has occurred. Based on knowledge of radiation hazards, medical emergency planers should analyze the risks of each scenario, offer feasible solutions and translate them into internationally accepted plans that would be simple to carry out once such an attack took place. The planned response should be questioned and tested by drills. Those drills should check the triage, evacuation routes, decontamination posts, evacuation centers and receiving hospitals. It is crucial that the drill will consist of simulated casualties that will follow the evacuation route from point zero to the ED. Knowledge and exercise will reduce terror (fear) from radiation and help the community as a whole better cope with such an event. This article will review the general information of radiation types, their biological damage, clinical appearance and general concepts of nuclear event planning, focusing on medical response and focus on the Israeli perspective. PMID:19561972

  16. Prediction of fire spread following nuclear explosions

    Treesearch

    Craig C. Chandler; Theodore G. Storey; Charles D. Tangren

    1963-01-01

    Mass fires are likely to follow a nuclear attack. Since it is important to the civil defense program to be able to predict rate, duration, and extent of spread of such fires, the Office of Civil Defense, U.S. Department of Defense, issued a joint contract to the Forest Service and to United Research Services, Inc., to study this field. We surveyed the literature,...

  17. WHAT PEOPLE CAN DO ABOUT RURAL CIVIL DEFENSE, NOTES FOR SPEAKERS AND WRITERS.

    ERIC Educational Resources Information Center

    Department of Agriculture, Washington, DC.

    CIVIL DEFENSE PREPAREDNESS IS A FACTOR RURAL PEOPLE NEED TO CONSIDER IN ALL THEIR FARM, HOME, AND BUSINESS PLANNING. NUCLEAR WEAPONS AND THE POSSIBILITY OF NUCLEAR ATTACK ARE FACTS THAT AMERICANS CANNOT IGNORE. THIS DOCUMENT PRESENTS THE BASIC ELEMENTS OF A CIVIL DEFENSE PROGRAM FOR PEOPLE IN RURAL AREAS WHICH INCLUDE--(1) THE DANGERS OF FALLOUT,…

  18. Airman Scholar Journal. Volume 15, Fall 2010

    DTIC Science & Technology

    2010-01-01

    more. The titles emergent from his hand ranged from Astronomy to On Freedom From Pain. He directed one of the wonders of the ancient world, a...Military Education Adapt?.................................................................... 49 Col Thomas A. Drohan “ Ancient Alexandria...the process of removing radioactive materials from the site. What the nuclear attacks on Hiroshima and Nagasaki taught us is that nuclear clean-up

  19. Two Nations Underground: Building Schools to Survive Nuclear War and Desegregation in the 1960s

    ERIC Educational Resources Information Center

    Preston, John

    2017-01-01

    In the 1960s federal agencies in the US encouraged the building of protected schools designed to survive a nuclear attack. A number of designs, including underground schools, were constructed. In order to promote the building of protected schools, the US government produced a number of propaganda films for school boards and governors. In addition…

  20. Energy Expenditure and Metabolic Heat Production Storage Estimates of Tactical Law Enforcement Personnel during Chemical, Biological, Radiological, and Nuclear (CBRN) Training

    DTIC Science & Technology

    2011-09-01

    the chemical attack of the Tokyo subway system in 1995, increased attention to preparedness for CBRN disasters has been emphasized (12, 17...1996. 17. Okumura, T., Suzuki, K., Fukuda, A., Kohama, A., Takasu, N., Ishimatsu, S., and Hinchara, S. The Tokyo subway Sarin attack: disaster... sandwiched within tough DuPont™ Nomex® outer and inner layers.  Streamlined design and light weight deliver optimum comfort and natural freedom of

  1. Commentary from Westminster. Medical effects of nuclear war.

    PubMed

    Deitch, R

    1983-03-12

    A British Medical Association report on the medical consequences of nuclear war, scheduled for commercial publication in April 1983, could damage the Government's arguments for maintaining a nuclear deterrent. The gist of the BMA's findings is that Britain could not possibly cope with the aftermath of nuclear attack. Although Prime Minister Thatcher has made no comment, both the Home Office and the Department of Health and Social Security have criticized the report's negative conclusions. The BMA is expected to take up the issue at its annual meeting, and the Labour party has called for a Parliamentary debate on the report and its implications.

  2. Corrosion-induced microstructural developments in 316 stainless steel during exposure to molten Li2BeF4(FLiBe) salt

    NASA Astrophysics Data System (ADS)

    Zheng, Guiqiu; He, Lingfeng; Carpenter, David; Sridharan, Kumar

    2016-12-01

    The microstructural developments in the near-surface regions of AISI 316 stainless steel during exposure to molten Li2BeF4 (FLiBe) salt have been investigated with the goal of using this material for the construction of the fluoride salt-cooled high-temperature reactor (FHR), a leading nuclear reactor concept for the next generation nuclear plants (NGNP). Tests were conducted in molten FLiBe salt (melting point: 459 °C) at 700 °C in graphite crucibles and 316 stainless steel crucibles for exposure duration of up to 3000 h. Corrosion-induced microstructural changes in the near-surface regions of the samples were characterized using scanning electron microscopy (SEM) in conjunction with energy dispersive x-ray spectroscopy (EDS) and electron backscatter diffraction (EBSD), and scanning transmission electron microscopy (STEM) with EDS capabilities. Intergranular corrosion attack in the near-surface regions was observed with associated Cr depletion along the grain boundaries. High-angle grain boundaries (15-180°) were particularly prone to intergranular attack and Cr depletion. The depth of attack extended to the depths of 22 μm after 3000-h exposure for the samples tested in graphite crucible, while similar exposure in 316 stainless steel crucible led to the attack depths of only about 11 μm. Testing in graphite crucibles led to the formation of nanometer-scale Mo2C, Cr7C3 and Al4C3 particle phases in the near-surface regions of the material. The copious depletion of Cr in the near-surface regions induced a γ-martensite to α-ferrite phase (FeNix) transformation. Based on the microstructural analysis, a thermal diffusion controlled corrosion model was developed and experimentally validated for predicting long-term corrosion attack depth.

  3. Terrorism Risk Modeling for Intelligence Analysis and Infrastructure Protection

    DTIC Science & Technology

    2007-01-01

    comparatively high risk of CBRN attacks. Estimates of sabotage risk are highly dependent on proximity of nuclear power plants , chemical plants , or oil...and casinos, airports, nuclear power plants 3 Military, train and subway stations, stadiums, bridges and tunnels 4 Industrial facilities, oil and...airspace zones 8 Power plants , dams, railway networks levels. Collecting and incorporating such data for specific localities or industry sectors would

  4. Strategic Studies Quarterly. Volume 5, Number 4, Winter 2011

    DTIC Science & Technology

    2011-12-01

    attack, and its destructive capacity intrinsically poses existential threats to nation- states (not to mention their populations). This is not true...nuclear technology. Unlike nuclear, cyber does not pose an existential threat. As Martin Libicki points out, destruction or disconnection of cyber...the Cuban missile crisis, existential deterrence worked, and a few Soviet bombs created deterrence despite an over- whelming American superiority in

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hoffman, B.

    This report examines recent trends and future prospects of terrorism in the United States and assesses their implications for the possibility of a terrorist group attempting an act of nuclear terrorism involving either the theft of a weapons system or strategic nuclear material or an attack on a weapons facility. An emerging trend of ideologically motivated terrorism by groups espousing white supremacist and anti-federalist beliefs or opposing specific issues such as abortion has largely supplanted the ethnic centered violence that dominated earlier domestic terrorist activity. The threat to U.S. nuclear weapons facilities from unknown terrorist groups in this country cannotmore » be considered high at this time. There is no evidence to suggest that any of the organizations reviewed in this study have seriously contemplated a nuclear-related act, nor is there any indication that any group is poised to undertake such an attack in the future. Nevertheless, trends in the terrorist activities of certain groups must be considered in the context of possible operations directed against nuclear weapons sites. Members of these groups are considerably more skilled with weapons than are other terrorist in this country, they possess large stockpiles of sophisticated weapons, they are well trained guerrilla warfare and survival techniques, and they possess an apocalyptic vision of the future-factors that make them the most likely domestic terrorists to attempt an act of nuclear terrorism. In sum, while the volume of annual terrorist incidents in the United States is relatively small, the emerging trends merit intensive and continuing attention.« less

  6. Impacts of Vehicle (In)Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chugg, J.; Rohde, K.

    Nuclear and radioactive material is routinely transported worldwide every day. Since 2010, the complexity of the transport vehicle to support such activities has grown exponentially. Many core functions of a vehicle are now handled by small embedded computer modules with more being added each year to enhance the owner’s experience and convenience. With a system as complex as today’s automobile, the potential for cyber security issues is certain. Hackers have begun exploring this new domain with public information increasingly disseminated. Because vehicles are allowed into and around secure nuclear facilities, the potential for using a vehicle as a new cybermore » entry point or vector into the facility is now plausible and must be mitigated. In addition, compromising such a vehicle could aide in illicit removal of nuclear material, putting sensitive cargo at risk. Because cyber attacks can now be introduced using vehicles, cyber security, needs to be integrated into an organization’s design basis threat document. Essentially, a vehicle now extends the perimeter for which security professionals are responsible.Electronic Control Units (ECU) responsible for handling all core and ancillary vehicle functions are interconnected using the controller area network (CAN) bus. A typical CAN network in a modern automobile contains 50 or more ECUs. The CAN protocol now supports a wide variety of areas, including automotive, road transportation, rail transportation, industrial automation, power generation, maritime, military vehicles, aviation, and medical devices. In many ways, the nuclear industry is employing the CAN bus protocol or other similar broadcast serial networks. This paper will provide an overview of the current state of automobile and CAN Bus security, as well as an overview of what has been publicly disclosed by many research organizations. It will then present several hypotheses of how vehicle security issues may impact nuclear activities. An initial discussion of how a vehicle can be used as a new threat vector to penetrate secure facilities will be presented. This includes how a modern automobile can be used as the exploitation mechanism for nearby devices such as laptops, cell phones, and wireless access points. Additional discussion will highlight how vehicle security might impact transportation of nuclear material through remote exploitation of a moving vehicle. The final discussion will include what possible implications might be relative to the physical protection systems at nuclear facilities. The audience will also be given details regarding the complexity of attack, thus implying the likelihood of successful exploitation, and information on how such attacks may be mitigated. Emerging security products for automobiles will be discussed and other mitigation methods will be detailed (e.g. disabling vehicle cellular modems). As a result, the audience will have a greater understanding of how to add vehicle security as a part of a comprehensive nuclear security policy.Finally, this paper will highlight the similarities between CAN Bus and other broadcast serial bus networks such as Profibus or DeviceNet, helping educate the reader on how susceptible this type of networking is to nefarious attacks and how it might affect components connected to many different nuclear systems, including control systems, safety systems, emergency systems, and support systems.« less

  7. Analytic barrage attack model. Final report, January 1986-January 1989

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    St Ledger, J.W.; Naegeli, R.E.; Dowden, N.A.

    An analytic model is developed for a nuclear barrage attack, assuming weapons with no aiming error and a cookie-cutter damage function. The model is then extended with approximations for the effects of aiming error and distance damage sigma. The final result is a fast running model which calculates probability of damage for a barrage attack. The probability of damage is accurate to within seven percent or better, for weapon reliabilities of 50 to 100 percent, distance damage sigmas of 0.5 or less, and zero to very large circular error probabilities. FORTRAN 77 coding is included in the report for themore » analytic model and for a numerical model used to check the analytic results.« less

  8. Efforts of Uzbekistan to prevent nuclear terrorism and smuggling of radioactive and nuclear materials.

    PubMed

    Petrenko, V D; Karimov, Yu N; Podkovirin, A I; Shipilov, N N; Yuldashev, B S; Fazylov, M I

    2005-01-01

    Uzbekistan is located on the cross-roads from the north--Russia, Western Europe--to the south--Afghanistan, Iran, Iraq and others. The appearance of terrorist organizations urged some Asian countries to make the nuclear weapons, the making the task of stopping the transportation of nuclear materials and technologies from the north (from countries possessing nuclear weapon) to the south (to countries desiring to have weapons and its components) a reality. To resolve this problem, on the main transportation routes, "Yantar" stationary radiation monitors of Russian production were installed, and development and production of monitors of our own make was started. This paper covers these works as well as those on preventing possible terrorist attacks on nuclear objects of Uzbekistan.

  9. Superpower nuclear minimalism in the post-Cold War era

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Graben, E.K.

    1992-07-01

    With the end of the Cold War and the breakup of the Soviet Union, the strategic environment has fundamentally changed, so it would seem logical to reexamine strategy as well. There are two main schools of nuclear strategic thought: a maximalist school, which emphasizes counterforce superiority and nuclear war-fighting capability, and a MAD-plus school, which emphasizes survivability of an assured destruction capability along with the ability to deliver small, limited nuclear attacks in the event that conflict occurs. The MAD-plus strategy is the more logical of the two strategies, because the maximalist strategy is based on an attempt to conventionalizemore » nuclear weapons which is unrealistic.« less

  10. Superpower nuclear minimalism in the post-Cold War era?. Revised

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Graben, E.K.

    1992-07-01

    With the end of the Cold War and the breakup of the Soviet Union, the strategic environment has fundamentally changed, so it would seem logical to reexamine strategy as well. There are two main schools of nuclear strategic thought: a maximalist school, which emphasizes counterforce superiority and nuclear war-fighting capability, and a MAD-plus school, which emphasizes survivability of an assured destruction capability along with the ability to deliver small, limited nuclear attacks in the event that conflict occurs. The MAD-plus strategy is the more logical of the two strategies, because the maximalist strategy is based on an attempt to conventionalizemore » nuclear weapons which is unrealistic.« less

  11. A Physicist Looks at the Terrorist Threat

    NASA Astrophysics Data System (ADS)

    Muller, Richard

    2009-05-01

    Many people fear a terrorist nuclear device, smuggled into the United States, as the one weapon that could surpass the destruction and impact of 9-11. I'll review the design of nuclear weapons, with emphasis on the kinds that can be developed by rogue nations, terrorist groups, and high-school students. Saddam, prior to the first gulf war, was developing a uranium bomb, similar to the one that destroyed Hiroshima. His calutrons (named after my university) were destroyed by the United Nations. The North Korean nuclear weapon was, like the U.S. bomb used on Nagasaki, based on plutonium. Its test released the energy equivalent of about 400 tons of TNT. Although some people have speculated that they were attempting to build a small bomb, it is far more likely that this weapon was a fizzle, with less than 1 percent of the plutonium exploded. In contrast, the energy released from burning jet fuel at the 9-11 World Trade Center attack was the equivalent of 900 tons of TNT for each plane -- over twice that of the North Korean Nuke. The damage came from the fact that gasoline delivers 10 kilocalories per gram, about 15 times the energy of an equal weight of TNT. It is this huge energy per gram that also accounts for our addiction to gasoline; per gram, high performance lithium-ion computer batteries carry only 1 percent as much energy. A dirty bomb (radiological weapon) is also unattractive to terrorists because of the threhold effect: doses less than 100 rem produce no radiation illness and will leave no dead bodies at the scene. That may be why al Qaeda instructed Jose Padilla to abandon his plans for a dirty bomb attack in Chicago, and to try a fossil fuel attack (natural gas) instead. I will argue that the biggest terrorist threat is the conventional low-tech one, such as an airplane attack on a crowded stadium using the explosive fuel that they can legally buy at the corner station.

  12. Extended Deterrence, Nuclear Proliferation, and START III

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Speed, R.D.

    2000-06-20

    Early in the Cold War, the United States adopted a policy of ''extended nuclear deterrence'' to protect its allies by threatening a nuclear strike against any state that attacks these allies. This threat can (in principle) be used to try to deter an enemy attack using conventional weapons or one using nuclear, chemical, or biological weapons. The credibility of a nuclear threat has long been subject to debate and is dependent on many complex geopolitical factors, not the least of which is the military capabilities of the opposing sides. The ending of the Cold War has led to a significantmore » decrease in the number of strategic nuclear weapons deployed by the United States and Russia. START II, which was recently ratified by the Russian Duma, will (if implemented) reduce the number deployed strategic nuclear weapons on each side to 3500, compared to a level of over 11,000 at the end of the Cold War in 1991. The tentative limit established by Presidents Clinton and Yeltsin for START III would reduce the strategic force level to 2000-2500. However, the Russians (along with a number of arms control advocates) now argue that the level should be reduced even further--to 1500 warheads or less. The conventional view is that ''deep cuts'' in nuclear weapons are necessary to discourage nuclear proliferation. Thus, as part of the bargain to get the non-nuclear states to agree to the renewal of the Nuclear Non-Proliferation Treaty, the United States pledged to work towards greater reductions in strategic forces. Without movement in the direction of deep cuts, it is thought by many analysts that some countries may decide to build their own nuclear weapons. Indeed, this was part of the rationale India used to justify its own nuclear weapons program. However, there is also some concern that deep cuts (to 1500 or lower) in the U.S. strategic nuclear arsenal could have the opposite effect. The fear is that such cuts might undermine extended deterrence and cause a crisis in confidence among U.S. allies to such an extent that they could seek nuclear weapons of their own to protect themselves.« less

  13. Has Democracy Destabilized East Asia

    DTIC Science & Technology

    2016-06-01

    handled the Fukushima triple disaster any better, Krauss makes an important point about the DPJ Prime Minister Hatoyama’s stance on the Marine Corps...attack, involved a domestic emergency. The nuclear disaster and tsunami were significant events that weighed on people’s minds, but it was the multitude...in the minds of Japanese voters, the administration’s reaction to the nuclear disaster and tsunami could be put under a broad “crisis management

  14. GRIZZLY Model of Multi-Reactive Species Diffusion, Moisture/Heat Transfer and Alkali-Silica Reaction for Simulating Concrete Aging and Degradation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Huang, Hai; Spencer, Benjamin W.; Cai, Guowei

    Concrete is widely used in the construction of nuclear facilities because of its structural strength and its ability to shield radiation. The use of concrete in nuclear power plants for containment and shielding of radiation and radioactive materials has made its performance crucial for the safe operation of the facility. As such, when life extension is considered for nuclear power plants, it is critical to have accurate and reliable predictive tools to address concerns related to various aging processes of concrete structures and the capacity of structures subjected to age-related degradation. The goal of this report is to document themore » progress of the development and implementation of a fully coupled thermo-hydro-mechanical-chemical model in GRIZZLY code with the ultimate goal to reliably simulate and predict long-term performance and response of aged NPP concrete structures subjected to a number of aging mechanisms including external chemical attacks and volume-changing chemical reactions within concrete structures induced by alkali-silica reactions and long-term exposure to irradiation. Based on a number of survey reports of concrete aging mechanisms relevant to nuclear power plants and recommendations from researchers in concrete community, we’ve implemented three modules during FY15 in GRIZZLY code, (1) multi-species reactive diffusion model within cement materials; (2) coupled moisture and heat transfer model in concrete; and (3) anisotropic, stress-dependent, alkali-silica reaction induced swelling model. The multi-species reactive diffusion model was implemented with the objective to model aging of concrete structures subjected to aggressive external chemical attacks (e.g., chloride attack, sulfate attack, etc.). It considers multiple processes relevant to external chemical attacks such as diffusion of ions in aqueous phase within pore spaces, equilibrium chemical speciation reactions and kinetic mineral dissolution/precipitation. The moisture/heat transfer module was implemented to simulate long-term spatial and temporal evolutions of the moisture and temperature fields within concrete structures at both room and elevated temperatures. The ASR swelling model implemented in GRIZZLY code can simulate anisotropic expansions of ASR gel under either uniaxial, biaxial and triaxial stress states, and can be run simultaneously with the moisture/heat transfer model and coupled with various elastic/inelastic solid mechanics models that were implemented in GRIZZLY code previously. This report provides detailed descriptions of the governing equations, constitutive equations and numerical algorithms of the three modules implemented in GRIZZLY during FY15, simulation results of example problems and model validation results by comparing simulations with available experimental data reported in the literature. The close match between the experiments and simulations clearly demonstrate the potential of GRIZZLY code for reliable evaluation and prediction of long-term performance and response of aged concrete structures in nuclear power plants.« less

  15. 75 FR 9622 - Southern Nuclear Operating Company, Inc.; Vogtle Electric Generating Plant, Units 1 and 2; Exemption

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-03

    ... requirements similar to those previously imposed by Commission orders issued after the terrorist attacks of... Security Plan, Training and Qualification Plan, Safeguards Contingency Plan, and Cyber Security Plan...

  16. SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harris, S.; Dunn, D.

    2010-09-07

    Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risksmore » of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.« less

  17. Detecting Cyber Attacks On Nuclear Power Plants

    NASA Astrophysics Data System (ADS)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  18. Nuclear event zero-time calculation and uncertainty evaluation.

    PubMed

    Pan, Pujing; Ungar, R Kurt

    2012-04-01

    It is important to know the initial time, or zero-time, of a nuclear event such as a nuclear weapon's test, a nuclear power plant accident or a nuclear terrorist attack (e.g. with an improvised nuclear device, IND). Together with relevant meteorological information, the calculated zero-time is used to help locate the origin of a nuclear event. The zero-time of a nuclear event can be derived from measured activity ratios of two nuclides. The calculated zero-time of a nuclear event would not be complete without an appropriately evaluated uncertainty term. In this paper, analytical equations for zero-time and the associated uncertainty calculations are derived using a measured activity ratio of two nuclides. Application of the derived equations is illustrated in a realistic example using data from the last Chinese thermonuclear test in 1980. Crown Copyright © 2011. Published by Elsevier Ltd. All rights reserved.

  19. Development of a Dynamic Model to Evaluate the Effect of Natural Resource Policies on Recovery Following Nuclear Attack. Volume 1. Description and Simulations

    DTIC Science & Technology

    1981-09-01

    and constrain the output of major energy- consuming sectors. Government stockpiles are most effectively used in a " pump -priming" role. They have to...11 - stockpile for " pump priming" are fuels and basic metals such as iron, steel, copper, and aluminum. The esoteric metals are of secondary...are released, the more impact they have in aiding recovery. Particularly if resource imports are interrupted, post-attack " pump priming" is the best

  20. Emergency care centers--an efficient method for mitigation of consequences after a dirty bomb attack.

    PubMed

    Miska, Horst

    2012-08-01

    For emergency preparedness and response with respect to nuclear power plant accidents, the concept of Emergency Care Centers has been developed in Germany. This setup aims at monitoring contamination, to decontaminate if needed, assess the dose, and perform an initial medical evaluation of people who might have been affected by the accident. The concept has been tested in many exercises. In response to a terrorist attack involving a dirty bomb, this concept may prove useful for attending contaminated people who are not severely injured.

  1. Nuclear Attack on U.S. Space-Based Assets: Current Strategy, Policy, Reality, and Implications for the Future.

    DTIC Science & Technology

    1998-06-05

    other.46 This can be useful when certain links 70 have been negated through the destruction of a ground station or actual jamming or interference...system is to attack the enemy’s ground station.59 The link segment can be jammed or spoofed60. However, the DoD has nothing in its inventory currently...currently conducted primarily by jamming assets that prevent the enemy use of his systems. These systems are classified and can only be discussed in

  2. Nonlinear analysis of NPP safety against the aircraft attack

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Králik, Juraj, E-mail: juraj.kralik@stuba.sk; Králik, Juraj, E-mail: kralik@fa.stuba.sk

    The paper presents the nonlinear probabilistic analysis of the reinforced concrete buildings of nuclear power plant under the aircraft attack. The dynamic load is defined in time on base of the airplane impact simulations considering the real stiffness, masses, direction and velocity of the flight. The dynamic response is calculated in the system ANSYS using the transient nonlinear analysis solution method. The damage of the concrete wall is evaluated in accordance with the standard NDRC considering the spalling, scabbing and perforation effects. The simple and detailed calculations of the wall damage are compared.

  3. Countermeasures to the US National Missile Defense

    NASA Astrophysics Data System (ADS)

    Gronlund, Lisbeth

    2001-04-01

    One of the key technical questions about national missile defenses is whether they can be expected to work under real-world conditions if the attacker takes steps to defeat the defense. This talk will discuss steps that an emerging missile state could take to confuse, overwhelm, or otherwise defeat the planned US NMD system developed by the Clinton administration. It will consider three such ``countermeasures" that would be within the technical capability of a state that could develop and deploy a long-range missile capable of reaching the United States, which is the threat the NMD system is intended to defend against. The talk will be based on the April 2000 report ``Countermeasures: A Technical Evaluation of the Operational Effectiveness of the Planned US National Missile Defense System," which was co-authored by the speaker and 10 other physicists and engineers. Although the talk will refer to the ground-based NMD system under development, the conclusions are applicable to any mid-course NMD system using hit-to-kill infrared-homing interceptors, regardless of their basing mode. The three countermeasures considered are: (1) biological weapons deployed on 100 or more small bomblets, or submunitions, that would be released shortly after the boost phase; (2) nuclear warheads with anti-simulation balloon decoys, in which the attacker disguises the warhead by enclosing it in an aluminum-coated mylar balloon and releasing it along with a large number of otherwise similar but empty balloons; and (3) nuclear warheads with cooled shrouds, in which the attacker foils the kill vehicle's homing process by covering each nuclear warhead with a double-walled cone containing liquid nitrogen.

  4. Nuclear power: Siting and safety

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Openshaw, S.

    1986-01-01

    By 2030, half, or even two-thirds, of all electricity may be generated by nuclear power. Major reactor accidents are still expected to be rare occurrences, but nuclear safety is largely a matter of faith. Terrorist attacks, sabotage, and human error could cause a significant accident. Reactor siting can offer an additional, design-independent margin of safety. Remote geographical sites for new plants would minimize health risks, protect the industry from negative changes in public opinion concerning nuclear energy, and improve long-term public acceptance of nuclear power. U.K. siting practices usually do not consider the contribution to safety that could be obtainedmore » from remote sites. This book discusses the present trends of siting policies of nuclear power and their design-independent margin of safety.« less

  5. The continuing risk of nuclear war.

    PubMed

    McCoy, Ronald

    2007-01-01

    Climate change and nuclear war are currently the most dangerous challenges to human civilisation and survival. The effects of climate change are now sufficient to persuade many governments to take effective measures to reduce greenhouse gas emissions. Today there are about 27,000 nuclear warheads, many at least ten times more powerful than the Hiroshima and Nagasaki bombs, and a meaningful medical response to a nuclear attack is impossible. Nevertheless, the threat of nuclear war does not raise public concern, and indeed the nuclear-weapon states are upgrading their capability. The only effective preventive measure is the abolition of nuclear weapons. Steps towards this include: a Fissile Material Cut-off Treaty, for the nuclear weapon states to observe their obligations under the Nuclear Non-Proliferation Treaty, and for the Comprehensive Test Ban Treaty to enter into force. The ultimate need is for a Nuclear Weapons Convention; International Physicians for the Prevention of Nuclear War have launched an International Campaign to Abolish Nuclear weapons (ICAN) to promote a NWC.

  6. Homeland defense: looking back, moving forward

    NASA Astrophysics Data System (ADS)

    Quine, Dennis H.

    2002-07-01

    A concern for homeland defense has been with us since the inception of the Republic. However, it has changed in focus and emphasis depending on the nature of the threat we perceived. In the earliest decades the threat was from invasion by a Britain that still did not accept the results of the Revolutionary War. Later the focus shifted to concern about possible attack by ships, and during WW I and WW II, by submarines. With the advent of the intercontinental nuclear-armed bomber in 1950, our focus changed again. When we could be attacked by ballistic missiles after 1960, our concern focused on that threat. Now that we have seen that damaging attacks can be brought to the homeland 'under the radar screen', by terrorist operations, the focus has shifted again. We are now entering an era when we must address potential homeland attacks with weapons of mass destruction (WMD) that may be delivered by a range of means, depending on the source of the attack. In response to this full spectrum of attack modes, the U.S. has implemented a three-stage defense policy that integrates overseas 'offense' and homeland 'defense'. This framework for defense analysis and planning is likely to be with us into the indefinite future.

  7. 32 CFR 185.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Government, including workforce, food and water, health resources, industrial production, housing and... of a nuclear attack. CARDA integrates the combined resources of all government agencies and Military... President in declaring that extant circumstances and risks justify his implementation of the legal powers...

  8. Are We Doing Enough to Prevent a Nuclear Terrorist Attack?

    DTIC Science & Technology

    2013-03-01

    grams of Cesium-137 which they suspected was smuggled to Turkey from Russia through Georgia.18 Of more interest are the reported cases of smuggling...required to assemble a nuclear weapon.19 However, this does not necessarily tell the entire story . For instance, according to a Czech police 11...investigation of a 1994 seizure in Prague of 2.7 kilograms of Russian -origin highly enriched uranium (HEU),20 smugglers claimed they could deliver

  9. CTC Sentinel. Volume 3, Issue 9, September 2010

    DTIC Science & Technology

    2010-09-01

    tember 20, 2008 . 58 “Mustafa Abu Al-Yazid in Posthumous Audio Mes- sage Urges Attacks in U.S.; Says Al-Qaeda in Kashmir that al-Qa`ida in Kashmir...killed six people in Ramadi, Anbar Province. – BBC, August 8 August 9, 2010 (INDONESIA): Abu Bakar Bashir, one of Indonesia’s leading radical...technology and acquire nuclear materials. Sensing the inadequacy of his own knowledge about nuclear weapons, Abu 3 Ibid. 4 Personal interview

  10. Liquid metal cooled nuclear reactor plant system

    DOEpatents

    Hunsbedt, Anstein; Boardman, Charles E.

    1993-01-01

    A liquid metal cooled nuclear reactor having a passive cooling system for removing residual heat resulting for fuel decay during reactor shutdown, or heat produced during a mishap. The reactor system is enhanced with sealing means for excluding external air from contact with the liquid metal coolant leaking from the reactor vessel during an accident. The invention also includes a silo structure which resists attack by leaking liquid metal coolant, and an added unique cooling means.

  11. Mediating the social and psychological impacts of terrorist attacks: the role of risk perception and risk communication.

    PubMed

    Rogers, M Brooke; Amlôt, Richard; Rubin, G James; Wessely, Simon; Krieger, Kristian

    2007-06-01

    The public's understanding of chemical, biological, radiological and nuclear (CBRN) related issues and their likely actions following a CBRN incident is an issue of great concern, as public psychological and behavioural responses will help determine subsequent morbidity and mortality rates. This paper explores the role of effective government communication with the public and its role in mediating the social and psychological impact of terrorist attacks. We examine the importance of effective communication in reducing morbidity and mortality in the event of a terrorist attack and explore the impact of risk perceptions in determining the success or failure of risk communication strategies. This includes the examination of the role of fear as a health risk, and the identification of factors relevant to public trust in risk communication. Finally, an investigation of the type of information desired by members of the public leads the authors to make risk communication recommendations targeted at the promotion of more adaptive behaviours in response to CBRN attacks.

  12. Who Did It? Using International Forensics to Detect and Deter Nuclear Terrorism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dunlop, W H; Smith, H P

    On February 2, the ''New York Times'' reported that the Pentagon has formed a nuclear forensics team tasked with identifying the terrorist attackers should the United States be hit with a nuclear bomb. Adapting nuclear technology to the forensics of exploded nuclear weapons is an old but rapidly evolving field. It dates back to at least 1949, when analysis of airborne debris, retrieved at high altitude off the coast of China, convinced President Harry Truman that the Soviet Union had exploded a nuclear device on the steppes of central Asia. The technology is neither new nor has it been particularlymore » secret, but the formation of a national nuclear forensics team was newsworthy and a useful development. An international team, however, would be even better. Although Washington has naturally focused on preventing a nuclear terrorism attack in the United States, a U.S. city is not necessarily the most likely target for nuclear terrorists. It is doubtful that a terrorist organization would be able to acquire a U.S. nuclear device and even more doubtful that it would acquire one on U.S. soil. Accordingly, if a terrorist organization does get its hands on a fission device, it is likely that it will do so on foreign territory. At that point, the terrorists will have an enormously valuable political weapon in their hands and will be loath to risk losing that asset. Given the risks associated with getting the device into the United States, the rational choice would be to deploy the device abroad against much softer targets. For Islamist terrorists, a major ''Christian'' capital such as London, Rome, or Moscow might offer a more suitable target. Among these, Moscow perhaps presents the most compelling case for international cooperation on post-detonation nuclear forensics. Russia has the largest stockpile of poorly secured nuclear devices in the world. It also has porous borders and poor internal security, and it continues to be a potential source of contraband nuclear material and weapons, despite the best efforts of the Cooperative Threat Reduction (CTR) program. If terrorists obtained the nuclear material in Russia and set Moscow as their target, they would not have to risk transporting the weapon, stolen or makeshift, across international borders. Attacks by Chechen terrorists in Beslan and the Dubrovka Theater in Moscow offer ample proof that a willingness to commit mass murder for fanatical reasons rests within Russian borders, and a foreign source of operatives, particularly from the neighboring Islamic states to the south, is by no means inconceivable. Moscow is also a predominantly Christian city where local authorities routinely discriminate against Muslim minorities. Furthermore, extremists might conclude that a nuclear blast in Moscow could inflict damage well beyond those directly stemming from the attack. The Soviet generation that came to power during the Cold War retained a memory of the United States as an ally in the Great Patriotic War. The present Russian generation has no such remembrance but seems to have retained the animosities and suspicions that were a part of the nuclear standoff. Hence, nuclear terrorists may well believe that they could cause another East-West cold war or even encourage Russia to retaliate against the United States. After all, the sinking of the Kursk was believed by some influential Russians to be the result of American action. How much more likely would be such a view if the Kremlin were destroyed? As long as the world is filled with suspicion and conflict, such reactions are to be expected and, more importantly, anticipated. One has only to remember the early reactions and suspicions in the United States following the 1996 TWA Flight 800 airline disaster. Because the United States is the technological leader in nuclear forensics, its capability will certainly be offered and probably demanded no matter what foreign city is subjected to the devastation of a nuclear explosion. The entire world, not just Americans, will live in fear of a second or third nuclear explosion, and forensics could play a vital role in removing or at least narrowing that fear. Because of such worldwide dread, there will be an international aspect to nuclear forensics regardless of where the explosion takes place. It would be better to be prepared in advance for such contingencies than to delve into the arcane world of nuclear weapons and radiochemistry on the fly.« less

  13. The Evolution of United States and NATO Tactical Nuclear Doctrine and Limited Nuclear War Options, 1949-1964

    DTIC Science & Technology

    1983-12-01

    Ronald Reagan, the Soviets de- ployed more than 100 SS-20 nuclear missiles against Western Europe and added approximately 70...Strategic Deterrence in the 1980’s. Stanford: I - Hoover Institution Press, 1979. "’ 9*’ 244 ..99 " . , " ’ ’ ’ " < - ,’ , ’- .’-"C’"’’ Steel, Ronald ...100-102. A - Wagstaff , Jack J. "The Army’s Preparation for Atomic War- fare." Military Review (May 1955): 3-6. Walker, R.M. "The Night Attack

  14. France: Thrust and parry over nuclear risks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Balter, M.

    1997-01-31

    Claims about the health risks posed by nuclear-power installations are always controversial, but nowhere more so than in France, where some 75% of the nation`s electricity is generated from nuclear energy. So, it was no surprise that publication of a study by two French epidemiologists earlier this month claiming to show a link between cases of childhood leukemia and the nuclear-waste reprocessing plant at La Hague on the Normandy coast sparked fireworks in the French press. Several French epidemiologists sharply criticized the study`s methodology and conclusions. Their attacks have now drawn an unusual response from the British Medical Journal (BMJ),more » in which the paper appeared.« less

  15. Israel’s Attack on Osiraq: A Model for Future Preventive Strikes?

    DTIC Science & Technology

    2005-07-01

    Chauvet . Shamir told Chauvet , “Israel holds France exclusively responsible for the results liable to arise from operation of the reactor and misuse...of the nuclear fuel.” Chauvet argued, “Acquisition of nuclear arms would be lunacy on the part of Iraq. After all, Israel’s Jewish and Arab...McKinnon, the tapes from aircraft number seven and eight reveal the reactor dome completely caved in and a destroyed cooling pool.57 However

  16. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination ofmore » food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.« less

  17. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    NASA Astrophysics Data System (ADS)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  18. 75 FR 35508 - Draft Regulatory Guide: Issuance, Availability

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-22

    ... Systems and Networks,'' requires licensees to develop cyber-security plans and programs to protect critical digital assets, including digital safety systems, from malicious cyber attacks. Regulatory Guide 5.71, ``Cyber Security Programs for Nuclear Facilities,'' provides guidance to meet the requirements of...

  19. Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wheeler, Timothy A.; Denman, Matthew R.; Williams, R. A.

    Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities.more » iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.« less

  20. Detecting nuclear materials smuggling: performance evaluation of container inspection policies.

    PubMed

    Gaukler, Gary M; Li, Chenhua; Ding, Yu; Chirayath, Sunil S

    2012-03-01

    In recent years, the United States, along with many other countries, has significantly increased its detection and defense mechanisms against terrorist attacks. A potential attack with a nuclear weapon, using nuclear materials smuggled into the country, has been identified as a particularly grave threat. The system for detecting illicit nuclear materials that is currently in place at U.S. ports of entry relies heavily on passive radiation detectors and a risk-scoring approach using the automated targeting system (ATS). In this article we analyze this existing inspection system and demonstrate its performance for several smuggling scenarios. We provide evidence that the current inspection system is inherently incapable of reliably detecting sophisticated smuggling attempts that use small quantities of well-shielded nuclear material. To counter the weaknesses of the current ATS-based inspection system, we propose two new inspection systems: the hardness control system (HCS) and the hybrid inspection system (HYB). The HCS uses radiography information to classify incoming containers based on their cargo content into "hard" or "soft" containers, which then go through different inspection treatment. The HYB combines the radiography information with the intelligence information from the ATS. We compare and contrast the relative performance of these two new inspection systems with the existing ATS-based system. Our studies indicate that the HCS and HYB policies outperform the ATS-based policy for a wide range of realistic smuggling scenarios. We also examine the impact of changes in adversary behavior on the new inspection systems and find that they effectively preclude strategic gaming behavior of the adversary. © 2011 Society for Risk Analysis.

  1. Emergency response guidance for the first 48 hours after the outdoor detonation of an explosive radiological dispersal device.

    PubMed

    Musolino, Stephen V; Harper, Frederick T

    2006-04-01

    Strategies and decisions to protect emergency responders, the public, and critical infrastructure against the effects of a radiological dispersal device detonated outdoors must be made in the planning stage, not in the early period just after an attack. This contrasts with planning for small-scale types of radiological or nuclear emergencies, or for a large-scale nuclear-power-type accident that evolves over many hours or days before radioactivity is released to the environment, such that its effects can be prospectively modeled and analyzed. By the time it is known an attack has occurred, most likely there will have been casualties, all the radioactive material will have been released, plume growth will be progressing, and there will be no time left for evaluating possible countermeasures. This paper offers guidance to planners, first responders, and senior decision makers to assist them in developing strategies for protective actions and operational procedures for the first 48 hours after an explosive radiological dispersal device has been detonated.

  2. A methodology to quantify the release of spent nuclear fuel from dry casks during security-related scenarios

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Durbin, Samuel G.; Luna, Robert Earl

    Assessing the risk to the public and the environment from a release of radioactive material produced by accidental or purposeful forces/environments is an important aspect of the regulatory process in many facets of the nuclear industry. In particular, the transport and storage of radioactive materials is of particular concern to the public, especially with regard to potential sabotage acts that might be undertaken by terror groups to cause injuries, panic, and/or economic consequences to a nation. For many such postulated attacks, no breach in the robust cask or storage module containment is expected to occur. However, there exists evidence thatmore » some hypothetical attack modes can penetrate and cause a release of radioactive material. This report is intended as an unclassified overview of the methodology for release estimation as well as a guide to useful resource data from unclassified sources and relevant analysis methods for the estimation process.« less

  3. Nuclear Magnetic Resonance-Based Metabolic Comparative Analysis of Two Apple Varieties with Different Resistances to Apple Scab Attacks.

    PubMed

    Sciubba, Fabio; Di Cocco, Maria Enrica; Gianferri, Raffaella; Capuani, Giorgio; De Salvador, Flavio Roberto; Fontanari, Marco; Gorietti, Daniela; Delfini, Maurizio

    2015-09-23

    Apple scab, caused by the fungus Venturia inaequalis, is the most serious disease of the apple worldwide. Two cultivars (Malus domestica), having different degrees of resistance against fungi attacks, were analyzed by (1)H and (13)C nuclear magnetic resonance (NMR) spectroscopy. Aqueous and organic extracts of both apple flesh and skin were studied, and over 30 metabolites, classified as organic acids, amino acids, carbohydrates, phenolic compounds, lipids, sterols, and other metabolites, were quantified by means of one-dimensional (1D) and two-dimensional (2D) NMR experiments. The metabolic profiles of the two apple cultivars were compared, and the differences were correlated with the different degrees of resistance to apple scab by means of univariate analysis. Levels of metabolites with known antifungal activity were observed not only to be higher in the Almagold cultivar but also to show different correlation patterns in comparison to Golden Delicious, implying a difference in the metabolic network involved in their biosynthesis.

  4. RAND Review: Volume 29, Number 2, Summer 2005

    DTIC Science & Technology

    2005-01-01

    is problematic because al Qaeda "Protecting businesses against tinued reliance on martyrdom; and " franchises " its attacks to local the economic impact...enriching uranium. We’ve got a lot ofnatural answered, "you would fee! safer if you had nuclear uranium. It’s legal. We want to enrich Uranium.’ And weapons...is then safer . If Iran adds nuclear weapons to its civil war within Islam rather than a global war on ter- arsenal, they already have Israel to worry

  5. [Initial medical management in radiological accidents and nuclear disaster].

    PubMed

    Tanigawa, Koichi

    2012-03-01

    Major radiological emergencies include criticality in nuclear power plants or terrorist attacks using dirty bombs or nuclear device detonation. Because irradiation itself does not cause any immediate death of the victims, and there is a minimum risk of secondary irradiation to medical personnel during decontamination procedures, lifesaving treatments should be prioritized. When a major radiological accident occurs, information is scarce and/or becomes intricate. We might face with significant difficulties in determining the exact culprits of the event, i.e., radiological or chemical or others. Therefore, it is strongly recommended for the national and local governments, related organizations and hospitals to develop comprehensive systems to cope with all hazards(chemical, biological, radiation, nuclear, and explosion) under the common incident command system.

  6. 78 FR 70540 - Meeting of the National Commission on the Structure of the Air Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-26

    ... information. Agenda: The updated agenda items were: --The role of airpower in the post-Afghanistan national... Superiority, Air Mobility, Global Precision Attack, Nuclear Deterrence Operations, Command and Control... such as modernization readiness, procurement, manpower, research development test and evaluation...

  7. Taiwan: America’s Next War?

    DTIC Science & Technology

    1998-04-08

    7. 29 Megatrends China, Beijing: Hauling Publishing House, May 1996, as cited in Richard Bernstein and Ross H. Munro, The Coming Conflict with...other economic interests in Asia  To prevent, deter and reduce the threat of nuclear, biological , and chemical (NBC) attacks on the U.S. and its

  8. Anti-nuclear liberals and the bomb: A comparative history of Kampf dem Atomtod and the Committee for a Sane Nuclear Policy, 1957-1963

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thiede, B.

    The premises of Kampf dem Atomtod (KdA) and Citizens for a Sane Nuclear Policy (SANE) were based on nineteenth century traditions of liberal peace advocacy. Both groups gained substantial public support for their goals to prevent the nuclear armament of the Bundeswehr and to stop nuclear testing. Both organizations won well-educated middle-class and mostly white supporter. The dissertation examines the role of women: whether housewife or doctor, women stressed their special concerns as mothers. Both KdA and SANE had troubled relations with the labor movement. Their leaders hoped to gain government leaders' respect by winning a respectable, non-Communist constituency andmore » claiming their goals were reasonable ones. Government officials attacked KdA and SANE as dupes of Moscow. Many supporters left the organizations because of their strict anti-Communism. Local groups accused their leaders of lacking initative. KdA and SANE's leaders wasted time and energy rehashing issues and postponing decisions. After a period of providing initiatives and ideas local committees disintegrated. Both organizations considered education their paramount goal but their arguments primarily reached the converted, who often preferred more political action. KdA and SANE's leaders instead chose to support respectable projects based on humanitarian ideals. Since these projects offered little in the way of concrete action agendas, supporters defected to more active organizations or slipped into apathy. Neither organization achieved its national goals. Both governments generally denied them access to the policymaking process, ignored them as irrelavant, or attacked them as Communist sympathizers. While SANE and KdA were heard by those concerned by nuclear policy, and while members of SANE's National Board did help muster support for the Partial Test Ban Treaty, both organizations failed to make liberal peace values productive in the nuclear decisionmaking process.« less

  9. Science & Technology Review January/February 2010

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bearinger, J P

    2009-11-30

    This month's issue has the following articles: (1) Innovative Materials Rise to the Radiation Challenge - Commentary by Bruce Warner; (2) The Hunt for Better Radiation Detection - New materials will help radiation detectors pick up weak signals and accurately identify illicit radioactive sources; (3) Time-Critical Technology Identifies Deadly Bloodborne Pathogens - A portable device can simultaneously distinguish up to five bloodborne pathogens in just minutes; (4) Defending Computer Networks against Attack - A Laboratory effort takes a new approach to detecting increasingly sophisticated cyber attacks; and (5) Imaging Cargo's Inner Secrets - Livermore-University of California collaborators are modeling amore » new radiographic technique for identifying nuclear materials concealed inside cargo containers.« less

  10. 76 FR 47197 - Authorization of Emergency Use of Oral Formulations of Doxycycline; Availability

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-04

    ...). The Authorization contains, among other things, conditions on the emergency use of the authorized... Homeland Security (DHS) that there is a significant potential for a domestic emergency involving a heightened risk of attack with a specified biological, chemical, radiological, or nuclear agent or agents--in...

  11. Radiological Laboratory Sample Analysis Guide for Incidents of National Significance – Radionuclides in Air

    EPA Science Inventory

    [The document describes the likely analytical decision paths that would be made by personnel at a radioanalytical laboratory following a radiological or nuclear incident, such as that caused by a terrorist attack. EPA’s responsibilities, as outlined in the National Response Frame...

  12. 76 FR 34773 - Final Safety Culture Policy Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... Special Joint Session on Safety Culture at the Health Physics Society Annual Meeting, and presentations on... safety-first focus in nuclear work environments for public health and safety. The Commission's emphasis... operations, if attacked, could have an impact on public health and safety. During the early years of...

  13. Background of Civil Defense and Current Damage Limiting Studies.

    ERIC Educational Resources Information Center

    Romm, Joseph

    A brief history of civil defense administration precedes analysis of nuclear attack conditions and the influence of protective measures. Damage limitation procedure is explained in terms of--(1) blast effects, (2) radiation doses, (3) geographical fallout distribution patterns, and (4) national shelter needs. Major concept emphasis relates to--(1)…

  14. Low Energy Nuclear Reactions: A Millennium Status Report

    NASA Astrophysics Data System (ADS)

    Mallove, Eugene F.

    2000-03-01

    This talk will summarize some of the more convincing recent experiments that show that helium-4, nuclear scale excess energy, tritium, low-level neutron production, and the transmutation of heavy elements can occur near room temperature in relatively simple systems. Despite inappropriate theory-based arguments against it and unethical attacks by people unfamiliar with the supporting experiments, the new field of solid state nuclear reactions is progressing. The physical theory behind the associated phenomena continues to be debated among theorists. The facts of the history of this scientific controversy suggest that it is inadvisable to rush to judgment against allegedly ``impossible" new phenomena when increasingly careful experiments have revealed new vistas in physics. Detailed discussion of evidence for solid state nuclear reactions is available elsewhere (http://www.infinite-energy.com). abstract document

  15. Ethical dilemmas of nuclear deterrence

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Russett, B.M.

    An analysis of the May 1983 Pastoral Letter on War and Peace of the US Catholic Bishops examines their ethical arguments, which were critical of accepted policy while failing to change the underlying principles of acceptable deterrence and a just war. The author concludes that there is no easy solution to the problem of nuclear deterrence because there is no way to bridge the extremes of war-winning counterforce and possession without use. The Bishops' central problem was deterrence of attack on US allies or neutrals, but he finds merit in their positions that deterrence need not rely on nuclear threatsmore » and that new ways of thinking are needed for the long run. 20 references. (DCK)« less

  16. Strategic command, control, communications, and intelligence.

    PubMed

    Zraket, C A

    1984-06-22

    Command, control, communications, and intelligence (C(3)l) for nuclear forces are essential elements in the deterrence of nuclear war. The present C(3)l) system has vulnerabilities associated with its reliability, survivability, and endurance under attack, thereby weakening deterrence by increasing the ambiguity in our capabilities. Development of a reliable and enduring C(3)l) system would reduce this ambiguity. Its reliable, positive control of nuclear forces would give the national leadership more time to assess situations, ensure discriminate retaliation, and improve our ability to manage crises in general. These capabilities could help to stop a war rapidly should one start. A reliable and enduring C(3)1) system will be needed for a long time to come, even if a freeze on strategic nuclear forces is accomplished or other arms control successes achieved. Indeed, C(3)l) may be the best source today of confidence-building measures to reduce tensions and the threat of nuclear catastrophe.

  17. Arms Control and the Strategic Defense Initiative: Three Perspectives. Occasional Paper 36.

    ERIC Educational Resources Information Center

    Hough, Jerry F.; And Others

    Three perspectives on President Ronald Reagan's Strategic Defense Initiative (SDI), which is intended to defend U.S. targets from a Soviet nuclear attack, are presented in separate sections. In the first section, "Soviet Interpretation and Response," Jerry F. Hough examines possible reasons for Soviet preoccupation with SDI. He discusses…

  18. The knottin-like Blufensin family regulates genes involved in nuclear import and the secretory pathway in barley-powdery mildew interactions

    USDA-ARS?s Scientific Manuscript database

    Plants have evolved complex regulatory mechanisms to control a multi-layered defense response to microbial attack. Both temporal and spatial gene expression are tightly regulated in response to pathogen ingress, modulating both positive and negative control of defense. BLUFENSINs, small knottin-like...

  19. Black Holes and the Large Hadron Collider

    ERIC Educational Resources Information Center

    Roy, Arunava

    2011-01-01

    The European Center for Nuclear Research or CERN's Large Hadron Collider (LHC) has caught our attention partly due to the film "Angels and Demons." In the movie, an antimatter bomb attack on the Vatican is foiled by the protagonist. Perhaps just as controversial is the formation of mini black holes (BHs). Recently, the American Physical Society…

  20. Rethinking Vulnerability in the Age of Anthropocene: Toward Ecologizing Education

    ERIC Educational Resources Information Center

    Li, Huey-li

    2017-01-01

    In this essay, Huey-li Li argues that, although precariousness has always been embedded in human existence, our human vulnerability has been heightened by seemingly omnipresent and omnipotent risks in the modern era, ranging from the 9/11 terroristic attacks and nuclear meltdowns to infectious disease outbreaks and climate change. Li unravels some…

  1. Space shuttle: Static stability and control investigation of the NR-GD/C delta wing booster (B-15B-1) and a Reusable Nuclear Stage (RNS) M = 0.6 - 4.96

    NASA Technical Reports Server (NTRS)

    Allen, E. C.

    1971-01-01

    Experimental aerodynamic investigations were made in the NASA/MSFC 14 x 14 inch trisonic wind tunnel on a NR-GD/C 0.0031 scale model delta wing booster (B-15B-1) and reusable nuclear stage (RNS). Three basic configurations were tested: (1) the B-15B-1 booster alone, (2) the RNS alone, and (3) the booster with the RNS mounted piggyback. Six component force and moment data were recorded for each of these configurations over an angle of attack range from -16 deg to 4 deg at zero degrees sideslip, and over an angle of sideslip range from -10 deg to 10 deg at zero and -6 degrees angle of attack. The configurations were tested over a Mach number range of 0.6 to 5.0 with a nominal Reynolds number of 6.5 million per foot except for Mach 1.2 and 3.0 where the Reynolds number were 12.4 million and 4.4 million per foot respectively.

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lakamp, M.A.

    The United States has adopted a policy of calculated ambiguity regarding the role of nuclear weapons in response to a potential chemical or biological weapons (CBW) attack. Many factors affect decisions about the role nuclear weapons play in US counterproliferation strategy. This thesis describes the policy of calculated ambiguity and offers some observations about its prospects and pitfalls. The thesis presents evidence that suggests nuclear weapons could play a positive role in the US counterproliferation strategy, at least in some circumstances. It also explains how such a role could conflict with the US nonproliferation strategy. Such a role would alsomore » violate the nuclear taboo and be seen by a majority of countries as illegal and immoral. The United States has chosen a policy of calculated ambiguity in an attempt to retain the deterrent value of nuclear weapons without paying the political, legal, and moral costs of explicit reliance on nuclear weapons to deter the use of CBW. This may have short-term benefits, but ultimately may damage the national interest.« less

  3. Assessment of WWMCCS Performance in a Post-Nuclear Attack Environment. Sanitized

    DTIC Science & Technology

    1975-11-01

    34cONTRACT No. 001-75-C-0217 * 1 THIS WORK SPONSOQRED BY THE DEFENSE NUCLEAR AGENC" UNDER RDT&E RMSS CODE X36075669 Q94OAXDDO01O1 H2590D. Pr p r d 1 rTHIS DOCUM...8217 < : " ! , . .I/• I V...... .... . . . . . . 1 "- 7 . . . • .tEPORT DOCJMENTATION PAGE "rAr, . Irt’. ±~ATSSIS9.C.7NF VMC EPPINEI 21 Jan 75-31 Oc- 75 IOST-I.CLLEA...U .. 4II4 .i %Iy•11 .4 @$ . .~ *󈧯.I . 1 . S $P.IL%-V ka"I 1 "- This work sponsored by the Defe.xse Nuclear Agency under %DT&E WISS Code X360075469 Q9

  4. Information Engagement to Garner Public Support: TTPs from World War II

    DTIC Science & Technology

    2009-05-14

    Internet was to survive a nuclear attack, who in his right mind thinks that you are any more going to be able to control information?” 28 David S......people appearing on television live over there and issuing their statements about what is wrong with America and so on, or when you get al Jazerra

  5. DOD Supply Chain: Preliminary Observations Indicate That Counterfeit Electronic Parts Can Be Found on Internet Purchasing Platforms

    DTIC Science & Technology

    2011-11-08

    Corps’ V-22 Osprey aircraft, and the Navy’s SSN-688 Los Angeles Class nuclear-powered attack submarine . If authentic, these parts provide accurate power...even d Different color epoxy seals were noted within both lots according to SMT Corp., which is common in suspect counterfeit devices

  6. Dissolution of spent nuclear fuel in carbonate-peroxide solution

    NASA Astrophysics Data System (ADS)

    Soderquist, Chuck; Hanson, Brady

    2010-01-01

    This study shows that spent UO2 fuel can be completely dissolved in a room temperature carbonate-peroxide solution apparently without attacking the metallic Mo-Tc-Ru-Rh-Pd fission product phase. In parallel tests, identical samples of spent nuclear fuel were dissolved in nitric acid and in an ammonium carbonate, hydrogen peroxide solution. The resulting solutions were analyzed for strontium-90, technetium-99, cesium-137, europium-154, plutonium, and americium-241. The results were identical for all analytes except technetium, where the carbonate-peroxide dissolution had only about 25% of the technetium that the nitric acid dissolution had.

  7. The impact of communication materials on public responses to a radiological dispersal device (RDD) attack.

    PubMed

    Rogers, M Brooke; Amlôt, Richard; Rubin, G James

    2013-03-01

    It is a common assumption that, in the event of a chemical, biological, radiological, or nuclear (CBRN) attack, a well-prepared and informed public is more likely to follow official recommendations regarding the appropriate safety measures to take. We present findings from a UK study investigating the ability of crisis communication to influence perceptions of risk and behavioral intentions in the general public in response to CBRN terrorism. We conducted a focus group study involving a scenario presented in mock news broadcasts to explore levels of public knowledge, information needs, and intended behavioral reactions to an attack involving an overt radiological dispersal device (RDD), or dirty bomb. We used the findings from these focus groups to design messages for the public that could be presented in a short leaflet. We then tested the effects of the leaflet on reactions to the same scenario in 8 further focus groups. The impact of the new messages on levels of knowledge, information needs, and intended compliance with official recommendations was assessed. The provision of information increased the perceived credibility of official messages and increased reported levels of intended compliance with advice to return to normal/stop sheltering, attend a facility for assessment and treatment, and return to a previously contaminated area after decontamination of the environment has taken place. Should a real attack with an RDD occur, having pretested messages available to address common concerns and information needs should facilitate the public health response to the attack.

  8. Low Energy Nuclear Reactions: Status at the Beginning of the New Millenium

    NASA Astrophysics Data System (ADS)

    Mallove, Eugene F.

    2001-03-01

    This talk will summarize some of the more convincing recent experiments that show that ^4He,^3He (including impossible to explain changes in the ^4He/^3He isotopic ratio), nuclear scale excess energy, tritium, low-level neutron production, and the transmutation of heavy elements can occur near room temperature in relatively simple systems. Despite inappropriate theory-based arguments against it and unethical attacks by people unfamiliar with the supporting experiments, the new field of solid state nuclear reactions is progressing. The physical theory behind the associated phenomena continues to be debated among theorists. But progress is being made. The facts of the history of this scientific controversy suggest that it is inadvisable to rush to judgment against allegedly ``impossible" new phenomena when increasingly careful experiments have revealed new vistas in physics. Detailed discussion of evidence for solid state nuclear reactions is available

  9. MAD with aliens? Interstellar deterrence and its implications

    NASA Astrophysics Data System (ADS)

    Korhonen, Janne M.

    2013-05-01

    The possibility that extraterrestrial intelligences (ETIs) could be hostile to humanity has been raised as a reason to avoid even trying to contact ETIs. However, there is a distinct shortage of analytical discussion about the risks of an attack, perhaps because of an implicit premise that we cannot analyze the decision making of an alien civilization. This paper argues that we can draw some inferences from the history of the Cold War and nuclear deterrence in order to show that at least some attack scenarios are likely to be exaggerated. In particular, it would seem to be unlikely that the humanity would be attacked simply because it might, sometime in the future, present a threat to the ETI. Even if communication proves to be difficult, rational decision-makers should avoid unprovoked attacks, because their success would be very difficult to assure. In general, it seems believable that interstellar conflicts between civilizations would remain rare. The findings advise caution for proposed interstellar missions, however, as starfaring capability itself might be seen as a threat. On the other hand, attempting to contact ETIs seems to be a relatively low-risk strategy: paranoid ETIs must also consider the possibility that the messages are a deception designed to lure out hostile civilizations and preemptively destroy them.

  10. Ballistic Missile Defense. Past and Future

    DTIC Science & Technology

    2010-04-01

    the Author” at the end of this book . x • Jacques S. Gansler even nuclear) are more likely than ballistic missile attacks, we should not waste ...Portions of this book may be quoted or reprinted without permission, provided that a standard source credit line is included...This book was published by the Center for Technology and National Security Policy, National Defense University, Fort Lesley J

  11. Health Aspects of a Nuclear or Radiological Attack

    DTIC Science & Technology

    2010-07-01

    treatment capabilities, population monitoring, decontamination, and so on. The requirements should be developed by a process that engages stakeholders...IND or reactor accident would release radioiodine that could result in hypothyroidism or late thyroid nodules or cancer. External contamination... Treatment and Long-Term Monitoring Victims of acute radiation-related events will require prompt diagnosis and treatment of emergency medical and

  12. "A Way of Revealing": Technology and Utopianism in Contemporary Culture

    ERIC Educational Resources Information Center

    Hall, Alex

    2009-01-01

    Although technology was once viewed literally as a means of bringing about utopian society, its means to that end was exhausted in the minds of many when it fostered the nuclear attacks on Japan in 1945. Since then, not only has technology lost its utopian verve, but it also has been viewed by some quite pessimistically. Nevertheless, technology…

  13. Equipment Level Fallout Radiation Effects Approach

    DTIC Science & Technology

    1989-02-10

    Electromagnetic Pulse (EMP) mitigation Program to evaluate and, where possible, mitigate the effects of the nuclear attack. Fallout radiation has been identified as an environment which may effect the performance of the regional and national telecommunication system. This report presents the investigations in the network level fallout radiation methodology used to determine the effects of this environment. Alternative techniques are presented to improve the

  14. Are you ready. Your guide to disaster preparedness. Handbook

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1990-09-01

    The handbook outlines basic steps to take in case of natural disasters (such as floods or tornadoes), man-made disasters (such as a nuclear power plant incident or industrial fire) and national security emergencies (such as an attack on the country). Each chapter ends with a list of publications one can get to find out more about disaster planning.

  15. New insights into the ligninolytic capability of a wood decay ascomycete

    Treesearch

    Semarjit Shary; Sally A. Ralph; Kenneth E. Hammel

    2007-01-01

    Wood-grown cultures of Daldinia concentrica oxidized a permethylated [beta]-14C- labeled synthetic lignin to 14CO2 and also cleaved a permethylated [alpha]-13C-labeled synthetic lignin to give C[alpha]-C[beta] cleavage products that were detected by 13C nuclear magnetic resonance spectrometry. Therefore, this ascomycete resembles white-rot basidiomycetes in attacking...

  16. Fighting Through a Logistics Cyber Attack

    DTIC Science & Technology

    2015-06-19

    Chariot 800 - 1350 Gunpowder 1915 Machine Gun 1915 Tanks 1915 Aircraft 1935 Radar 1945 Nuclear Weapons 1960 Satellites 1989 GPS 2009 Cyber Weapon...primarily remained in the scientific and academic communities for the next 22 years ( Griffiths , 2002). The Internet as we recognize it today... Griffiths (2002), defines the Web as an abstract space information containing hyperlinked documents and other resources, identified by their Uniformed

  17. Regulating Nation-State Cyber Attacks in Counterterrorism Operations

    DTIC Science & Technology

    2010-06-01

    24 e. The 1973 United Nations Convention to Prevent and Punish Acts of Terrorism in the Form of Crimes Against...International Convention for the Suppression of Acts of Nuclear Terrorism ......................28 n. The 1998 Rome Statute and the Crime of Aggression...Intelligence Agency, https://www.cia.gov/news-information/ speeches -testimony/2000/cyberthreats_022300.html. 3 Peter Brookes, “The Cyberspy Threat

  18. National Security Issues 1981 Symposium. Strategic Nuclear Policies, Weapons, and the C3 Connection, October 13-14, 1981,

    DTIC Science & Technology

    1981-01-01

    of prob- being an attack assessment. From there it goes to lems due to the atmosphere and due to solar the National Command Authority who acts on the...19-4-19"-8). MITRE/Bedford Panel Member for Institute for (omputer ’Kiences and 1959 Technology Evaluation Panal for the National Bureau of

  19. The Strange Death of UK Civil Defence Education in the 1980s

    ERIC Educational Resources Information Center

    Preston, John

    2015-01-01

    In the cold war, the United Kingdom government devised a number of public education campaigns to inform citizens about the precautions that they should undertake in the event of a nuclear attack. One such campaign, Protect and Survive, was released to the general public and media in May 1980. The negative publicity this publication received is…

  20. Should Helicopters Transport Patients Who Become Sick After a Chemical, Biological, Radiological, Nuclear, and Explosive Attack?

    PubMed

    Yanagawa, Youichi; Ishikawa, Kouhei; Takeuchi, Ikuto; Nagasawa, Hiroki; Jitsuiki, Kei; Ohsaka, Hiromichi; Omori, Kazuhiko

    The local fire department executed a training simulation for chemical and explosive incidents at a large sports facility. In this training simulation, a physician-staffed helicopter arrived at the request of the fire department and landed just outside the cold zone in the parking area. The doctor and nurse of the helicopter were escorted to a red area in the cold zone, which was selected based on the results of postdecontamination triage. After the patients had been treated, they were air medically evacuated to the base hospital. In the Tokyo subway sarin attack in 1995, St Luke's International Hospital admitted over 600 victims. During this incident, 23.2% of medical staff suffered secondary injury from sarin exposure. If air medial crews respond with subsequent postexposure effects during flight, an affected pilot could lose control of the helicopter, resulting in a fatal crash. Based on potential safety concerns for air medical and ground personnel, our recommendation would be that air medical helicopters not be dispatched to sites of chemical, biological, radiological, nuclear, and explosive incidents. Copyright © 2018 Air Medical Journal Associates. Published by Elsevier Inc. All rights reserved.

  1. A study of myocardial perfusion in patients with panic disorder and low risk coronary artery disease after 35% CO2 challenge.

    PubMed

    Fleet, Richard; Foldes-Busque, Guillaume; Grégoire, Jean; Harel, François; Laurin, Catherine; Burelle, Denis; Lavoie, Kim

    2014-01-01

    We have previously reported that 35% CO2 challenge induced myocardial ischemia in 81% of coronary artery disease (CAD) patients with comorbid panic disorder (PD) and previous positive nuclear exercise stress tests. However, it is yet unclear whether this is the case among CAD patients with PD and normal nuclear exercise stress test results. We hypothesized that a potent mental stressor such as a panic challenge among CAD patients with PD would also induce ischemia in patients with normal exercise stress tests. Forty-one coronary artery disease patients with normal nuclear exercise stress tests (21 patients with PD and 20 without PD) were submitted to a well-established panic challenge test (with 1 vital capacity inhalation of a gas mixture containing 35% CO2 and 65% O2) and injected with Tc-99m-tetrofosmin (Myoview), upon inhalation. Single photon emission computed tomography imaging was used to assess per-panic challenge reversible myocardial ischemia and HR, BP, and a 12 lead ECG was continuously measured during the procedure. Fifty-eight percent of panic disorder patients (12/21) had a panic attack during the panic challenge vs 15% (3/20) of controls (p=0.005). Only 10% of patients in each group displayed myocardial ischemia per panic challenge. These findings suggest that panic attacks among panic disorder patients with lower-risk coronary artery disease may not confer a risk for myocardial ischemia. © 2013.

  2. Cyber secure systems approach for NPP digital control systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McCreary, T. J.; Hsu, A.

    2006-07-01

    Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant andmore » distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to disrupt network communications by entering the system from an attached utility network or utilizing a modem connected to a control system PC that is in turn connected to a publicly accessible phone; 2)Threat from a user connecting an unauthorized computer to the control network; 3)Threat from a security attack when an unauthorized user gains access to a PC connected to the plant network;. 4)Threat from internal disruption (by plant staff, whether, malicious or otherwise) by unauthorized usage of files or file handling media that opens the system to security threat (as typified in current situation in most control rooms). The plant I and C system cyber security design and the plant specific procedures should adequately demonstrate protection from the four pertinent classes of cyber security attacks. The combination of these features should demonstrate that the system is not vulnerable to any analyzed cyber security attacks either from internal sources or through network connections. The authors will provide configurations that will demonstrate the Cyber Security Zone. (authors)« less

  3. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support formore » domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.« less

  4. The radiation chemistry of nuclear reactor decontaminating reagents

    NASA Astrophysics Data System (ADS)

    Sellers, Robin M.

    Processes involved in the radiation chemistry of some typical nuclear reactor decontaminating reagents including complexing, reducing and oxidising agents are described. It is concluded that radiation-induced decomposition is only likely to be a problem with dilute formulations, and/or with minor additives such as corrosion inhibitors which are not protected from attack by the other constituents. Addition of a "sacrificial" compound may be necessary to overcome this. The importance of considering loss of function, rather than the decomposition rate of the starting material, is emphasised. Reagents based on low oxidation state metal ions (LOMI) can be regenerated by the radiation field in the presence of formate ion.

  5. REDUCTIONS WITHOUT REGRET: HISTORICAL PERSPECTIVES

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swegle, J.; Tincher, D.

    This is the first of three papers (in addition to an introductory summary) aimed at providing a framework for evaluating future reductions or modifications of the U.S. nuclear force, first by considering previous instances in which nuclear-force capabilities were eliminated; second by looking forward into at least the foreseeable future at the features of global and regional deterrence (recognizing that new weapon systems currently projected will have expected lifetimes stretching beyond our ability to predict the future); and third by providing examples of past or possible undesirable outcomes in the shaping of the future nuclear force, as well as somemore » closing thoughts for the future. This paper examines the circumstances and consequences of the elimination of The INF-range Pershing II ballistic missile and Gryphon Ground-Launched Cruise Missile (GLCM), deployed by NATO under a dual-track strategy to counter Soviet intermediate-range missiles while pursuing negotiations to limit or eliminate all of these missiles. The Short-Range Attack Missile (SRAM), which was actually a family of missiles including SRAM A, SRAM B (never deployed), and SRAM II and SRAM T, these last two cancelled during an over-budget/behind-schedule development phase as part of the Presidential Nuclear Initiatives of 1991 and 1992. The nuclear-armed version of the Tomahawk Land-Attack Cruise Missile (TLAM/N), first limited to shore-based storage by the PNIs, and finally eliminated in deliberations surrounding the 2010 Nuclear Posture Review Report. The Missile-X (MX), or Peacekeeper, a heavy MIRVed ICBM, deployed in fixed silos, rather than in an originally proposed mobile mode. Peacekeeper was likely intended as a bargaining chip to facilitate elimination of Russian heavy missiles. The plan failed when START II did not enter into force, and the missiles were eliminated at the end of their intended service life. The Small ICBM (SICBM), or Midgetman, a road-mobile, single-warhead missile for which per-unit costs were climbing when it was eliminated under the PNIs. Although there were liabilities associated with each of these systems, there were also unique capabilities; this paper lays out the pros and cons for each. Further, we articulate the capabilities that were eliminated with these systems.« less

  6. Autonomous Military Robotics: Risk, Ethics, and Design

    DTIC Science & Technology

    2008-12-20

    civilians, such as most biological or chemical weapons —and perhaps even many modes of ‘cyberattacks’ on computer networks [Rowe, 2008]. ▌51...disproportionately—similar in effect to landmines as well as nuclear, biological , and chemical weapons —are hence immoral to deploy. Whether or not...little cover from attacks, to clearing roads and seas of improvised explosive devices (IEDs), to surveying damage from biochemical weapons , to

  7. Autonomous Underwater Vehicle Architecture Synthesis for Shipwreck Interior Exploration

    DTIC Science & Technology

    2015-12-01

    silt-out, strong and unpredictable currents, abrasion puncture and shock damage, temperature and pressure variations, toxic substances, corrosion...smooth to resist snagging on debris, and sufficiently lightweight to be portable by two men. 2. The vehicle shall be capable of autonomous...1989, the Komsomolets (K-278), a Russian nuclear attack submarine operating in the Norwegian Sea, went down after unsuccessfully fighting a fire in

  8. Protecting the Power Grid From Electromagnetic Pulses

    NASA Astrophysics Data System (ADS)

    Simpson, Sarah

    2004-10-01

    A nuclear explosion high in the Earth's atmosphere does no immediate known harm to living things, but the resulting electromagnetic pulse (EMP) from a single detonation could degrade 70 percent or more of the country's electrical service in an instant, warns the Commission to Assess the Threat to the United States from Electromagnetic Pulse Attack, which presented its findings to the U.S. Congress in July.

  9. Nuclear Lessons for Cyber Security

    DTIC Science & Technology

    2011-01-01

    major kinetic violence. In the physical world, governments have a near monopoly on large - scale use of force, the defender has an intimate knowledge of...with this transformative technology. Until now, the issue of cyber security has largely been the domain of computer experts and specialists. When the...with increasing economic returns to scale and political practices that make jurisdictional control difficult. Attacks from the informational realm

  10. Stability Operations: Policy and Doctrine Awaiting Implementation

    DTIC Science & Technology

    2013-03-01

    periods move through offense and defense (or reverse ) sequentially while stability is presented throughout the rotation. This causes stability to...The author’s personal experience in Afghanistan and having studied the complex nature of stability operations suggests the reverse is true. June...climate change, Euro/EU collapse, a democratic or collapsed China, a reformed Iran, nuclear war or WMD/cyber-attack, solar geomagnetic storms, U.S

  11. Israeli Deterrence And the 2nd Lebanon War

    DTIC Science & Technology

    2017-04-06

    06 April 2017 DISTRIBUTION A. Approved for public release: distribution unlimited. Disclaimer The views expressed in this academic...which often replaces the government.119 Views are divided whether Hezbollah is first a Lebanese entity or an Iranian envoy.120 Nevertheless...proxy who can deter an Israeli attack on its nuclear facilities.131 Iran views Syria as a channel for aid to the Shiite population in Lebanon and

  12. Germany and NATO

    DTIC Science & Technology

    1987-01-01

    its force targets, with 12 Army divi- sions, 15 naval squadrons, 10 air force wings, and two Nike antiaircraft battalions. -7 Equipping the Bundeswehr...replacement of nuclear- armed Nike r-,issiles with conventional Patriot and Roland Air Defen;e Systems that have no offensive capability whatsoever...that would intercept and destroy attacking aircraft penetrating NATO’s air defense missile belts. By 1980, the Nike high-altitude component of the NATO

  13. Typhoid fever as a triggering factor in acute and intractable bronchial asthma attack.

    PubMed

    Wardhana; Surachmanto, Eko E; Datau, E A

    2013-10-01

    Typhoid fever is an enteric infection caused by Salmonella typhi. In Indonesia, typhoid fever is endemic with high incidence of the disease. In daily practice we frequently have patients with bronchial asthma, and it is becoming worse when these patients get typhoid fever. After oral ingestion, Salmonella typhi invades the the intestine mucosa after conducted by microbial binding to epithelial cells, destroying the microfold cells (M cell) then passed through the lamina propria and detected by dendritic cells (DC) which express a variety of pathogen recognition receptors on the surfaces, including Toll-Like Receptor (TLR). expressed on macrophages and on intestinal epithelial cells inducing degradation of IB, and translocation of NF-B (Nuclear Factor-Kappa Beta). This process initiates the induction of pro-inflammatory gene expression profile adhesion molecules, chemokines, adhesion molecules, and other proteins that induce and perpetuate the inflammation in host cells then will induce acute ant intractable attack of bronchial asthma. The role of typhoid fever in bronchial asthma, especially in persons with acute attack of bronchial asthma, is not well understood. In this article, we will discuss the role of typhoid fever in the bronchial asthma patients which may cause bronchial asthma significantly become more severe even triggering the acute and intractable attack of bronchial asthma. This fact makes an important point, to treat completely the typhoid fever in patients with bronchial asthma.

  14. Scanning of vehicles for nuclear materials

    NASA Astrophysics Data System (ADS)

    Katz, J. I.

    2014-05-01

    Might a nuclear-armed terrorist group or state use ordinary commerce to deliver a nuclear weapon by smuggling it in a cargo container or vehicle? This delivery method would be the only one available to a sub-state actor, and it might enable a state to make an unattributed attack. Detection of a weapon or fissile material smuggled in this manner is difficult because of the large volume and mass available for shielding. Here I review methods for screening cargo containers to detect the possible presence of nuclear threats. Because of the large volume of innocent international commerce, and the cost and disruption of secondary screening by opening and inspection, it is essential that the method be rapid and have a low false-positive rate. Shielding can prevent the detection of neutrons emitted spontaneously or by induced fission. The two promising methods are muon tomography and high energy X-radiography. If they do not detect a shielded threat object they can detect the shield itself.

  15. Evolving societal risks and necessary precautions in the age of nuclear power and therapeutic radiation: an American perspective.

    PubMed

    Pham, Martin H; Yu, Cheng; Rusch, Mairead; Holloway, Charles; Chang, Eric; Apuzzo, Michael L J

    2014-12-01

    Terrorism involving nuclear or radiologic weapons can devastate populations, city infrastructures, and entire sociopolitical systems. In our age of nuclear medicine and therapeutic radiation delivery, the unauthorized and illegal acquisition of radioactive materials needed for such an attack is always a possibility and risk. Physicians handling high-energy isotopes for medical radiotherapy must be aware of the basic security requirements as outlined by the Nuclear Regulation Commission, which include background checks and authorized access, physical protection during radionuclide use, and physical protection during its transit. The Leksell Gamma Knife and its Category 1 cobalt-60 radioactive source are discussed because of their significant potential for deployment in a weaponized device. Although this article presents a perspective relating to American rules and regulations, these precautions are applicable anywhere that similar situations exist. Understanding these materials and the security they require is essential to preventing the disastrous outcomes should these isotopes fall into terrorists' hands. Published by Elsevier Inc.

  16. Scanning of vehicles for nuclear materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Katz, J. I.

    2014-05-09

    Might a nuclear-armed terrorist group or state use ordinary commerce to deliver a nuclear weapon by smuggling it in a cargo container or vehicle? This delivery method would be the only one available to a sub-state actor, and it might enable a state to make an unattributed attack. Detection of a weapon or fissile material smuggled in this manner is difficult because of the large volume and mass available for shielding. Here I review methods for screening cargo containers to detect the possible presence of nuclear threats. Because of the large volume of innocent international commerce, and the cost andmore » disruption of secondary screening by opening and inspection, it is essential that the method be rapid and have a low false-positive rate. Shielding can prevent the detection of neutrons emitted spontaneously or by induced fission. The two promising methods are muon tomography and high energy X-radiography. If they do not detect a shielded threat object they can detect the shield itself.« less

  17. Nuclear EMP simulation for large-scale urban environments. FDTD for electrically large problems.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, William S.; Bull, Jeffrey S.; Wilcox, Trevor

    2012-08-13

    In case of a terrorist nuclear attack in a metropolitan area, EMP measurement could provide: (1) a prompt confirmation of the nature of the explosion (chemical or nuclear) for emergency response; and (2) and characterization parameters of the device (reaction history, yield) for technical forensics. However, urban environment could affect the fidelity of the prompt EMP measurement (as well as all other types of prompt measurement): (1) Nuclear EMP wavefront would no longer be coherent, due to incoherent production, attenuation, and propagation of gamma and electrons; and (2) EMP propagation from source region outward would undergo complicated transmission, reflection, andmore » diffraction processes. EMP simulation for electrically-large urban environment: (1) Coupled MCNP/FDTD (Finite-difference time domain Maxwell solver) approach; and (2) FDTD tends to be limited to problems that are not 'too' large compared to the wavelengths of interest because of numerical dispersion and anisotropy. We use a higher-order low-dispersion, isotropic FDTD algorithm for EMP propagation.« less

  18. Rad Resilient City: a preparedness checklist to save lives following a nuclear detonation.

    PubMed

    Schoch-Spana, Monica

    2013-11-01

    The Rad Resilient City Checklist is a local planning tool that can help save tens of thousands of lives following a nuclear detonation. If prevention of nuclear terrorism fails, then reducing exposure to radioactive fallout is the intervention that can save the most lives following a nuclear detonation. Yet, most Americans are not familiar with correct safety measures against fallout, and many believe that nothing can be done to reduce the suffering and death inflicted by a nuclear attack. Moreover, cities have no checklist on how to prepare the emergency management infrastructure and the larger population for this hazard, despite hundreds of pages of useful guidance from the federal government and radiation professional organizations. The Rad Resilient City Checklist reverses this situation by converting the latest federal guidance and technical reports into clear, actionable steps for communities to take to protect their residents from exposure to radioactive fallout. The checklist reflects the shared judgment of the Nuclear Resilience Expert Advisory Group, a national panel led by the Center for Biosecurity and comprised of government decision makers, scientific experts, emergency responders, and leaders from business, volunteer, and community sectors.

  19. The evolution of disarmament and arms control thought, 1945-1963

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Williams, R.E. Jr.

    1987-01-01

    The onset of the Cold War and the total failure of nuclear disarmament efforts at the United Nations were only the most obvious of several factors prompting a reexamination of the disarmament approach in the early 1950s. The end of the American nuclear monopoly, the development of the hydrogen bomb, the experience with limited war in Korea, and the rise of concerns about the possibility of nuclear surprise attack (exacerbated by Sputnik) all prompted the Eisenhower administration and the community of strategic thinkers to question the feasibility and even the desirability of nuclear disarmament. To replace disarmament, the strategic communitymore » developed the arms-control approach; this approach, the intellectual foundations of which were largely completed in 1961, has been the basis of American policy for the regulation of nuclear weapons since the Kennedy administration. Since its development, the new thinking has been challenged both by disarmers, who regard it as a conservative approach designed merely to perpetuate mutual nuclear deterrence, and traditionalists, who perceive many similarities to the disarmament approach and are skeptical of its faith in the ability of adversaries to act together to reduce the threat that weapons pose.« less

  20. Essays in Energy Policy: The Interplay Between Risks and Incentives

    NASA Astrophysics Data System (ADS)

    Lordan-Perret, Rebecca Jane Bishop

    My dissertation considers examples of how social, economic, and political incentives associated with energy production, distribution, and consumption increase the risk of harm to society and the environment. In the first essay, "Why America should move toward dry cask consolidated interim storage of used nuclear fuel," my co-authors and I discuss how the confluence of the U.S. Government and electricity utilities' political and economic incentives created a gridlock preventing a long-term nuclear waste disposal solution. We find that our current policies undermine the safety and security of the nuclear waste, and so, suggest a temporary, consolidated storage solution. In the second essay, "Import-Adjusted Fatality Rates for Individual OECD Countries Caused by Accidents in the Oil Energy Chain," my co-authors and I adopt a technique from the greenhouse gas accounting literature and assign CO2 emissions to the final consumer (rather than the producer) by allocating the risk - measured in fatalities - associated with oil production to the final consumer. The new assignments show that normal methods of tracking oil production impacts only capture part of the actual costs. In the third essay, "Insurgent Attacks on Energy Infrastructure and Electoral Institutions in Colombia," my co-authors and I consider the economic and political incentives that an energy resource create in a conflict environment. Our research shows that insurgents in Colombia, Las Fuerzas Armadas Revolucionarias de Colombia (FARC) and Ejercito de Liberacion Nacional (ELN), strategically time attacks on critical energy infrastructure during elections. These results are the first to quantify insurgent tactics to target critical energy infrastructure, which potentially undermine state capacity and democratic processes.

  1. Off-design temperature effects on nuclear fuel pins for an advanced space-power-reactor concept

    NASA Technical Reports Server (NTRS)

    Bowles, K. J.

    1974-01-01

    An exploratory out-of-reactor investigation was made of the effects of short-time temperature excursions above the nominal operating temperature of 990 C on the compatibility of advanced nuclear space-power reactor fuel pin materials. This information is required for formulating a reliable reactor safety analysis and designing an emergency core cooling system. Simulated uranium mononitride (UN) fuel pins, clad with tungsten-lined T-111 (Ta-8W-2Hf) showed no compatibility problems after heating for 8 hours at 2400 C. At 2520 C and above, reactions occurred in 1 hour or less. Under these conditions free uranium formed, redistributed, and attacked the cladding.

  2. Resilient Control and Intrusion Detection for SCADA Systems

    DTIC Science & Technology

    2014-05-01

    Control. McGraw-Hill, 1996. [89] L. Greenemeier. Robots arrive at fukushima nuclear site with unclear mission. Scientific American, 2011. [90] M. Grimes...security engineering task. SCADA systems are hard real-time systems [251] because the completion of an operation after its deadline is considered useless and...that the attacker, after gaining unauthenticated access, could change the operator display values so that when an alarm actually goes off, the human

  3. An Anthology: Rationale for a U.S. Ballistic Missile Defense (1969-1984).

    DTIC Science & Technology

    1985-04-01

    country against accidental attacks by other nations. The ability to avoid escalation into a massive nclear retaliation because of human error or...fact remains that unprotected humans or unhardened structures the popular suspicions generated in connection or communication facilities would be fatally...for resisting aggression and deterring conflict that are safer and more humane than exclusive reliance on the threat of nuclear retaliation. A

  4. Assessing and Improving Operational Resilience of Critical Infrastructures and Other Systems

    DTIC Science & Technology

    2014-01-01

    Fukushima Daiichi nuclear disaster in 2011, along with the devastation caused by Hurricane “Superstorm” Sandy in 2012, have reinforced the need for...2006. In the years following HSPD-7, there were a number of unprecedented natural disasters , including the Indonesian tsunami in December 2004...Stakelberg game; optimization; operational model; attacker model; defender model 1. Introduction In the last 15 years, a number of disasters , some deliberately

  5. Indirect Rise of Power: China’s Economic and Military Growth and its Changing Relationship with the United States

    DTIC Science & Technology

    2012-05-01

    increasing scrutiny as economies throughout the globe deal with recessions and market swings . The consequence of keeping the Chinese Yuan fixed at a low...092 1 1 1 1 1 1 1 - - SSB Golf Type 031 1 1 1 1 1 1 1 1 1 SSN Nuclear Attack Submarines - - - - - - - 1 1 SSN NEWCON Type 095 - - - - - - - 1 3 SSN

  6. Managing traumatic brain injury secondary to explosions.

    PubMed

    Burgess, Paula; E Sullivent, Ernest; M Sasser, Scott; M Wald, Marlena; Ossmann, Eric; Kapil, Vikas

    2010-04-01

    Explosions and bombings are the most common deliberate cause of disasters with large numbers of casualties. Despite this fact, disaster medical response training has traditionally focused on the management of injuries following natural disasters and terrorist attacks with biological, chemical, and nuclear agents. The following article is a clinical primer for physicians regarding traumatic brain injury (TBI) caused by explosions and bombings. The history, physics, and treatment of TBI are outlined.

  7. The Use of Land Power to Counter the Iranian Nuclear Proliferation Challenge

    DTIC Science & Technology

    2007-06-15

    US actions by regional and global opponents (al Qaeda, Russia, etc) to an invasion. Specifically, I will not address the potential for the con spread...facilities will not neutralize the facilities in the long-term, and air attacks will inspire Iranian nationalism against pro -US change. It may not be...thesis committee. Other evaluation methods considered included the strengths-weaknesses-opportunities-threats ( SWOT ) method, and the diplomacy

  8. Theater Land Attack Cruise Missile Defense: Guarding the Back Door

    DTIC Science & Technology

    1999-06-01

    employ radio command, laser, anti- radiation homing, or electro-optical guidance systems. TASMs will benefit from the same technological developments...mile-range Al-Husayn missile within range of all major Israeli cities, and its nuclear facilities in the Negev desert. The existence of these sites...solutions (“engage on remote”), or simply launch missiles without radiating , and allow the AFCR to guide the missiles to the target

  9. Vital Interests, Virtual Threats: Reconciling International Law with Information Warfare and United States Security

    DTIC Science & Technology

    2001-03-01

    natural resources and physical labor were broad meas­ urements of the wealth of a business , a corporation , or a state.18 With the globalization of ...5 Global Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 6 Components of Information Superiority...point where the source of attacks can be verified. 6 Notes 1. John D. Jones and Marc F. Griesbach, eds., Just War Theory in the Nuclear Age (Lanham

  10. Shadows of Stuxnet: Recommendations for U.S. Policy on Critical Infrastructure Cyber Defense Derived from the Stuxnet Attack

    DTIC Science & Technology

    2016-03-01

    wastewater, oil and natural gas, chemical, transportation, pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing (e.g...dams, energy infrastructure, banks, farms, food processing facilities, hospitals, nuclear reactors, transportation carriers, and water treatment... food and agriculture sector” is, “almost entirely under private ownership and is comprised of an estimated 2.2 million farms, 900,000 restaurants, and

  11. The Federal Role in Terrorism Insurance. Evaluating Alternatives in an Uncertain World

    DTIC Science & Technology

    2007-01-01

    representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is...Swiss Re Life & Health America Inc. Richard Thomas* Senior vice president Chief underwriting officer American International Group Steven Wechsler ...bomb, outdoor anthrax, nuclear bomb Attack scaling S [0.33, 3.0] Postattack government compensation Market retention R [$27.5 billion, $100 billion

  12. Scientific feuds, polemics, and ad hominem arguments in basic and special-interest genetics.

    PubMed

    Carlson, Elof Axel

    Scientific disputes are commonly presented and settled in journal publications. Most are resolved by a weighing of evidence and new findings. In some cases the arguments are personal and in the form of ad hominem attacks on the personality or integrity of an author of a journal article. Many famous scientists (e.g., Galileo, Newton, and Hooke) used ad hominem arguments in responding to their critics. William Bateson, W.F.R. Weldon, William Castle, and H.J. Muller used ad hominem arguments in their publications until the end of World War I, when editorial policy of journals changed. Motivating some of the attacks are philosophic differences (such as holistic or reductionist approaches to science), ideological differences (such as Marxist or Capitalist outlooks), politics (such as Cold War depictions by East and West on fallout from nuclear testing), or conflicts of interest (which can be professional or financial such as the debates over nontraditional and orthodox medicine or over tobacco smoking and health). Most of the time, the disputes are motivated by honest disagreements over the interpretation of the data. A recent surge (2009-2016) of ad hominem attacks by Edward Calabrese has appeared disparaging H. J. Muller, E. B. Lewis, other twentieth-century contributors to radiation genetics, and the National Academy of Sciences. They address the mutational effects of low-dose radiation exposure. Calabrese's attacks have led to responses by geneticists in the field of mutagenesis, by agencies criticized by Calabrese, and by students and colleagues of those who have been accused of deception by Calabrese. This article reviews some of the history of ad hominem arguments in science and the background to the attacks by Calabrese. I argue that Calabrese's characterization of Muller and his supporters is unjust, misleading, and hurtful. I also propose some methods for dealing with or preventing ad hominem attacks in professional journals. Copyright © 2017. Published by Elsevier B.V.

  13. Improvised Nuclear Device Case Study

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Buddemeier, Brooke; Suski, Nancy

    2011-07-12

    Reducing the casualties of catastrophic terrorist attacks requires an understanding of weapons of mass destruction (WMD) effects, infrastructure damage, atmospheric dispersion, and health effects. The Federal Planning Guidance for Response to a Nuclear Detonation provides the strategy for response to an improvised nuclear device (IND) detonation. The supporting science developed by national laboratories and other technical organizations for this document significantly improves our understanding of the hazards posed by such an event. Detailed fallout predictions from the advanced suite of three-dimensional meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory, including extensive global geographical and real-time meteorological databases tomore » support model calculations, are a key part of response planning. This presentation describes the methodology and results to date, including visualization aids developed for response organizations. These products have greatly enhanced the community planning process through first-person points of view and description of the dynamic nature of the event.« less

  14. Toward a nuclear weapons free world?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Maaranen, S.A.

    Doubts about the wisdom of relying on nuclear weapons are as old as nuclear weapons themselves. But despite this questioning, nuclear weapons came to be seen as the indispensable element of American (indeed Western) security during the Cold War. By the 1970s and 1980s, however, discontent was growing about the intense US-Soviet nuclear arms competition, as it failed to provide any enduring improvement in security; rather, it was seen as creating ever greater risks and dangers. Arms control negotiations and limitations, adopted as a means to regulate the technical competition, may also have relieved some of the political pressures andmore » dangers. But the balance of terror, and the fears of it, continued. The Strategic Defense Initiative (SDI) under President Reagan was a very different approach to escaping from the precarious protection of nuclear weapons, in that it sought a way to continue to defend the US and the West, but without the catastrophic risks of mutual deterrence. As such, SDI connoted unhappiness with the precarious nuclear balance and, for many, with nuclear weapons in general. The disappearance of the Warsaw Pact, the disintegration of the Soviet Union, and the sudden end of the Cold War seemed to offer a unique opportunity to fashion a new, more peaceful world order that might allow for fading away of nuclear weapons. Scholars have foreseen two different paths to a nuclear free world. The first is a fundamental improvement in the relationships between states such that nuclear weapons are no longer needed. The second path is through technological development, e.g., missile defenses which could provide effective protection against nuclear attacks. The paper discusses nuclear weapon policy in the US, views of other nuclear states, the future of nuclear weapons, and issues in a less-nuclear world.« less

  15. The Japanese aerial attack on Hanford Engineer Works

    NASA Astrophysics Data System (ADS)

    Clark, Charles W.

    The day before the Pearl Harbor attack, December 6, 1941, the University of Chicago Metallurgical Laboratory was given four goals: design a plutonium (Pu) bomb; produce Pu by irradiation of uranium (U); extract Pu from the irradiated U; complete this in time to be militarily significant. A year later the first controlled nuclear chain reaction was attained in Chicago Pile 1 (CP-1). In January 1943, Hanford, WA was chosen as the site of the Pu factory. Neutron irradiation of 238U was to be used to make 239Pu. This was done by a larger version of CP-1, Hanford Reactor B, which went critical in September 1944. By July 1945 it had made enough Pu for two bombs: one used at the Trinity test in July; the other at Nagasaki, Japan in August. I focus on an ironic sidelight to this story: disruption of hydroelectric power to Reactor B by a Japanese fire balloon attack on March 10, 1945. This activated the costly coal-fired emergency backup plant to keep the reactor coolant water flowing, thwarting disaster and vindicating the conservative design of Hanford Engineer Works. Management of the Hanford Engineer Works in World War II, H. Thayer (ASCE Press 1996).

  16. Nuclear deterrence in the Arab-Israeli conflict. A case study in Egyptian-Israeli relations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shikaki, K.I.

    1986-01-01

    In order to achieve security and stability, and maximize the chances for resolving the Arab-Israeli conflict, should Egypt and Israel adopt declared nuclear deterrence doctrines. Or would such a move be ineffective, dangerous, or even disastrous. The nuclearization of the Middle East is not necessary: military threats to the survival of the states in the region do not justify the introduction of nuclear weapons. Nuclearization is not desirable: deterrence theory's assumptions and implications exhibit intellectual weakness and its explanatory power is unsatisfactory; nuclear deterrence may reduce the frequency of war, but it pays little attention to the consequences of war;more » and in comparison to defense, nuclear deterrence may lack credibility. Presently, Israel has nuclear capability and delivery systems sufficient to provide security to its vital areas through deterrence of or defense against Arab attacks. The Arabs do not, however, believe that such security extends to the Arab territories occupied by Israel during the June 1967 war. To supply security, nuclear deterrence must be effective, stable, and credible. In a multinuclear environment, the Egyptians and Israelis are likely to meet the requirement for an effective deterrence: the possession of a nuclear capability sufficient to inflict an enormous amount of death and destruction. If the Arabs and Israelis sought and adopted strategies of deterrence, they might be able to meet the requirement for a stable deterrence: the acquisition of second strike capabilities.« less

  17. Over the Beach. US Army Amphibious Operations in the Korean War

    DTIC Science & Technology

    2008-01-01

    target of nuclear attack would result in a large and continuing requirement for logistics-over-the­ shore (LOTS) and amphibious resupply operations...Army Ram Fleet, initially under Porter’s control and later under General Ulysses S. Grant, the brigade conducted operations with mixed results until...same period, the Marine Corps underwent changes that would ultimately result in the adoption of landing force operations as its primary mission. The

  18. Counter Nuclear, Biological, and Chemical Operations, This document compliments JCS Pub 3-11

    DTIC Science & Technology

    2000-08-16

    Successful German Chemical Attack The concept of creating a toxic gas cloud from chemical cylinders was credited to Fritz Haber of the Kaiser Wilhelm Physical...of considerations: The high caliber of German theoretical and experimental physicists like Otto Hahn, Paul Harteck, Werner Heisenberg, Fritz ...Institute of Berlin in late 1914. Owing to a shortage of artillery shells, Haber thought a chemical gas cloud would negate the enemy’s earthworks

  19. Defense Infrastructure: DOD Can Improve Its Response to Environmental Exposures on Military Installations

    DTIC Science & Technology

    2012-05-01

    basis, based on what they perceive the health threat to be. The sidebar illustrates DOD’s response to the 2011 Fukushima Daiichi disaster in Japan... disasters or nuclear attacks, to protect installations, facilities, and personnel—including military and civilian personnel, dependents of military and...4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with

  20. Managing traumatic brain injury secondary to explosions

    PubMed Central

    Burgess, Paula; E Sullivent, Ernest; M Sasser, Scott; M Wald, Marlena; Ossmann, Eric; Kapil, Vikas

    2010-01-01

    Explosions and bombings are the most common deliberate cause of disasters with large numbers of casualties. Despite this fact, disaster medical response training has traditionally focused on the management of injuries following natural disasters and terrorist attacks with biological, chemical, and nuclear agents. The following article is a clinical primer for physicians regarding traumatic brain injury (TBI) caused by explosions and bombings. The history, physics, and treatment of TBI are outlined. PMID:20606794

  1. Conflict in the 21st Century: Counterstrategies for the WMD Terrorist

    DTIC Science & Technology

    1999-04-01

    general categories of bio-agents: bacteria , fungi , rickettsiae, chlamydia, viruses , and toxins.18 Anthrax, plague, and tularemia are some of the better...real threat may be a terrorist organization with the will and capability to use a nuclear, chemical, or biological weapon against America’s territory...nervous system .8 These are some of the most lethal substances known to man. Chemical agents are most hazardous when they attack the body passively

  2. Survival of the Relocated Population of the U.S. After a Nuclear Attack

    DTIC Science & Technology

    1976-06-01

    6.1 Water Supply ..................................... 105 3 6.2 The Food Situation ............ ................... 106 6.3 The Effects of Dust and...the tiuantity of grain shipped could be greatly reduced. 2.3.4 - Further research on food crops is required to determine the effects of fallout...areas other than their own for at least 50% of their processed wholesale food supplies. Billheimer et al., concluded that the most effective strategy

  3. Development of a drone equipped with optimized sensors for nuclear and radiological risk characterization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boudergui, K.; Carrel, F.; Domenech, T.

    2011-07-01

    The MOBISIC project, funded by the Systematic Paris-Region cluster, is being developed in the context of local crisis (attack bombing in urban environment, in confined space such as an underground train tunnel etc.) or specific event securing (soccer world cup, political meeting etc.). It consists in conceiving, developing and experimenting a mobile, modular ('plug and play') and multi-sensors securing system. In this project, CEA LIST has suggested different solutions for nuclear risks detection and identification. It results in embedding a CZT sensor and a gamma camera in an indoor drone. This article first presents the different modifications carried out onmore » the UAV and different sensors, and focuses then on the experimental performances. (authors)« less

  4. Defense without aggression

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harvey, H.

    1988-09-01

    In introducing this group of articles on nonoffensive defense the author notes that the prospect of nuclear disarmament in Europe is boosting ideas, which have been around for a decade, from theory to politics. This special section of articles looks at an emerging theory that may reduce reliance on nuclear weapons by bringing stability to the conventional standoff in central Europe. The idea is to rearrange conventional forces so that they can defend but not attack. Under such monikers as nonoffensive defense (the main term used in these articles), nonprovocative defense, defensive defense, reasonable sufficiency, and mutual defensive superiority, thesemore » proposals suggest that nations can restructure weapons, personnel, and strategy to assure their own military security without posing a threat to other nations. 5 refs.« less

  5. A Figure of Merit: Quantifying the Probability of a Nuclear Reactor Accident.

    PubMed

    Wellock, Thomas R

    In recent decades, probabilistic risk assessment (PRA) has become an essential tool in risk analysis and management in many industries and government agencies. The origins of PRA date to the 1975 publication of the U.S. Nuclear Regulatory Commission's (NRC) Reactor Safety Study led by MIT professor Norman Rasmussen. The "Rasmussen Report" inspired considerable political and scholarly disputes over the motives behind it and the value of its methods and numerical estimates of risk. The Report's controversies have overshadowed the deeper technical origins of risk assessment. Nuclear experts had long sought to express risk in a "figure of merit" to verify the safety of weapons and, later, civilian reactors. By the 1970s, technical advances in PRA gave the methodology the potential to serve political ends, too. The Report, it was hoped, would prove nuclear power's safety to a growing chorus of critics. Subsequent attacks on the Report's methods and numerical estimates damaged the NRC's credibility. PRA's fortunes revived when the 1979 Three Mile Island accident demonstrated PRA's potential for improving the safety of nuclear power and other technical systems. Nevertheless, the Report's controversies endure in mistrust of PRA and its experts.

  6. The Need for Cyber-Informed Engineering Expertise for Nuclear Research Reactors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, Robert Stephen

    Engineering disciplines may not currently understand or fully embrace cyber security aspects as they apply towards analysis, design, operation, and maintenance of nuclear research reactors. Research reactors include a wide range of diverse co-located facilities and designs necessary to meet specific operational research objectives. Because of the nature of research reactors (reduced thermal energy and fission product inventory), hazards and risks may not have received the same scrutiny as normally associated with power reactors. Similarly, security may not have been emphasized either. However, the lack of sound cybersecurity defenses may lead to both safety and security impacts. Risk management methodologiesmore » may not contain the foundational assumptions required to address the intelligent adversary’s capabilities in malevolent cyber attacks. Although most research reactors are old and may not have the same digital footprint as newer facilities, any digital instrument and control function must be considered as a potential attack platform that can lead to sabotage or theft of nuclear material, especially for some research reactors that store highly enriched uranium. This paper will provide a discussion about the need for cyber-informed engineering practices that include the entire engineering lifecycle. Cyber-informed engineering as referenced in this paper is the inclusion of cybersecurity aspects into the engineering process. A discussion will consider several attributes of this process evaluating the long-term goal of developing additional cyber safety basis analysis and trust principles. With a culture of free information sharing exchanges, and potentially a lack of security expertise, new risk analysis and design methodologies need to be developed to address this rapidly evolving (cyber) threatscape.« less

  7. Numerical Estimation of the Spent Fuel Ratio

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lindgren, Eric R.; Durbin, Samuel; Wilke, Jason

    Sabotage of spent nuclear fuel casks remains a concern nearly forty years after attacks against shipment casks were first analyzed and has a renewed relevance in the post-9/11 environment. A limited number of full-scale tests and supporting efforts using surrogate materials, typically depleted uranium dioxide (DUO 2 ), have been conducted in the interim to more definitively determine the source term from these postulated events. However, the validity of these large- scale results remain in question due to the lack of a defensible spent fuel ratio (SFR), defined as the amount of respirable aerosol generated by an attack on amore » mass of spent fuel compared to that of an otherwise identical surrogate. Previous attempts to define the SFR in the 1980's have resulted in estimates ranging from 0.42 to 12 and include suboptimal experimental techniques and data comparisons. Because of the large uncertainty surrounding the SFR, estimates of releases from security-related events may be unnecessarily conservative. Credible arguments exist that the SFR does not exceed a value of unity. A defensible determination of the SFR in this lower range would greatly reduce the calculated risk associated with the transport and storage of spent nuclear fuel in dry cask systems. In the present work, the shock physics codes CTH and ALE3D were used to simulate spent nuclear fuel (SNF) and DUO 2 targets impacted by a high-velocity jet at an ambient temperature condition. These preliminary results are used to illustrate an approach to estimate the respirable release fraction for each type of material and ultimately, an estimate of the SFR. This page intentionally blank« less

  8. A Path Where No Man Thought; Nuclear Winter and the End of the Arms Race

    NASA Astrophysics Data System (ADS)

    Brasseur, Guy

    In 1982, Paul Crutzen, Max Planck Institute for Chemistry, Mainz, Germany, and John Birks, University of Colorado, Boulder, published a provocative paper suggesting that the smoke from the fires triggered by potential massive nuclear explosions would generate profound changes in the chemical composition and physical state of the Earth's atmosphere. A year later, a group of five scientists, Richard Turco, Brian Toon, Tom Ackerman, Jim Pollack, and Carl Sagan, showed, on the basis of model calculations, that the Earth would cool significantly following nuclear explosions and that the climatic impacts of a nuclear war would affect not only the country attacked but also the aggressor. This group, which received the acronym of TTAPS, showed that the number of fatalities resulting from the indirect climatic perturbations could be at least as large as the number of humans directly killed by the explosions. Two of the authors of the TTAPS theory, Carl Sagan and Richard Turco, have summarized 10 years of extensive research and public controversy following the publication of the nuclear winter hypothesis. In their fascinating book they try to analyze how the concept of nuclear winter has changed the attitude of the political world, has contributed to the improvement of political relations between the two superpowers, and has initiated a revision of geopolitical and military theories.

  9. NATO (North Atlantic Treaty Organization) deterrence and defense after the INF (Intermediate-Range Nuclear Forces) treaty. Final report, June 1988-June 1989

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Garrett, S.A.

    1989-06-21

    The treaty between the Soviet Union and the United States eliminating a whole class of intermediate-range nuclear forces (INF) in Europe raises a number of questions about NATO's future ability to deter Warsaw Pact aggression. Future choices on Alliance strategy and doctrine will be influenced by a variety of factors, including the image of new thinking in Soviet security policy enunciated by General Secretary Gorbachev, changing West European opinion toward the use of nuclear weapons for NATO deterrence, the complications inherent in further nuclear and conventional arms-control negotiations, assessments of the current conventional arms balance in Europe, and ongoing questionsmore » about NATO cohesion as well as the continued coupling of American security with that of her European allies. In the post-INF environment it may well be that U.S. Navy nuclear assets will assume an increasingly important role, particularly the Tomahawk Land Attack Missile/Nuclear (TLAM/N). The TLAM/N has many attractive attributes that can be supportive of NATO deterrence of the WTO, but there are also a number of unresolved questions to be addressed concerning this particular weapons system. Modernization of NATO's land-based short-range nuclear forces (SNF), such as the Lance missile, is also seen by many as critical to the maintenance of Alliance security in the aftermath of INF.« less

  10. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, andmore » views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.« less

  11. Balanced nuclear and cytoplasmic activities of EDS1 are required for a complete plant innate immune response.

    PubMed

    García, Ana V; Blanvillain-Baufumé, Servane; Huibers, Robin P; Wiermer, Marcel; Li, Guangyong; Gobbato, Enrico; Rietz, Steffen; Parker, Jane E

    2010-07-01

    An important layer of plant innate immunity to host-adapted pathogens is conferred by intracellular nucleotide-binding/oligomerization domain-leucine rich repeat (NB-LRR) receptors recognizing specific microbial effectors. Signaling from activated receptors of the TIR (Toll/Interleukin-1 Receptor)-NB-LRR class converges on the nucleo-cytoplasmic immune regulator EDS1 (Enhanced Disease Susceptibility1). In this report we show that a receptor-stimulated increase in accumulation of nuclear EDS1 precedes or coincides with the EDS1-dependent induction and repression of defense-related genes. EDS1 is capable of nuclear transport receptor-mediated shuttling between the cytoplasm and nucleus. By enhancing EDS1 export from inside nuclei (through attachment of an additional nuclear export sequence (NES)) or conditionally releasing EDS1 to the nucleus (by fusion to a glucocorticoid receptor (GR)) in transgenic Arabidopsis we establish that the EDS1 nuclear pool is essential for resistance to biotrophic and hemi-biotrophic pathogens and for transcriptional reprogramming. Evidence points to post-transcriptional processes regulating receptor-triggered accumulation of EDS1 in nuclei. Changes in nuclear EDS1 levels become equilibrated with the cytoplasmic EDS1 pool and cytoplasmic EDS1 is needed for complete resistance and restriction of host cell death at infection sites. We propose that coordinated nuclear and cytoplasmic activities of EDS1 enable the plant to mount an appropriately balanced immune response to pathogen attack.

  12. Worldwide Report, Arms Control.

    DTIC Science & Technology

    1985-09-10

    cavity. And then they say: Listen, let us stop playing about, let us put our cards on the table; yes , we need these tests because a program to...8217 yes ’, answers on the two questions." Both opposition parties, had ini-> tially vowed to boycott the com- mittee because they believed the...nuclear attack — popularly known as Star Wars?" ’ Ail Men Women Yes , aware 81 90 73 No, not aware 19 11 27 Those who claimed awareness

  13. Israel’s Attack on Osiraq: A Model for Future Preventive Strikes?

    DTIC Science & Technology

    2004-09-01

    destroying Israel. July 28, 1980 Israeli Foreign Minister Yitzhak Shamir met with French Ambassador to Israel, Jean-Pierre Chauvet . Shamir told Chauvet ... Chauvet argued, “Acquisition of nuclear arms would be lunacy on the part of Iraq. After all, Israel’s Jewish and Arab populations are intermingled, and... caved in and a destroyed cooling pool.57 However, Perlmutter claims a specially equipped F-15 flew by the reactor after the bombing on a special

  14. DISSOLUTION OF ZIRCONIUM AND ALLOYS THEREFOR

    DOEpatents

    Swanson, J.L.

    1961-07-11

    The dissolution of zirconium cladding in a water solution of ammonium fluoride and ammonium nitrate is described. The method finds particular utility in processing spent fuel elements for nuclear reactors. The zirconium cladding is first dissolved in a water solution of ammonium fluoride and ammonium nitrate; insoluble uranium and plutonium fiuorides formed by attack of the solvent on the fuel materiai of the fuel element are then separated from the solution, and the fuel materiai is dissolved in another solution.

  15. User’s Guide for the SAS (Stand-Off Attack Simulation) Computer Model.

    DTIC Science & Technology

    1982-01-15

    A99QAXFD000-01 Albuquerque, New Mexico 87110 I1. CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE Director 15 January 1982 Defense Nuclear Aqency 13...computer model. SAS is an effective survivability and security system design tool which allows an analyst to compare the relative effectiveness of selected...mounted against other systems during uploading for dispersal or for non -emergency relocation. GLCM and LANCE must be mobilized and formed into convoys

  16. Australian Disaster Research Directory (Including Some Contributions from New Zealand). Provisional--1983.

    DTIC Science & Technology

    1983-06-01

    storm surge, cyclone,fire) * social and physical effects of nuclear attack * volcanic hazards statistics of abnormal sea levels * management of high...strengths and weaknesses of these responses * Impact of environmental change on present and future disaster strategies SOME QUESTIONNAIRE STATISTICS Some of...James Cook Univ Black , Mr R G 99 Sen Lec, Civil Eng, QIT Blackman. Dr D R 86 Sen Lec, Dept Mech Eng, V---ash Blong, Dr Russell 80 Sen Lec, Earth

  17. DOD Supply Chain: Suspect Counterfeit Electronic Parts Can Be Found on Internet Purchasing Platforms

    DTIC Science & Technology

    2012-02-01

    Parts Marine Corps’s V-22 Osprey aircraft, and the Navy’s SSN-688 Los Angeles Class nuclear-powered attack submarine . If authentic, these parts...authentication analyses. Visual inspection was performed on all evidence samples from both purchases. Different color epoxy seals were noted within both...including the ballistic missile early warning system, the Air Force’s Peacekeeper missile and B-1B aircraft, the Navy’s Trident submarine and Arleigh

  18. Response Mechanism: Blast/Fire Interactions.

    DTIC Science & Technology

    1983-11-01

    A WORK UNIT NUMBERS University of Notre Dame Notre Dame, IN L FEMA WU No. 2564H ItI. CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE Fedqral...Fires 9 Class A Fires 10 Control by Physics or Chemistry? 11 Conments 14 EXTINCTION AND IGNITION 15 Pool Fire 15 Analysis 17 Charring Solid Fire 21...post-explosion time, although its magnitude may make the efforts to control appear futile in the wake of a nuclear attack. There is considerable

  19. The roots of terrorism: A reassessment after September 11th

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pilat, Joseph F.

    2002-01-01

    The brutal terrorist attacks of September 11th, the anthrax attacks that followed and growing knowledge of al Qaeda's pursuit of nuclear, biological and chemical weapons have not only intensified concerns about terrorism but also created doubts about our understanding of terrorism. These attacks were in many ways unprecedented, and ultimately raise the question of the roots or causes of terrorism. Historically and today, there have been divergent views on this question, which reflect philosophical, religious, political and other differences. These differences are not merely academic, as they can affect our understanding of both the threat and of responses to terrorismmore » in the aftermath of September 1 1 th. Terrorism is too complex and diverse a phenomenon to speak easily of causes. But we may be able to discern the causes of specific acts. Our response to 9/11 and other acts of terrorism will be affected by our understanding of their causes, as well as by possible political requirements to address widespread perceptions of causes. If 9/11 was caused by Islamic radicalism, the near-term response must be to ensure the terrorists are defeated and pose no fiuther danger. In the longer term, education is critical. If the attacks were caused by US Middle East policies, the response should involve a review of those policies. This may or may not result in changes to policy, public diplomacy, etc. If the attacks were a backlash against globalization, the response must address the realities underlying anti-globalization sentiments. Addressing causes (real and perceived) will not in any case end terrorism, and addressing the wrong causes can be counterproductive. Actions to reduce those conditions that create support for terrorism and aid its recruitment effort are critical to any counterterrorism strategy. For this reason alone, we must do everything possible to understand the reasons terrorism may be undertaken, including the attacks of September 1 1 th. This paper will look at the question of the roots of terrorism and then look to the specific case of 9/11 and its aftermath, with a special view to the impact of globalization.« less

  20. Nuclear and radiological terrorism: continuing education article.

    PubMed

    Anderson, Peter D; Bokor, Gyula

    2013-06-01

    Terrorism involving radioactive materials includes improvised nuclear devices, radiation exposure devices, contamination of food sources, radiation dispersal devices, or an attack on a nuclear power plant or a facility/vehicle that houses radioactive materials. Ionizing radiation removes electrons from atoms and changes the valence of the electrons enabling chemical reactions with elements that normally do not occur. Ionizing radiation includes alpha rays, beta rays, gamma rays, and neutron radiation. The effects of radiation consist of stochastic and deterministic effects. Cancer is the typical example of a stochastic effect of radiation. Deterministic effects include acute radiation syndrome (ARS). The hallmarks of ARS are damage to the skin, gastrointestinal tract, hematopoietic tissue, and in severe cases the neurovascular structures. Radiation produces psychological effects in addition to physiological effects. Radioisotopes relevant to terrorism include titrium, americium 241, cesium 137, cobalt 60, iodine 131, plutonium 238, califormium 252, iridium 192, uranium 235, and strontium 90. Medications used for treating a radiation exposure include antiemetics, colony-stimulating factors, antibiotics, electrolytes, potassium iodine, and chelating agents.

  1. Making weapons, talking peace

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    York, H.F.

    The memoirs of the author traces his life from his first-year graduate studies in physics at the University of Rochester in 1942 to his present position as Director of the University of California's Institute on Global Conflict and Cooperation. The part of his life involved in making weapons extends from 1942 to 1961. During this period, he worked with E.O. Lawrence on the Manhattan Project and served as director of Livermore after it became the Atomic Energy Commission's second nuclear weapons laboratory. He also served on many government advisory boards and commissions dealing with nuclear and other weapons. In 1961,more » the combination of a heart attack and changes in administration in Washington led York too return to the University of California for the talking peace portion of his life. He has since become a public exponent of arms control and disarmament and the futility of seeking increased security through more and better nuclear weapons. York's explanation of his move from making weapons to talking peace leaves the reader with a puzzle.« less

  2. Anti-nuclear fantasies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glynn, P.

    1983-01-01

    The author critiques two recent anti-nuclear books - Indefensible Weapons by two American professors, Robert Jay Lifton and Richard Falk; and Beyond the Cold War, a collection of polemical essays by E.P. Thompson, British Marxist historian. He sees a common thread in these books of moral rejection of traditional Western policies more than a rejection of the weapons themselves. Western institutions are judged indefensible in their arrangements for genocide. Glynn finds the authors focusing their criticism on the US, while excusing the Soviet Union, because of their alienation from US politics. He feels these are examples of a specialized literaturemore » movement that lacks a clear vision of the new order it promotes, however, because it is wary of all political arrangements. Attacks on the free press and American foreign policy take on an Orwellian irony in their rejection of security facts and their emphasis on psychological ills. Criticism of this approach does not deny the threat of nuclear weapons when it points out that, so far, the political approach has prevented their use. (DCK)« less

  3. Black Holes and the Large Hadron Collider

    NASA Astrophysics Data System (ADS)

    Roy, Arunava

    2011-12-01

    The European Center for Nuclear Research or CERN's Large Hadron Collider (LHC) has caught our attention partly due to the film ``Angels and Demons.'' In the movie, an antimatter bomb attack on the Vatican is foiled by the protagonist. Perhaps just as controversial is the formation of mini black holes (BHs). Recently, the American Physical Society1 website featured an article on BH formation at the LHC.2 This article examines some aspects of mini BHs and explores the possibility of their detection at the LHC.

  4. Terrorism in the United States 1996

    DTIC Science & Technology

    1996-01-01

    nuclear nature could be employed in future attacks with devastating results on citizens, police, and emergency “first responders.” T 2 TABLE of C O N T E N...themselves as U.S. citizens and refuse to pay federal income taxes . Membership in a militia organization is not an illegal activity in the United...blank) 2 . REPORT DATE 1/1/1996 3. REPORT TYPE AND DATES COVERED Report 1/1/1996 4. TITLE AND SUBTITLE Terrorism in the United States 1996 5. FUNDING

  5. Triage for Civil Support. Using Military Medical Assets to Respond to Terrorist Attacks

    DTIC Science & Technology

    2004-01-01

    chicken pox , ma- laria, viral syndromes, and meningitis gave way to the suspicion that one or more of the pa- tients may have contracted smallpox. While...awaiting the results of an infectious disease consultation on a patient that appeared to be too ill to have chicken pox (raising the strong suspicion...Whiteman Air Force Base (home to 150 nuclear-armed ICBMs). • (April 2003) A misdiagnosis of chicken pox as smallpox at a major Nashville hospital

  6. 2005 USSOCOM Chemical, Biological, Radiological Conference and Exhibition

    DTIC Science & Technology

    2005-12-08

    Cree, Inc. 22 Signal respose to releases 12:42 12:48 12:54 13:0 13:6 13:12 13:18 -2 0 2 4 6 8 10 12 x 10-3 Processed Data for AS-B2-009-09-03-05...acrid smell and onset of nerve agent symptoms Confidential USSOCOM Scenario 3: Chemical Agent Attack • First responders don their Self -Contained...Nuclear (CBRN) detectors Smart Threads is a dynamic, easily expandable, self - configuring platform Smart Threads Integrated Radiation Sensors (STIRS

  7. A Surprise Out of Zion? Case Studies in Israel’s Decisions on Whether to Alert the United States to Preemptive and Preventive Strikes, from Suez to the Syrian Nuclear Reactor

    DTIC Science & Technology

    2015-01-01

    strike on the reactor,” which some senior U.S. officials thought would be less likely to set off a regional conflagration than an Israeli airstrike.22...confronted with what is being sold as a one-off attack can never be sure it will not spark a wider conflagration ). Of our four cases, only the Six-Day

  8. United States Seaport Security: Protection Against a Nuclear Device Attack Delivered in a Shipping Cargo Container

    DTIC Science & Technology

    2014-06-13

    exploded due to an initial fire discovered at the pier warehouse. Fragments from the blast were sent as far as Galveston ten miles away. Approximately...the 2009 attempt on Christmas Day involving Umar Farouk Abdulmutallab (the “ underwear bomber”) led to the installation of full-body scanners in nearly...States, such as the Christmas Day 2009 “ underwear bomber” and the 2010 plot to send explosive packages utilizing printer ink cartridges. Acting DHS

  9. Experimental set up for the irradiation of biological samples and nuclear track detectors with UV C

    PubMed Central

    Portu, Agustina Mariana; Rossini, Andrés Eugenio; Gadan, Mario Alberto; Bernaola, Omar Alberto; Thorp, Silvia Inés; Curotto, Paula; Pozzi, Emiliano César Cayetano; Cabrini, Rómulo Luis; Martin, Gisela Saint

    2016-01-01

    Aim In this work we present a methodology to produce an “imprint” of cells cultivated on a polycarbonate detector by exposure of the detector to UV C radiation. Background The distribution and concentration of 10B atoms in tissue samples coming from BNCT (Boron Neutron Capture Therapy) protocols can be determined through the quantification and analysis of the tracks forming its autoradiography image on a nuclear track detector. The location of boron atoms in the cell structure could be known more accurately by the simultaneous observation of the nuclear tracks and the sample image on the detector. Materials and Methods A UV C irradiator was constructed. The irradiance was measured along the lamp direction and at different distances. Melanoma cells were cultured on polycarbonate foils, incubated with borophenylalanine, irradiated with thermal neutrons and exposed to UV C radiation. The samples were chemically attacked with a KOH solution. Results A uniform irradiation field was established to expose the detector foils to UV C light. Cells could be seeded on the polycarbonate surface. Both imprints from cells and nuclear tracks were obtained after chemical etching. Conclusions It is possible to yield cellular imprints in polycarbonate. The nuclear tracks were mostly present inside the cells, indicating a preferential boron uptake. PMID:26933396

  10. Sabotage at Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Purvis, James W.

    1999-07-21

    Recently there has been a noted worldwide increase in violent actions including attempted sabotage at nuclear power plants. Several organizations, such as the International Atomic Energy Agency and the US Nuclear Regulatory Commission, have guidelines, recommendations, and formal threat- and risk-assessment processes for the protection of nuclear assets. Other examples are the former Defense Special Weapons Agency, which used a risk-assessment model to evaluate force-protection security requirements for terrorist incidents at DOD military bases. The US DOE uses a graded approach to protect its assets based on risk and vulnerability assessments. The Federal Aviation Administration and Federal Bureau of Investigationmore » conduct joint threat and vulnerability assessments on high-risk US airports. Several private companies under contract to government agencies use formal risk-assessment models and methods to identify security requirements. The purpose of this paper is to survey these methods and present an overview of all potential types of sabotage at nuclear power plants. The paper discusses emerging threats and current methods of choice for sabotage--especially vehicle bombs and chemical attacks. Potential consequences of sabotage acts, including economic and political; not just those that may result in unacceptable radiological exposure to the public, are also discussed. Applicability of risk-assessment methods and mitigation techniques are also presented.« less

  11. [Blocking of the thyroid against I-131 following a nuclear disaster].

    PubMed

    Kroizman-Sheiner, Einat; Brickner, Dov; Canfi, Ayala; Schwarzfuchs, Dan

    2005-07-01

    The Chernobyl accident, the recent terrorists' attacks and constant threats, have all once again evoked the fear of a nuclear disaster, in Israel and worldwide. Iodine-131 is a major fission product of nuclear reactors and is highly likely to be released into the atmosphere in severe nuclear disasters. The radioiodine is released as a gas, easily spreads over large areas and is easily absorbed via the respiratory system. Iodine-131 emits gamma and beta radiation in high energies, and is readily absorbed by the thyroid which is a target organ for iodine. The resulting exposure to the thyroid might be very high. A sharp increase in thyroid cancer incidence in children was observed following the Chernobyl accident. This article reviews the medical knowledge about strategies and medications aimed at minimizing the absorption of radioiodine into the thyroid. In addition to regular safety means such as sheltering, restriction of locally produced food products and relocation of the population, the best prophylaxis against thyroid exposure is overloading the gland with stable iodine (as potassium iodide), as soon as possible. Recently, the Israeli government decided to distribute Potassium Iodide tablets to the population in the vicinity of the two nuclear research centers in the country. When this treatment is contraindicated, iodine free thionamides or potassium perchlorate are suggested.

  12. Superpower nuclear minimalism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Graben, E.K.

    1992-01-01

    During the Cold War, the United States and the Soviet Union competed in building weapons -- now it seems like America and Russia are competing to get rid of them the fastest. The lengthy process of formal arms control has been replaced by exchanges of unilateral force reductions and proposals for reciprocal reductions not necessarily codified by treaty. Should superpower nuclear strategies change along with force postures President Bush has yet to make a formal pronouncement on post-Cold War American nuclear strategy, and it is uncertain if the Soviet/Russian doctrine of reasonable sufficiency formulated in the Gorbachev era actually heraldsmore » a change in strategy. Some of the provisions in the most recent round of unilateral proposals put forth by Presidents Bush and Yeltsin in January 1992 are compatible with a change in strategy. Whether such a change has actually occurred remains to be seen. With the end of the Cold War and the breakup of the Soviet Union, the strategic environment has fundamentally changed, so it would seem logical to reexamine strategy as well. There are two main schools of nuclear strategic thought: a maximalist school, mutual assured destruction (MAD) which emphasizes counterforce superiority and nuclear war- fighting capability, and a MAD-plus school, which emphasizes survivability of an assured destruction capability along with the ability to deliver small, limited nuclear attacks in the event that conflict occurs. The MAD-plus strategy is based on an attempt to conventionalize nuclear weapons which is unrealistic.« less

  13. Nuclear Forensics: Report of the AAAS/APS Working Group

    NASA Astrophysics Data System (ADS)

    Tannenbaum, Benn

    2008-04-01

    This report was produced by a Working Group of the American Physical Society's Program on Public Affairs in conjunction with the American Association for the Advancement of Science Center for Science, Technology and Security Policy. The primary purpose of this report is to provide the Congress, U.S. government agencies and other institutions involved in nuclear forensics with a clear unclassified statement of the state of the art of nuclear forensics; an assessment of its potential for preventing and identifying unattributed nuclear attacks; and identification of the policies, resources and human talent to fulfill that potential. In the course of its work, the Working Group observed that nuclear forensics was an essential part of the overall nuclear attribution process, which aims at identifying the origin of unidentified nuclear weapon material and, in the event, an unidentified nuclear explosion. A credible nuclear attribution capability and in particular nuclear forensics capability could deter essential participants in the chain of actors needed to smuggle nuclear weapon material or carry out a nuclear terrorist act and could also encourage states to better secure such materials and weapons. The Working Group also noted that nuclear forensics result would take some time to obtain and that neither internal coordination, nor international arrangements, nor the state of qualified personnel and needed equipment were currently enough to minimize the time needed to reach reliable results in an emergency such as would be caused by a nuclear detonation or the intercept of a weapon-size quantity of material. The Working Group assesses international cooperation to be crucial for forensics to work, since the material would likely come from inadequately documented foreign sources. In addition, international participation, if properly managed, could enhance the credibility of the deterrent effect of attribution. Finally the Working Group notes that the U.S. forensics capability involved a number of agencies and other groups that would have to cooperate rapidly in an emergency and that suitable exercises to ensure such cooperation were needed.

  14. The Defense Threat Reduction Agency's Technical Nuclear Forensics Research and Development Program

    NASA Astrophysics Data System (ADS)

    Franks, J.

    2015-12-01

    The Defense Threat Reduction Agency (DTRA) Technical Nuclear Forensics (TNF) Research and Development (R&D) Program's overarching goal is to design, develop, demonstrate, and transition advanced technologies and methodologies that improve the interagency operational capability to provide forensics conclusions after the detonation of a nuclear device. This goal is attained through the execution of three focus areas covering the span of the TNF process to enable strategic decision-making (attribution): Nuclear Forensic Materials Exploitation - Development of targeted technologies, methodologies and tools enabling the timely collection, analysis and interpretation of detonation materials.Prompt Nuclear Effects Exploitation - Improve ground-based capabilities to collect prompt nuclear device outputs and effects data for rapid, complementary and corroborative information.Nuclear Forensics Device Characterization - Development of a validated and verified capability to reverse model a nuclear device with high confidence from observables (e.g., prompt diagnostics, sample analysis, etc.) seen after an attack. This presentation will outline DTRA's TNF R&D strategy and current investments, with efforts focusing on: (1) introducing new technical data collection capabilities (e.g., ground-based prompt diagnostics sensor systems; innovative debris collection and analysis); (2) developing new TNF process paradigms and concepts of operations to decrease timelines and uncertainties, and increase results confidence; (3) enhanced validation and verification (V&V) of capabilities through technology evaluations and demonstrations; and (4) updated weapon output predictions to account for the modern threat environment. A key challenge to expanding these efforts to a global capability is the need for increased post-detonation TNF international cooperation, collaboration and peer reviews.

  15. Sandia technology: Engineering and science applications

    NASA Astrophysics Data System (ADS)

    Maydew, M. C.; Parrot, H.; Dale, B. C.; Floyd, H. L.; Leonard, J. A.; Parrot, L.

    1990-12-01

    This report discusses: protecting environment, safety, and health; Sandia's quality initiative; Sandia vigorously pursues technology transfer; scientific and technical education support programs; nuclear weapons development; recognizing battlefield targets with trained artificial neural networks; battlefield robotics: warfare at a distance; a spinning shell sizes up the enemy; thwarting would-be nuclear terrorists; unattended video surveillance system for nuclear facilities; making the skies safer for travelers; onboard instrumentation system to evaluate performance of stockpile bombs; keeping track with lasers; extended-life lithium batteries; a remote digital video link acquires images securely; guiding high-performance missiles with laser gyroscopes; nonvolatile memory chips for space applications; initiating weapon explosives with lasers; next-generation optoelectronics and microelectronics technology developments; chemometrics: new methods for improving chemical analysis; research team focuses ion beam to record-breaking intensities; standardizing the volt to quantum accuracy; new techniques improve robotic software development productivity; a practical laser plasma source for generating soft x-rays; exploring metal grain boundaries; massively parallel computing; modeling the amount of desiccant needed for moisture control; attacking pollution with sunshine; designing fuel-conversion catalysts with computers; extending a nuclear power plant's useful life; plasma-facing components for the International Thermonuclear Experimental Reactor.

  16. Consequences of Regional Scale Nuclear Conflicts and Acts of Individual Nuclear Terrorism

    NASA Astrophysics Data System (ADS)

    Toon, O. B.; Turco, R. P.; Robock, A.; Bardeen, C.; Oman, L.; Stenchikov, G. L.

    2006-12-01

    The number of nuclear warheads in the world has fallen by about a factor of three since its peak in 1986. However, the potential exists for numerous regional nuclear arms races, and for a significant expansion in the number of nuclear weapons states. Eight countries are known to have nuclear weapons, 2 are constructing them, and an additional 32 nations already have the fissile material needed to build weapons if they so desire. Population and economic activity worldwide are congregated to an increasing extent in "megacities", which are ideal targets for nuclear weapons. We find that low yield weapons, which new nuclear powers are likely to construct, can produce 100 times as many fatalities and 100 times as much smoke from fires per kt yield as high-yield weapons, if they are targeted at city centers. A single low-yield nuclear detonation in an urban center could lead to more fatalities, in some cases by orders of magnitude, than have occurred in major historical conflicts. A regional war between the smallest current nuclear states involving 100 15-kt explosions (less than 0.1% of the explosive yield of the current global nuclear arsenal) could produce direct fatalities comparable to all of those worldwide in World War II (WW-II), or to those once estimated for a "counterforce" nuclear war between the superpowers. Portions of megacities attacked with nuclear devices or exposed to fallout of long-lived isotopes, through armed conflict or terrorism, would likely be abandoned indefinitely, with severe national and international implications. Smoke from urban firestorms in a regional war might induce significant climatic and ozone anomalies on global scales. While there are many uncertainties in the issues we discuss here, the major uncertainties are the type and scale of conflict that might occur. Each of these potential hazards deserves careful analysis by governments worldwide advised by a broad section of the world scientific community, as well as widespread debate.

  17. Roots of terrorism: a reassessment after September 11th

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pilat, Joseph F.

    2002-01-01

    The brutal terrorist attacks of September 11th, the anthrax attacks that followed and growing knowledge of al Qaeda's pursuit of nuclear, biological and chemical weapons have not only intensified concerns about terrorism but also created doubts about our understanding of terrorism. These attacks were in many ways unprecedented, and ultimately raise the question of the roots or causes of terrorism. Historically and today, there have been divergent views on this question, which reflect philosophical, religious, political, sociological and other differences. These differences are not merely academic, as they can affect our understanding of both the threat and of responses tomore » terrorism in the aftermath of September 11th, Terrorism is too complex and diverse a phenomenon to speak easily of causes. But we may be able to discern the causes of specific acts. Our response to 9/11 and other acts of terrorism will be affected by our understanding of their causes. If 9/11 was caused by US Middle East policies, the response must involve a review of these policies. If it is a backlash against globalization, the response must address the realities underlying anti-globalization sentiments. Addressing causes will not in any case end terrorism, and addressing the wrong causes will be counterproductive. Actions to reduce those conditions that create support for terrorism and aid its recruitment, which need to be clearly identified, are critical in any counterterrorism strategy. So we must understand the reasons for terrorism and, in particular, for the attacks of September 11th.T his paper will look at the question of the roots of terrorism and then look to the specific case of 911 and its aftermath, with a special view to the impact of globalization.« less

  18. Special Operations Soldier With Cardiac Family History: Use of CCTA and Protein Biomarker Testing to Detect Risk of Heart Attack From Noncalcified Plaque.

    PubMed

    Singh, Millee; Kroman, Anne; Singh, Juile; Tariq, Hassan; Amin, Shetal; Morales-Pablon, Cesar Alberto; Cahill, Kristina Vanessa; Harrison, Eric Edward

    2015-01-01

    We sought to characterize the risk of a heart attack in a 48-year-old asymptomatic US Special Operations Command (SOCOM) Soldier without known coronary artery disease (CAD). CAD continues to be a leading cause of morbidity and mortality among most age groups in the United States. Much research is dedicated to establishing new techniques to predict myocardial infarction (MI). Coronary computed tomography (CT) angiography, also known as CCTA, along with 7-protein serum biomarker risk assessment was performed for risk evaluation. A 48-year-old SOCOM Soldier with a family history of heart disease had skeletal chest pain from war injuries and a 5-fold higher risk of heart attack over the next 5 years on the basis of protein markers. A nonobstructive left anterior descending coronary artery (LAD) plaque with a lipid-rich core and a thin fibrous cap (i.e., vulnerable plaque) was detected by CCTA. The patient was warned about his risk and prescribed four cardiac medications and scheduled for angioplasty even though he fell outside the guidelines by not having a severe obstructive blockage. Four days later, unfortunately, he had a heart attack before starting his medications and before angioplasty. CCTA with biomarker testing may have an important role in predicating acute coronary syndrome (ACS) in Special Operations Forces (SOF) Soldiers with at least one risk factor. Conventional stress testing and nuclear scanning would not detect non-flow-limiting vulnerable plaques in vulnerable patients. In order to collect more data, the PROTECT Registry has been started to evaluate asymptomatic Soldiers with at least one risk factor referred to the clinic by military physicians. 2015.

  19. Nonproliferation, arms control and disarmament and extended deterrence in the new security environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pilat, Joseph F

    2009-01-01

    With the end of the Cold War, in a dramatically changed security environment, the advances in nonnuclear strategic capabilities along with reduced numbers and roles for nuclear forces has altered the calculus of deterrence and defense, at least for the United States. For many, this opened up a realistic possibility of a nuclear-free world. It soon became clear that the initial post-Cold War hopes were exaggerated. The world did change fundamentally, but it did not become more secure and stable. In place of the old Soviet threat, there has been growing concern about proliferation and terrorism involving nuclear and othermore » weapons of mass destruction (WMD), regional conflicts, global instability and increasingly serious new and emerging threats, including cyber attacks and attacks on satellites. For the United States at least, in this emerging environment, the political rationales for nuclear weapons, from deterrence to reassurance to alliance management, are changing and less central than during the Cold War to the security of the United States, its friends and allies. Nuclear weapons remain important for the US, but for a far more limited set of roles and missions. As the Perry-Schlesinger Commission report reveals, there is a domestic US consensus on nuclear policy and posture at the highest level and for the near term, including the continued role of nuclear arms in deterring WMD use and in reassuring allies. Although the value of nuclear weapons has declined for the United States, the value of these weapons for Russia, China and so-called 'rogue' states is seen to be rising. The nuclear logic of NATO during Cold War - the need for nuclear weapons to counter vastly superior conventional capabilities of the Soviet Union and the Warsaw Pact - is today heard from Russians and even some proliferants. Moreover, these weapons present a way for rogues to achieve regional hegemony and possibly to deter interventions by the United States or others. While the vision of a nuclear-free world is powerful, both existing nuclear powers and proliferators are unlikely to forego nuclear weapons entirely in a world that is dangerous and uncertain. And the emerging world would not necessarily be more secure and stable without nuclear weapons. Even if nuclear weapons were given up by the United States and other nuclear-weapon states, there would continue to be concerns about the proliferation of nuclear, chemical and biological weapons, which would not disappear and could worsen. WMD terrorism would remain a concern that was largely unaffected by US and other nuclear-weapon decisions. Conventional capabilities would not disappear and the prospects for warfare could rise. In addition, new problems could arise if rogue states or other non-status-quo powers attempted to take advantage of moves toward disarmament, while friends and allies who are not reassured as in the past could reconsider their options if deterrence declined. To address these challenges, non- and counter-proliferation and counterterrorismincluding defenses and consequence management-are priorities, especially in light of an anticipated 'renaissance' in civil nuclear power. The current agenda of the United States and others includes efforts to: (1) Strengthen International Atomic Energy Agency (IAEA) and its safeguards system; (2) Strengthen export controls, especially for sensitive technologies, by limiting the development of reprocessing and enrichment technologies and by requiring the Additional Protocol as a condition of supply; (3) Establish a reliable supply regime, including the possibility of multilateral or multinational ownership of fuel cycle facilities, as a means to promote nuclear energy without increasing the risks of proliferation or terrorism; (4) Implement effectively UN Security Council Resolution 1540; and (5) Strengthen and institutionalize the Proliferation Security Initiative and the Global Initiative to Combat Nuclear Terrorism. These and other activities are important in themselves, and are essential to maintaining and strengthening the Nonproliferation Treaty (NPT) bargain by bolstering two of its pillars - nonproliferation and peaceful nuclear energy cooperation. There is no alternative, and little prospect for a better deal.« less

  20. Fungal Biodegradative Oxidants in Lignocellulose: Fluorescence Mapping and Correlation With Gene Expression

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hammel, Kenneth E.; Ralph, John; Hunt, Christopher G.

    This work focused on new methods for the detection of oxidation in natural substrates during the deconstruction of lignocellulose by microoganisms. Oxidation was the focus because all known biological systems that degrade lignin are oxidative. The detection methods involved the used of (a) micrometer-scale beads carrying a fluorescent dye that is sensitive to oxidation, (b) 13C-labeled synthetic lignins whose breakdown products can be assessed using mass spectrometry and nuclear magnetic resonance spectroscopy, and (c) a fluorometric stain that is highly sensitive to incipient oxidation during microbial attack. The results showed (a) that one white rot fungus, Phanerochaete chrysosporium, produces diffusiblemore » oxidants on wood, and that the onset of oxidation is coincident with the marked up-regulation of genes that encode ligninolytic peroxidases and auxiliary oxidative enzymes; (b) that a more selectively ligninolytic white rot fungus, Ceriporiopsis subvermispora, produces a highly diastereoselective oxidative system for attack on lignin; (c) that a brown rot fungus, Serpula lacrymans, uses extracellular hydroquinone metabolites to drive the production of lignocellulose-oxidizing free radicals; (d) that both white rot and brown rot fungi produce highly diffusible mild oxidants that modify lignocellulose at the earliest stage of substrate deconstruction; and (e) that lignin degradation in a tropical soil is not inhibited as much as expected during periods of flooding-induced hypoxia, which indicates that unknown mechanisms for attack on lignin remain to be discovered.« less

  1. A Methodology for Examining Collateral Effects on Military Operations during a Chemical, Biological, Radiological, and/or Nuclear Attack - Operational Effectiveness Loss Multiplier (OELM)

    DTIC Science & Technology

    2015-04-01

    Operational Effectiveness Loss Multiplier (OELM) Deena S. Disraelly G. James Herrera Margaret H. Katz Jessica L. Knight Lucas A. LaViolet Terri J . Walsh...Multiplier (OELM) Deena S. Disraelly G. James Herrera Margaret H. Katz Jessica L. Knight Lucas A. LaViolet Terri J . Walsh Robert A. Zirkle I N...ELEMENT NO(S). 6. AUTHOR(S) 5d. PROJECT NO. Deena S. Disraelly, G. James Herrera, Margaret H. Katz, Jessica L. Knight, Lucas A. LaViolet, Terri J

  2. A Methodology for Examining Collateral Effects on Military Operations during a Chemical, Biological, Radiological, and/or Nuclear Attack-Operational Effectiveness Loss Multiplier (OELM)

    DTIC Science & Technology

    2015-04-01

    Operational Effectiveness Loss Multiplier (OELM) Deena S. Disraelly G. James Herrera Margaret H. Katz Jessica L. Knight Lucas A. LaViolet Terri J . Walsh...Multiplier (OELM) Deena S. Disraelly G. James Herrera Margaret H. Katz Jessica L. Knight Lucas A. LaViolet Terri J . Walsh Robert A. Zirkle I N...James Herrera, Margaret H. Katz, Jessica L. Knight, Lucas A. LaViolet, Terri J . Walsh, and Robert A. Zirkle 5e. TASK NO. DC-6-3250 5f. WORK UNIT

  3. A better outlook for schizophrenics living in extended families.

    PubMed

    El-Islam, E F

    1979-10-01

    Cases of schizophrenia and schizophreniform attacks living in extended families have been compared to cases with similar diagnoses in nuclear families. Both diagnostic groups living in extended families presented earlier: they had lower rates of withdrawal symptoms and higher rates of behavioural disturbances and subjective suffering. Inter-generational conflict was a significantly more common precipitating factor in patients living in extended families; this was therapeutically utilized to induce family support. Patients from extended families had a lower tendency to deteriorate into with drawn, affectively blunted residual states.

  4. The Warsaw Pact Short-Warning Nuclear Attack: How Viable an Option?

    DTIC Science & Technology

    1979-05-01

    yion in&vc err mi Iiar-j districts urhhvearmirked for north ern -.nd centr:al ~nc mlom.: n pls soviot, East Germa -- n , Czcchoslo%-akian and Pclii units...special- ists in 5-ill time tazn-lo%-, ent and several interr-tionallv kn7ca-. n inistitutions in business. There are as mzany ways to leck at the...o..W *0e - ~~~~Breerlavmnoo, tsmn: po n , Garstedt( y NETHERLANDS ~FEDERAL~ %,.JPLN I 2 EP BLI * GERMAN -5?’ ~52- GEMM A NY DEMOCRATIC REPUBLIC Bonn@®O

  5. Blast/Fire Interactions, Asilomar Conference, May 1980,

    DTIC Science & Technology

    1981-02-01

    0 0 0 26 Veg. oil mills, n.e.c. 18 0 18 0 27 Animal fats and oils 29 0 28 0 28 Roasted coffee 24 5 24 0 29 Cooking oils 0 4 0 0 30 Manufactured ice 0...and fire effects preclude any reliable estimate of the incendiary outcome of a nuclear attack on the United States. As such, these uncertainties are...guidance should be developed, at least in preliminary form during the upcoming federal fiscal year (i.e., FY81). v A comparison of the recommended

  6. Recommendations to the NRC (Nuclear Regulatory Commission) for Review Criteria for Alternative Methods of Low-Level Radioactive Waste Disposal. Task 2B. Earth-Mounded Concrete Bunkers

    DTIC Science & Technology

    1988-01-01

    of environmental factors that attack and degrade drain performance, and methods that may be used to minimize degradation and correct deficiencies of... risks to site per- sonnel or to public health and safety. 1.3 Description of EMCB Major components of an EMCB are shown in Figure 1.1. An EMCB consists of...differential temperature effects that can occur during the design lifetime of the structure. Severe environmental loads would consist of: W - Loads

  7. ''Whither Deterrence?'' A Brief Synopsis May, 2002

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Poppe, C; Vergino, E; Barker, R

    To most audiences, deterrence has been interconnected with nuclear weapons whose purpose had been to deter a Soviet attack. But, the Soviet Union has been gone for almost a decade. President George W. Bush has stated that Russia is not an enemy of the US and the numbers of nuclear weapons can be dramatically reduced. It is important to note that deterrence has always transcended nuclear weapons. The US' first line of deterrence has been its formidable conventional warfare capability, designed to prevent conflict and win wars if necessary. The role of nuclear weapons has been to deter the,use ofmore » nuclear weapons and other weapons of mass destruction against U.S. interests during the conduct of conventional warfare and to ensure our ability to inflict massive destruction on any who would use nuclear weapons, or other weapons of mass destruction, against us. With regard to the Soviet Union, the threat of the use of nuclear weapons was a critical component of our deterrent to prevent massive Soviet conventional attack against our allies in Europe. However, the events of September 11, 2001 make clear that we have not convinced all who seek to harm us that we will be able to respond in a manner to make them wish they had not even tried. The September 11 attacks, as well as other past conflicts, do not mean that deterrence has failed-it remains effective against the threats for which it was designed. We have known there are other threats for which we did not have a credible deterrent. The challenge is to sustain deterrence against the classic threats as they evolve in technical sophistication while remaining alert to the need to evaluate continuously our ability to deter previously unforeseen challenges. How then should we be looking at deterrence as we consider fifteen or so years in the future, say to about 2015? What will be the role of nuclear weapons and other instruments of mass destruction in the future? What should the US be doing to prepare for the future? In this study, we present four futures as a tool for planners who must think ahead fifteen years or more, rather than a prediction of the future. None of the four futures will emerge in just the way we have described. Fifteen years from now, some mix of these futures is more likely, or perhaps we will see a trend towards one of the futures, but with the possibility that any of the other three could appear, perhaps quite swiftly. Any future will undoubtedly contain its own kind of unpleasant surprises and, in contrast to the Cold War; the possession of enormous nuclear-response and conventional-response capability may not be sufficient to deter these from happening. However, there are other tools that the US must include as part of its strategy and security policy in addition to deterrence, specifically dissuasion, defense, destruction, and assurance. Rather than rely on the Cold-War concept of deterrence, future security policy should be built upon the appropriate mix of these elements as a way to steer us toward a more favorable future, while ensuring that we are prepared for the kinds of surprises associated with far less favorable futures. In this study, we have defined three unfavorable futures to be avoided, and one future that represents, we believe, a more desirable global situation than the first three, but still not entirely benign. Our security policy should be defined to avoid or prevent the first three, which we have entitled ''Nuclear Giants, Global Terror'', and ''Regional Nuclear Tension and Use'', and steer us toward a more favorable future, ''Dynamic Cooperation''. We have examined the implications for both policy and military capability that are posed by these different futures. The result often raises more questions than we are able to answer without additional study-however, our primary purpose was to clarify the issues, to identify. what we believe we know, what we don't know, and where more study and effort are needed. Nevertheless, in preparing for unfavorable futures, we must also identify and plan the future we want. This study emphasizes that a desirable future in 2015 would be characterized by peaceful resolution of conflict, growing worldwide economic prosperity, an effective non-proliferation regime, the ability of the United States to control its own destiny without conflict, and expansion of political and economic freedom. Security policies, even in the face of unpleasant futures, should be crafted so as enhance, rather than diminish, these desired goals.« less

  8. Cyber Norms for Civilian Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Spirito, Christopher

    The international community agrees that the safe operation of civilian nuclear infrastructure is in every population’s best interest. One challenge each government must address is defining and agreeing to a set of acceptable norms of behavior in cyberspace as they relate to these facilities. The introduction of digital systems and networking technologies into these environments has led to the possibility that control and supporting computer systems are now accessible and exploitable, especially where interconnections to global information and communications technology (ICT) networks exist. The need for norms of behavior in cyberspace includes what is expected of system architects and cybermore » defenders as well as adversaries who should abide by rules of engagement even while conducting acts that violate national and international laws. The goal of this paper is to offer three behavioral cyber norms to improve the overall security of the ICT and Operational Technology (OT) networks and systems that underlie the operations of nuclear facilities. These norms of behavior will be specifically defined with the goals of reducing the threats associated to the theft of nuclear materials, accidental release of radiation and sabotage of nuclear processes. These norms would also include instances where an unwitting attacker or intelligence collection entity inadvertently makes their way into a nuclear facility network or system and can recognize they are in a protected zone and an approach to ensuring that these zones are not exploitable by bad actors to place their sensitive cyber effect delivery systems.« less

  9. FROM THE HISTORY OF PHYSICS: The nuclear shield in the 'thirty-year war' of physicists against ignorant criticism of modern physical theories

    NASA Astrophysics Data System (ADS)

    Vizgin, Vladimir P.

    1999-12-01

    This article deals with the almost 'thirty-year war' led by physicists against the authorities' incompetent philosophical and ideological interference with science. The 'war' is shown to have been related to the history of Soviet nuclear weapons. Theoretical milestones of 20th century physics, to wit, theory of relativity and quantum mechanics, suffered endless 'attacks on philosophical grounds'. The theories were proclaimed idealistic as well as unduly abstract and out of touch with practice; their authors and followers were labelled 'physical idealists', and later, in the 1940s and 1950s, even 'cosmopolitans without kith or kin'. Meanwhile, quantum and relativistic theories, as is widely known, had become the basis of nuclear physics and of the means of studying the atomic nucleus (charged particle accelerators, for instance). The two theories thus served, to a great extent, as a basis for both peaceful and military uses of nuclear energy, made possible by the discovery of uranium nuclear fission under the action of neutrons. In the first part, the article recounts how prominent physicists led the way to resisting philosophical and ideological pressure and standing up for relativity, quantum theories and nuclear physics, thus enabling the launch of the atomic project. The second part contains extensive material proving the point that physicists effectively used the 'nuclear shield' in the 1940s and 1950s against the 'philosophical-cosmopolitan' pressure, indeed saving physics from a tragic fate as that of biology at the Academy of Agricultural Sciences (VASKhNIL) session in 1948.

  10. Corrosion-induced microstructural developments in 316 stainless steel during exposure to molten Li 2BeF 4(FLiBe) salt

    DOE PAGES

    Zheng, Guiqiu; He, Lingfeng; Carpenter, David; ...

    2016-10-12

    The microstructural evaluation and characterization of 316 stainless steel samples that were tested in molten Li 2BeF 4 (FLiBe) salt were investigated in this study for evaluating its performance in high-temperature molten fluoride salts. Recently, 316 stainless steel and FLiBe salt are being actively considered as the main structural alloy and primary coolant of fluoride salt-cooled high-temperature reactor (FHR), a leading nuclear reactor concept for the next generation nuclear plants (NGNP). In support of the materials development for the FHR, high-temperature corrosion tests of 316 stainless steel in molten FLiBe salt at 700°C have been conducted in both bare graphitemore » crucibles and 316 stainless steel-lined crucibles in an inert atmosphere for up to 3000 hours. The microstructure of the tested samples was comprehensively characterized using scanning electron microscopy (SEM) in conjunction with energy dispersive x-ray spectroscopy (EDS) and electron backscatter diffraction (EBSD), and scanning transmission electron microscopy (STEM) with EDS. In addition to the noticeable intergranular corrosion attack on surface, the corrosion in terms of the Cr depletion along high angle grain boundaries (15-180º) extended to 22µm in depth after 3000-hour exposure to molten FLiBe salt in graphite crucible. The coherent Σ3 grain boundary appeared high resistance to the Cr depletion. The substantial Cr depletion from the near-to-surface layer induced phase transformation from γ-martensite to α-ferrite phase (FeNi x) during corrosion at 700ºC. Furthermore, the presence of graphite in the molten salt doubled the corrosion attack depth and led to the formation of round Mo2C, hexagonal Cr 7C 3 and needle-like Al 4C 3 phase within the alloy as deep as 50 µm after 3000-hour corrosion testing. Based on the microstructural analysis, the corrosion mechanisms of 316 stainless steel in molten FLiBe salt in different corrosion crucibles were illuminated through schematic diagrams. Additionally, a thermal diffusion controlled corrosion model was developed and validated by experimental data for predicting the long-term corrosion attack depth.« less

  11. Corrosion-induced microstructural developments in 316 stainless steel during exposure to molten Li 2BeF 4(FLiBe) salt

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zheng, Guiqiu; He, Lingfeng; Carpenter, David

    The microstructural evaluation and characterization of 316 stainless steel samples that were tested in molten Li 2BeF 4 (FLiBe) salt were investigated in this study for evaluating its performance in high-temperature molten fluoride salts. Recently, 316 stainless steel and FLiBe salt are being actively considered as the main structural alloy and primary coolant of fluoride salt-cooled high-temperature reactor (FHR), a leading nuclear reactor concept for the next generation nuclear plants (NGNP). In support of the materials development for the FHR, high-temperature corrosion tests of 316 stainless steel in molten FLiBe salt at 700°C have been conducted in both bare graphitemore » crucibles and 316 stainless steel-lined crucibles in an inert atmosphere for up to 3000 hours. The microstructure of the tested samples was comprehensively characterized using scanning electron microscopy (SEM) in conjunction with energy dispersive x-ray spectroscopy (EDS) and electron backscatter diffraction (EBSD), and scanning transmission electron microscopy (STEM) with EDS. In addition to the noticeable intergranular corrosion attack on surface, the corrosion in terms of the Cr depletion along high angle grain boundaries (15-180º) extended to 22µm in depth after 3000-hour exposure to molten FLiBe salt in graphite crucible. The coherent Σ3 grain boundary appeared high resistance to the Cr depletion. The substantial Cr depletion from the near-to-surface layer induced phase transformation from γ-martensite to α-ferrite phase (FeNi x) during corrosion at 700ºC. Furthermore, the presence of graphite in the molten salt doubled the corrosion attack depth and led to the formation of round Mo2C, hexagonal Cr 7C 3 and needle-like Al 4C 3 phase within the alloy as deep as 50 µm after 3000-hour corrosion testing. Based on the microstructural analysis, the corrosion mechanisms of 316 stainless steel in molten FLiBe salt in different corrosion crucibles were illuminated through schematic diagrams. Additionally, a thermal diffusion controlled corrosion model was developed and validated by experimental data for predicting the long-term corrosion attack depth.« less

  12. Yield Determination of Underground and Near Surface Explosions

    NASA Astrophysics Data System (ADS)

    Pasyanos, M.

    2015-12-01

    As seismic coverage of the earth's surface continues to improve, we are faced with signals from a wide variety of explosions from various sources ranging from oil train and ordnance explosions to military and terrorist attacks, as well as underground nuclear tests. We present on a method for determining the yield of underground and near surface explosions, which should be applicable for many of these. We first review the regional envelope method that was developed for underground explosions (Pasyanos et al., 2012) and more recently modified for near surface explosions (Pasyanos and Ford, 2015). The technique models the waveform envelope templates as a product of source, propagation (geometrical spreading and attenuation), and site terms, while near surface explosions include an additional surface effect. Yields and depths are determined by comparing the observed envelopes to the templates and minimizing the misfit. We then apply the method to nuclear and chemical explosions for a range of yields, depths, and distances. We will review some results from previous work, and show new examples from ordnance explosions in Scandinavia, nuclear explosions in Eurasia, and chemical explosions in Nevada associated with the Source Physics Experiments (SPE).

  13. Development of the Updated Environmental Protection Agency Manual of Protective Action Guides (PAGS) and Protective Actions for Nuclear Incidents

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carter, L.M.

    2008-07-01

    As a student intern with the United States Environmental Protection Agency (EPA) Headquarters, the author was trained in the National Response Plan (NRP) and assisted in the editing of the new (unpublished) EPA Protective Action Guides (PAGs) [1] which has been revised in light of the perceived post 9/11 potential for 'Dirty Bomb' and 'Improvised Nuclear Device' attacks on civilian areas. Technical aspects and the public policy aspects of developing the new guides are discussed. Early Phase initial responses discussed include: Notification of state and/or local authorities, immediate evacuation/sheltering prior to release information or measurements, monitoring of releases and exposuremore » rate measurements, estimation of dose consequences, implementation of protective actions in other areas. The new PAG clarifies the use of 1992 PAGs [2] for incidents other than nuclear power plant accidents, lowers projected thyroid dose for potassium iodine (KI), provides drinking water guidance, includes guidance for long-term site restoration, and updates dosimetry from ICRP 26 to ICRP 60. (authors)« less

  14. Correlation of single mode fiber fabrication factors and radiation response

    NASA Astrophysics Data System (ADS)

    Friebele, E. J.

    1992-02-01

    Fiber optic transmission systems, because of their extraordinary channel capacity and decreasing cost, are the preferred terrestrial transmission media of the nation's long distance, inter-city telecommunications infrastructure. Since the commercial telephone network forms the foundation for emergency communication in the event of a national crisis or emergency, additional requirements are placed on the fibers and components of this system. The network must remain operational in the face of such threats as loss of commercial power, disruption by natural causes, violation of physical security, and exposure to the effects of nuclear weapons, including electromagnetic pulse (EMP) and ionizing radiation from the delayed gamma component and fallout. The most stressing environment for the fiber consists of fallout subsequent to a nuclear attack since the long lengths of fiber can be potentially exposed to high total doses. The susceptibility of some types of commercially available fiber optic cable to optical darkening (and hence increased signal loss and bit error rate) from exposure to ionizing radiation raises serious questions about the survivability of such systems in the reconstitution phase of a nuclear conflict.

  15. Providing security assurance in line with national DBT assumptions

    NASA Astrophysics Data System (ADS)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the field of physical and cyber protection. These national regulations have to be met later on by I&C platform suppliers, electrical systems suppliers, system integrators and turn-key providers.

  16. Evaluation of alloy 690 process pot at the contact with borosilicate melt pool during vitrification of high-level nuclear waste

    NASA Astrophysics Data System (ADS)

    Sengupta, Pranesh; Kaushik, C. P.; Kale, G. B.; Das, D.; Raj, K.; Sharma, B. P.

    2009-08-01

    Understanding the material behaviour under service conditions is essential to enhance the life span of alloy 690 process pot used in vitrification of high-level nuclear waste. During vitrification process, interaction of alloy 690 with borosilicate melt takes place for substantial time period. Present experimental studies show that such interactions may result in Cr carbide precipitation along grain boundaries, Cr depletion in austenitic matrix and intergranular attack close to alloy 690/borosilicate melt pool interfaces. Widths of Cr depleted zone within alloy 690 is found to follow kinetics of the type x = 10.9 × 10 -6 + 1 × 10 -8t1/2 m. Based on the experimental results it is recommended that compositional modification of alloy 690 process pot adjacent to borosilicate melt pool need to be considered seriously for any efforts towards reduction and/or prevention of process pot failures.

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scribner, R.A.

    Sea-launched cruise missiles (SLCMs) present some particularly striking problems for both national security and arms control. These small, dual-purpose, difficult to detect weapons present some formidable challenges for verification in any scheme that attempts to limit rather than eliminate them. Conventionally armed SLCMs offer to the navies of both superpowers important offensive and defensive capabilities. Nuclear armed, long-range, land-attack SLCMs, on the other hand, seem to pose destabilizing threats and otherwise have questionable value, despite strong US support for extensive deployment of them. If these weapons are not constrained, their deployment could circumvent gains which might be made in agreementsmore » directly reducing of strategic nuclear weapons. This paper reviews the technology and planned deployments of SLCMs, the verification schemes which have been discussed and are being investigated to try to deal with the problem, and examines the proposed need for and possible uses of SLCMs. It presents an overview of the problem technically, militarily, and politically.« less

  18. Localized corrosion of 316L stainless steel in tritiated water containing aggressive radiolytic and decomposition products at different temperatures

    NASA Astrophysics Data System (ADS)

    Bellanger, G.

    2008-02-01

    Tritium is one of the more important radionuclides used in nuclear industry as plutonium and uranium. The tritium in tritiated water always causes difficulties in nuclear installations, including equipment corrosion. Moreover, with tritiated water there are, in addition, the radiolytic and decomposition products such as hydrogen peroxide formed during decay, chloride ions produced by degradation of organic seals and oils used for tightness and pumping, and acid pH produced by excitation of nitrogen in air by the β - particle. Highly concentrated tritiated water releases energy and its temperature is about 80 °C, moreover heating is necessary in the tritium processes. These conditions highly facilitate the corrosion of stainless steels by pitting and crevice attack. Corrosion tests were performed by electrochemical analysis methods and by visual inspection of the surface of stainless steel.

  19. Psychometric and demographic predictors of the perceived risk of terrorist threats and the willingness to pay for terrorism risk management programs.

    PubMed

    Mumpower, Jeryl L; Shi, Liu; Stoutenborough, James W; Vedlitz, Arnold

    2013-10-01

    A 2009 national telephone survey of 924 U.S. adults assessed perceptions of terrorism and homeland security issues. Respondents rated severity of effects, level of understanding, number affected, and likelihood of four terrorist threats: poisoned water supply; explosion of a small nuclear device in a major U.S. city; an airplane attack similar to 9/11; and explosion of a bomb in a building, train, subway, or highway. Respondents rated perceived risk and willingness to pay (WTP) for dealing with each threat. Demographic, attitudinal, and party affiliation data were collected. Respondents rated bomb as highest in perceived risk but gave the highest WTP ratings to nuclear device. For both perceived risk and WTP, psychometric variables were far stronger predictors than were demographic ones. OLS regression analyses using both types of variables to predict perceived risk found only two significant demographic predictors for any threat--Democrat (a negative predictor for bomb) and white male (a significant positive predictor for airline attack). In contrast, among psychometric variables, severity, number affected, and likelihood were predictors of all four threats and level of understanding was a predictor for one. For WTP, education was a negative predictor for three threats; no other demographic variables were significant predictors for any threat. Among psychometric variables, perceived risk and number affected were positive predictors of WTP for all four threats; severity and likelihood were predictors for three; level of understanding was a significant predictor for two. © 2013 Society for Risk Analysis.

  20. On shaky ground - A study of security vulnerabilities in control protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Byres, E. J.; Huffman, D.; Kube, N.

    2006-07-01

    The recent introduction of information technologies such as Ethernet R into nuclear industry control devices has resulted in significantly less isolation from the outside world. This raises the question of whether these systems could be attacked by malware, network hackers or professional criminals to cause disruption to critical operations in a manner similar to the impacts now felt in the business world. To help answer this question, a study was undertaken to test a representative control protocol to determine if it had vulnerabilities that could be exploited. A framework was created in which a test could express a large numbermore » of test cases in very compact formal language. This in turn, allowed for the economical automation of both the generation of selectively malformed protocol traffic and the measurement of device under test's (DUT) behavior in response to this traffic. Approximately 5000 protocol conformance tests were run against two major brands of industrial controller. More than 60 categories of errors were discovered, the majority of which were in the form of incorrect error responses to malformed traffic. Several malformed packets however, caused the device to respond or communicate in inappropriate ways. These would be relatively simple for an attacker to inject into a system and could result in the plant operator losing complete view or control of the control device. Based on this relatively small set of devices, we believe that the nuclear industry urgently needs to adopt better security robustness testing of control devices as standard practice. (authors)« less

  1. How to communicate with the public about chemical, biological, radiological, or nuclear terrorism: a systematic review of the literature.

    PubMed

    Rubin, G James; Chowdhury, Alexander K; Amlôt, Richard

    2012-12-01

    A deliberate attack involving chemical, biological, radiological, or nuclear (CBRN) material has the potential to cause substantial fear among the public. This presents problems for communicators, who will need to provide information quickly after an attack while ensuring that their messages are easily understood and likely to be attended to by members of the public. Identifying in advance what people would want to know, where they would get information from, and how messages should be presented might allow communicators to ensure that their messages have the best chance of having their desired effect. In this review, we identified all peer-reviewed studies that have assessed communication strategies or information needs using hypothetical CBRN scenarios or in actual CBRN incidents. We identified 33 relevant studies. Their results support existing psychological models of why people engage in health protective behaviors, with information about the severity of the incident, the likelihood of being exposed, the efficacy and costs or risks of recommended behaviors, and the ability of individuals to perform recommended behaviors being sought by the public. Trust plays a crucial role in ensuring that people attend to messages. Finally, while a large variety of spokespeople and sources were identified as being turned to in the event of an incident, the use of multiple information sources was also common, affirming the importance of communicating a consistent message through multiple channels. Further research is required to extend these predominantly US-based findings to other countries and to confirm the findings of research using hypothetical scenarios.

  2. Medical countermeasures for unwanted CBRN exposures: part II radiological and nuclear threats with review of recent countermeasure patents

    PubMed Central

    Singh, Vijay K.; Romaine, Patricia L.P.; Newman, Victoria L.; Seed, Thomas M.

    2016-01-01

    ABSTRACT Introduction: The global threat of a chemical, biological, radiological, or nuclear (CBRN) disaster is an important priority for all government agencies involved in domestic security and public health preparedness. Radiological/nuclear (RN) attacks or accidents have become a larger focus of the United States Food and Drug administration (US FDA) over time because of their increased likeliness. Clinical signs and symptoms of a developing acute radiation syndrome (ARS) are grouped into three sub-syndromes named for the dominant organ system affected, namely the hematopoietic (H-ARS), gastrointestinal (GI-ARS), and neurovascular systems. The availability of safe and effective countermeasures against radiological/nuclear threats currently represents a significant unmet medical need. Areas covered: This article reviews the development of RN threat medical countermeasures and highlights those specific countermeasures that have been recently patented and approved following the FDA Animal Rule. Patents for such agents from 2015 have been presented. Expert opinion: Two granulocyte colony-stimulating factor (G-CSF)-based radiation countermeasures (Neupogen® (Amgen, Thousand Oaks, CA) and Neulasta® (Amgen, Thousand Oaks, CA)) have recently been approved by the FDA for treatment of H-ARS and both these agents are radiomitigators, used after radiation exposure. To date, there are no FDA-approved radioprotectors for ARS. PMID:27610458

  3. A Short Assessment of Select Remediation Issues at the Russian Research Center-Kurchatov Institute, Moscow, Russia

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gephart, Roy E.

    At the invitation of the National Academies, Roy Gephart traveled to Russia with an eight-member U.S. team during June, 2008 to participate in a workshop hosted by the National Academies and the Russian Academy of Sciences on radiation contamination and remediation issues in the former Soviet Union. Cleanup problems were assessed by the American participants for six Russian sites: Kurchatov Institute, Lakes 10 and 11 at Mayak, Andreev Bay, Krasnokamensk Mining Enterprise (Siberia), Almaz Mining Enterprise (North Caucasus), and one site for testing peaceful nuclear explosions. Roy lead the Russian Research Center-Kurchatov Institute review session and wrote an assessment ofmore » key cleanup issues. Kurchatov is the leading institute in the Former Soviet Union devoted to military and civilian nuclear programs. Founded in 1943 in the outskirts of Moscow, this 100 hectare site of nearly undeveloped, prime real estate is now surrounded by densely populated urban and business districts. Today there are growing concerns over the public safety and environmental security of the site resulting from increasingly obsolete nuclear facilities and a legacy of inadequate waste management practices that resulted in contaminant releases and challenging remediation problems. In addition, there is growing concern over the presence of nuclear facilities within urban areas creating potential targets for terrorist attacks.« less

  4. Spent Fuel Ratio Estimates from Numerical Models in ALE3D

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Margraf, J. D.; Dunn, T. A.

    Potential threat of intentional sabotage of spent nuclear fuel storage facilities is of significant importance to national security. Paramount is the study of focused energy attacks on these materials and the potential release of aerosolized hazardous particulates into the environment. Depleted uranium oxide (DUO 2) is often chosen as a surrogate material for testing due to the unreasonable cost and safety demands for conducting full-scale tests with real spent nuclear fuel. To account for differences in mechanical response resulting in changes to particle distribution it is necessary to scale the DUO 2 results to get a proper measure for spentmore » fuel. This is accomplished with the spent fuel ratio (SFR), the ratio of respirable aerosol mass released due to identical damage conditions between a spent fuel and a surrogate material like depleted uranium oxide (DUO 2). A very limited number of full-scale experiments have been carried out to capture this data, and the oft-questioned validity of the results typically leads to overly-conservative risk estimates. In the present work, the ALE3D hydrocode is used to simulate DUO 2 and spent nuclear fuel pellets impacted by metal jets. The results demonstrate an alternative approach to estimate the respirable release fraction of fragmented nuclear fuel.« less

  5. High performance dash-on-warning air mobile missile system. [first strike avoidance for retaliatory aircraft-borne ICBM counterattack

    NASA Technical Reports Server (NTRS)

    Hague, D. S.; Levin, A. D.

    1978-01-01

    Because fixed missile bases have become increasingly vulnerable to strategic nuclear attack, an air-mobile missile system is proposed, whereby ICBMs can be launched from the hold of large subsonic aircraft following a missile-assisted supersonic dash of the aircraft to a safe distance from their base (about 50 n mi). Three major categories of vehicle design are presented: staged, which employs vertical take-off and a single solid rocket booster similar to that used on the Space Shuttle; unstaged, which employs vertical take-off and four internally-carried reusable liquid rocket engines; and alternative concepts, some using horizontal take-off with duct-burning afterburners. Attention is given to the economics of maintaining 200 ICBMs airborne during an alert (about $600 million for each fleet alert, exclusive of acquisition costs). The chief advantages of the system lie in its reduced vulnerability to suprise attack, because it can be launched on warning, and in the possibility for recall of the aircraft if the warning proves to be a false alarm.

  6. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    NASA Astrophysics Data System (ADS)

    Gomez, Andres; Lara, Camilo; Kebschull, Udo

    2015-12-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machine Learning approach. We plan to implement the proposed framework as a software prototype that will be tested as a component of the ALICE Grid middleware.

  7. An Online Change of Activity in Energy Spectrum for Detection on an Early Intervention Robot

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boudergui, K.; Laine, F.; Montagu, T.

    With the growth of industrial risks and the multiplication of CBRNe (Chemical Biological Radiological and explosive) attacks through toxic chemicals, biological or radiological threats, public services and military authorities face with increasingly critical situations, whose management is strongly conditioned by fast and reliable establishment of an informative diagnostic. Right after an attack, the five first minutes are crucial to define the various scenarios and the most dangerous for a human intervention. Therefore the use of robots is considered essential by all stakeholders of security. In this context, the SISPEO project (Systeme d'Intervention Sapeurs Pompiers Robotise) aims to create/build/design a robustmore » response through a robotic platform for early intervention services such as civil and military security in hostile environments. CEA LIST has proposed an adapted solution to detect and characterize nuclear and radiological risks online and in motion, using a miniature embedded CdZnTe (CZT) crystal Gamma-ray spectrometer. This paper presents experimental results for this miniature embedded CZT spectrometer and its associated mathematical method to detect and characterize radiological threats online and in motion. (authors)« less

  8. Anomaly-based intrusion detection for SCADA systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-07-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper willmore » briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)« less

  9. Corrosion Behavior of Alloys in Molten Fluoride Salts

    NASA Astrophysics Data System (ADS)

    Zheng, Guiqiu

    The molten fluoride salt-cooled high-temperature nuclear reactor (FHR) has been proposed as a candidate Generation IV nuclear reactor. This reactor combines the latest nuclear technology with the use of molten fluoride salt as coolant to significantly enhance safety and efficiency. However, an important challenge in FHR development is the corrosion of structural materials in high-temperature molten fluoride salt. The structural alloys' degradation, particularly in terms of chromium depletion, and the molten salt chemistry are key factors that impact the lifetime of nuclear reactors and the development of future FHR designs. In support of materials development for the FHR, the nickel base alloy of Hastelloy N and iron-chromium base alloy 316 stainless steel are being actively considered as critical structural alloys. Enriched 27LiF-BeF2 (named as FLiBe) is a promising coolant for the FHR because of its neutronic properties and heat transfer characteristics while operating at atmospheric pressure. In this study, the corrosion behavior of Ni-5Cr and Ni-20Cr binary model alloys, and Hastelloy N and 316 stainless steel in molten FLiBe with and without graphite were investigated through various microstructural analyses. Based on the understanding of the corrosion behavior and data of above four alloys in molten FLiBe, a long-term corrosion prediction model has been developed that is applicable specifically for these four materials in FLiBe at 700ºC. The model uses Cr concentration profile C(x, t) as a function of corrosion distance in the materials and duration fundamentally derived from the Fick's diffusion laws. This model was validated with reasonable accuracy for the four alloys by fitting the calculated profiles with experimental data and can be applied to evaluate corrosion attack depth over the long-term. The critical constant of the overall diffusion coefficient (Deff) in this model can be quickly calculated from the experimental measurement of alloys' weight loss due to Cr depletion. While many factors affect the Deff such as the grain boundary type, grain size, precipitates, initial Cr concentration as well as temperature, this model provides a methodology for estimating corrosion attack depth of alloys in molten fluoride salts obviating the need for difficult and challenging experiment.

  10. A survey of nuclear-related agreements and possibilities for nuclear cooperation in South Asia: Cooperative Monitoring Center Occasional Paper/15

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    RAJEN,GAURAV

    2000-04-01

    Several existing nuclear-related agreements already require India and Pakistan, as members, to share information. The agreements are bilateral, regional, and international. Greater nuclear transparency between India and Pakistan could be promoted by first understanding the information flows required by existing agreements. This understanding is an essential step for developing projects that can incrementally advance the sensitivity of the information being shared. This paper provides a survey of existing nuclear-related agreements involving India and Pakistan, and suggests future confidence-building projects using the frameworks provided by these agreements. The Bilateral Agreement on the Prohibition of Attack against Nuclear Reactors and Nuclear Facilitiesmore » is discussed as a basis for creating further agreements on restricting the use and deployment of nuclear weapons. The author suggests options for enhancing the value of the list of nuclear facilities exchanged annually as a part of this agreement. The International Atomic Energy Agency's regional cooperation agreement among countries in the Asia-Pacific region is an opportunity for greater subregional nuclear cooperation in South Asia. Linking the regional agreement with South Asian environmental cooperation and marine pollution protection efforts could provide a framework for projects involving Indian and Pakistani coastal nuclear facilities. Programs of the Food and Agriculture Organization of the United Nations that use nuclear techniques to increase food and crop production and optimize water management in arid areas also provide similar opportunities for nuclear cooperation. Other frameworks for nuclear cooperation originate from international conventions related to nuclear safety, transportation of nuclear wastes, worker protection against ionizing radiation, and the nondeployment of nuclear weapons in certain areas. The information shared by existing frameworks includes: laws and regulations (including internal inspection procedures that enforce compliance); lists of nuclear facilities; emergency response procedures and available resources; information related to the transportation of nuclear wastes (particularly via shipping); understanding and notification of accidental releases; and radionuclide release data from select coastal facilities. Incremental increases in the sensitivity of the information being shared could strengthen norms for Indian and Pakistani nuclear transparency. This paper suggests seven technology-based Indian and Pakistani nuclear transparency projects for consideration. Existing nuclear-related agreements provide an information-sharing framework within which the projects could occur. Eventually, as confidence increases and new agreements are negotiated, future projects could begin to deal with the accounting of fissile materials and nuclear weapons disposition and control.« less

  11. Fear of Terrorism and Preparedness in New York City 2 Years After the Attacks: Implications for Disaster Planning and Research

    PubMed Central

    Boscarino, Joseph A.; Adams, Richard E.; Figley, Charles R.; Galea, Sandro; Foa, Edna B.

    2009-01-01

    Objectives To help improve disaster planning and research, we studied psychosocial predictors of terrorism fear and preparedness among New York City residents after the World Trade Center disaster (WTCD). Method We conducted a random cross-sectional survey of 1,681 adults interviewed 2 years after the WTCD. Participants were living in New York City at the time of the attack and exposed to ongoing terrorist threats. Results We found 44.9 percent (95% confidence interval [CI] = 41.9−47.9) of residents were concerned about future attacks and 16.9 percent (95% CI = 14.7−19.3) reported a fear level of “10” on a 10-point analog scale. Furthermore, 14.8 percent (95% CI = 12.8−17.0) reported they had made some plans for a future attack, a significant increase from the previous year. In addition, although 42.6 percent (95% CI = 39.6−45.7) indicated that they would likely wait for evacuation instructions following a chemical, biological, or nuclear attack, 34.4 percent (95% CI = 31.5−37.3) reported they would evacuate immediately against official advice. Predictors of high terrorism fear in a multivariate model included Hispanic ethnicity (odds ratio [OR] = 2.0, P = .006), lower education (OR = 4.4, P < .001, and OR = 3.7, P < .001, respectively, for nonhigh school and high school graduates, compared with college graduates), being exposed to stressful life events (OR = 1.6, P = .048), having current posttraumatic stress disorder (3.1, P < .001), having a fear of death (OR = 2.5, P = .002), and reporting a likelihood of fleeing an attack against advice (OR = 1.5, P = .034). The best predictors of preparedness in a multivariate model was being between 30 to 64 years old (30−44 years old, OR = 2.6, P = .001; 45−64 yeas old, OR = 1.8, P = .03, respectively, compared with 18−29 years old), having higher exposure to the WTCD (moderate exposure, OR = 1.7, P = .05; high exposure, OR = 2.4, P = .002; very high exposure, OR = 4.1, P < .001), respectively, compared with no/little WTCD exposure), and having greater exposure to other lifetime traumatic events (high traumatic event exposure, OR = 2.1, P = .005, compared with no exposure). Conclusion Our study suggests that among those exposed to ongoing terrorism threats, terrorism fear and preparedness were related to socioeconomic factors, mental health status, terrorism exposure levels, and exposure to stressful life events. PMID:17041297

  12. Final LDRD Report: Using Linkography of Cyber Attack Patterns to Inform Honeytoken Placement.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mitchell, Robert; Jarocki, John Charles; Fisher, Andrew N

    The war to establish cyber supremacy continues, and the literature is crowded with strictly technical cyber security measures. We present the results of a three year LDRD project using Linkography, a methodology new to the field of cyber security, we establish the foundation neces- sary to track and profile the microbehavior of humans attacking cyber systems. We also propose ways to leverage this understanding to influence and deceive these attackers. We studied the sci- ence of linkography, applied it to the cyber security domain, implemented a software package to manage linkographs, generated the preprocessing blocks necessary to ingest raw data,more » produced machine learning models, created ontology refinement algorithms and prototyped a web applica- tion for researchers and practitioners to apply linkography. Machine learning produced some of our key results: We trained and validated multinomial classifiers with a real world data set and predicted the attacker's next category of action with 86 to 98% accuracy; dimension reduction techniques indicated that the linkography-based features were among the most powerful. We also discovered ontology refinement algorithms that advanced the state of the art in linkography in general and cyber security in particular. We conclude that linkography is a viable tool for cyber security; we look forward to expanding our work to other data sources and using our prediction results to enable adversary deception techniques. Acknowledgements Thanks to Phil Bennett, Michael Bernard, Jeffrey Bigg, Marshall Daniels, Tyler Dean, David Dug- gan, Carson Kent, Josh Maine, Marci McBride, Nick Peterson, Katie Rodhouse, Asael Sorenson, Roger Suppona, Scott Watson and David Zage. We acknowledge support for this work by the LDRD Program at Sandia National Laboratories. Sandia National Laboratories is a multi-mission laboratory operated by Sandia Corporation for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. This page intentionally left blank.« less

  13. Primer on Durability of Nuclear Power Plant Reinforced Concrete Structures - A Review of Pertinent Factors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Naus, Dan J

    The objective of this study was to provide a primer on the environmental effects that can affect the durability of nuclear power plant concrete structures. As concrete ages, changes in its properties will occur as a result of continuing microstructural changes (i.e., slow hydration, crystallization of amorphous constituents, and reactions between cement paste and aggregates), as well as environmental influences. These changes do not have to be detrimental to the point that concrete will not be able to meet its performance requirements. Concrete, however, can suffer undesirable changes with time because of improper specifications, a violation of specifications, or adversemore » performance of its cement paste matrix or aggregate constituents under either physical or chemical attack. Contained in this report is a discussion on concrete durability and the relationship between durability and performance, a review of the historical perspective related to concrete and longevity, a description of the basic materials that comprise reinforced concrete, and information on the environmental factors that can affect the performance of nuclear power plant concrete structures. Commentary is provided on the importance of an aging management program.« less

  14. The United States should forego a damage-limitation capability against China

    NASA Astrophysics Data System (ADS)

    Glaser, Charles L.

    2017-11-01

    Bottom Lines • THE KEY STRATEGIC NUCLEAR CHOICE. Whether to attempt to preserve its damage-limitation capability against China is the key strategic nuclear choice facing the United States. The answer is much less clear-cut than when the United States faced the Soviet Union during the Cold War. • FEASIBILITY OF DAMAGE LIMITATION. Although technology has advanced significantly over the past three decades, future military competition between the U.S. and Chinese forces will favor large-scale nuclear retaliation over significant damage limitation. • BENEFITS AND RISKS OF A DAMAGE-LIMITATION CAPABILITY. The benefits provided by a modest damage-limitation capability would be small, because the United States can meet its most important regional deterrent requirements without one. In comparison, the risks, which include an increased probability of accidental and unauthorized Chinese attacks, as well as strained U.S.—China relations, would be large. • FOREGO DAMAGE LIMITATION. These twin findings—the poor prospects for prevailing in the military competition, and the small benefits and likely overall decrease in U.S. security—call for a U.S. policy that foregoes efforts to preserve or enhance its damage-limitation capability.

  15. The US nuclear weapon infrastructure and a stable global nuclear weapon regime

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Immele, John D; Wagner, Richard L

    2009-01-01

    US nuclear weapons capabilities -- extant force structure and nuclear weapons infrastructure as well as declared policy -- influence other nations' nuclear weapons postures, at least to some extent. This influence can be desirable or undesirable, and is, of course, a mixture of both. How strong the influence is, and its nature, are complicated, controversial, and -- in our view -- not well understood but often overstated. Divergent views about this influence and how it might shape the future global nuclear weapons regime seem to us to be the most serious impediment to reaching a national consensus on US weaponsmore » policy, force structure and supporting infrastructure. We believe that a paradigm shift to capability-based deterrence and dissuasion is not only consistent with the realities of the world and how it has changed, but also a desirable way for nuclear weapon postures and infrastructures to evolve. The US and other nuclear states could not get to zero nor even reduce nuclear arms and the nuclear profile much further without learning to manage latent capability. This paper has defined three principles for designing NW infrastructure both at the 'next plateau' and 'near zero.' The US can be a leader in reducing weapons and infrastructure and in creating an international regime in which capability gradually substitutes for weapons in being and is transparent. The current 'strategy' of not having policy or a Congressionally-approved plan for transforming the weapons complex is not leadership. If we can conform the US infrastructure to the next plateau and architect it in such a way that it is aligned with further arms reductions, it will have these benefits: The extant stockpile can be reduced in size, while the smaller stockpile still deters attack on the US and Allies. The capabilities of the infrastructure will dissuade emergence of new challenges/threats; if they emerge, nevertheless, the US will be able to deal with them in time. We will begin to transform the way other major powers view their nuclear capability. Finally, and though of less cosmic importance, it will save money in the long run.« less

  16. The knottin-like Blufensin family regulates genes involved in nuclear import and the secretory pathway in barley-powdery mildew interactions

    PubMed Central

    Xu, Weihui; Meng, Yan; Surana, Priyanka; Fuerst, Greg; Nettleton, Dan; Wise, Roger P.

    2015-01-01

    Plants have evolved complex regulatory mechanisms to control a multi-layered defense response to microbial attack. Both temporal and spatial gene expression are tightly regulated in response to pathogen ingress, modulating both positive and negative control of defense. BLUFENSINs, small knottin-like peptides in barley, wheat, and rice, are highly induced by attack from fungal pathogens, in particular, the obligate biotrophic fungus, Blumeria graminis f. sp. hordei (Bgh), causal agent of barley powdery mildew. Previous research indicated that Blufensin1 (Bln1) functions as a negative regulator of basal defense mechanisms. In the current report, we show that BLN1 and BLN2 can both be secreted to the apoplast and Barley stripe mosaic virus (BSMV)-mediated overexpression of Bln2 increases susceptibility of barley to Bgh. Bimolecular fluorescence complementation (BiFC) assays signify that BLN1 and BLN2 can interact with each other, and with calmodulin. We then used BSMV-induced gene silencing to knock down Bln1, followed by Barley1 GeneChip transcriptome analysis, to identify additional host genes influenced by Bln1. Analysis of differential expression revealed a gene set enriched for those encoding proteins annotated to nuclear import and the secretory pathway, particularly Importin α1-b and Sec61 γ subunits. Further functional analysis of these two affected genes showed that when silenced, they also reduced susceptibility to Bgh. Taken together, we postulate that Bln1 is co-opted by Bgh to facilitate transport of disease-related host proteins or effectors, influencing the establishment of Bgh compatibility on its barley host. PMID:26089830

  17. Vulnerability assessment of a space based weapon platform electronic system exposed to a thermonuclear weapon detonation

    NASA Astrophysics Data System (ADS)

    Perez, C. L.; Johnson, J. O.

    Rapidly changing world events, the increased number of nations with inter-continental ballistic missile capability, and the proliferation of nuclear weapon technology will increase the number of nuclear threats facing the world today. Monitoring these nation's activities and providing an early warning and/or intercept system via reconnaissance and surveillance satellites and space based weapon platforms is a viable deterrent against a surprise nuclear attack. However, the deployment of satellite and weapon platform assets in space will subject the sensitive electronic equipment to a variety of natural and man-made radiation environments. These include Van Allen Belt protons and electrons; galactic and solar flare protons; and neutrons, gamma rays, and x-rays from intentionally detonated fission and fusion weapons. In this paper, the MASH vl.0 code system is used to estimate the dose to the critical electronics components of an idealized space based weapon platform from neutron and gamma-ray radiation emitted from a thermonuclear weapon detonation in space. Fluence and dose assessments were performed for the platform fully loaded, and in several stages representing limited engagement scenarios. The results indicate vulnerabilities to the Command, Control, and Communication bay instruments from radiation damage for a nuclear weapon detonation for certain source/platform orientations. The distance at which damage occurs will depend on the weapon yield (n,(gamma)/kiloton) and size (kilotons).

  18. Integration of Space Weather Forecasts into Space Protection

    NASA Astrophysics Data System (ADS)

    Reeves, G.

    2012-09-01

    How would the US respond to a clandestine attack that disabled one of our satellites? How would we know that it was an attack, not a natural failure? The goal of space weather programs as applied to space protection are simple: Provide a rapid and reliable assessment of the probability that satellite or system failure was caused by the space environment. Achieving that goal is not as simple. However, great strides are being made on a number of fronts. We will report on recent successes in providing rapid, automated anomaly/attack assessment for the penetrating radiation environment in the Earth's radiation belts. We have previously reported on the Dynamic Radiation Environment Assimilation Model (DREAM) that was developed at Los Alamos National Laboratory to assess hazards posed by the natural and by nuclear radiation belts. This year we will report on recent developments that are moving this program from the research, test, and evaluation phases to real-time implementation and application. We will discuss the challenges of leveraging space environment data sets for applications that are beyond the scope of mission requirements, the challenges of moving data from where they exist to where they are needed, the challenges of turning data into actionable information, and how those challenges were overcome. We will discuss the state-of-the-art as it exists in 2012 including the new capabilities that have been enabled and the limitations that still exist. We will also discuss how currently untapped data resources could advance the state-of-the-art and the future steps for implementing automatic real-time anomaly forensics.

  19. Lock-in of elastically mounted airfoils at a 90° angle of attack

    NASA Astrophysics Data System (ADS)

    Ehrmann, R. S.; Loftin, K. M.; Johnson, S.; White, E. B.

    2014-01-01

    Reducing vortex-induced vibration (VIV) of elastically mounted cylinders has applications to petroleum, nuclear, and civil engineering. One simple method is streamlining the cylinder into an airfoil shape. However, if flow direction changes, an elastic airfoil could experience similar oscillations with even more drag. To better understand a general airfoil's response, three elastically mounted airfoil shapes are tested at a 90° angle of attack in a 3 ft by 4 ft wind tunnel. The shapes are a NACA 0018, a sharp leading- and trailing-edge (sharp-sharp) model, and a round leading- and trailing-edge (round-round) model. Mass-damping ranges from 0.96 to 1.44. For comparison to canonical VIV research, a cylinder is also tested. Since lock-in occurs near Rec=125×103, the models are also tested with a trip strip. The NACA 0018 and sharp-sharp configuration show nearly identical responses. The cylinder and round-round airfoil have responses five to eight times larger. Thus, the existence of a single sharp edge is sufficient to greatly reduce VIV at 90° angle of attack. Whereas the cylinder and round-round maximum response amplitudes are similar, cylinder lock-in occurs over a velocity range three times larger than the round-round. The tripped cylinder and round-round models' response is attenuated by 70% compared to their respective clean configurations. Hysteresis is only observed in the circular cylinder and round-round models. Hotwire data indicates the clean cylinder has a unique vortex pattern compared to the other configurations.

  20. NMR analysis of t-butyl-catalyzed deuterium exchange at unactivated arene localities.

    PubMed

    Stack, Douglas E; Eastman, Rachel

    2016-10-01

    Regioselective labelling of arene rings via electrophilic exchange is often dictated by the electronic environment caused by substituents present on the aromatic system. Previously, we observed the presence of a t-butyl group, either covalently bond or added as an external reagent, could impart deuterium exchange to the unactivated, C1-position of estrone. Here, we provide nuclear magnetic resonance analysis of this exchange in a solvent system composed of 50:50 trifluoroacetic acid and D 2 O with either 2-t-butylestrone or estrone in the presence of t-butyl alcohol has shed insights into the mechanism of this t-butyl-catalyzed exchange. Fast exchange of the t-butyl group concurrent with the gradual reduction of the H1 proton signal in both systems suggest a mechanism involving ipso attack of the t-butyl position by deuterium. The reversible addition/elimination of the t-butyl group activates the H1 proton towards exchange by a mechanism of t-butyl incorporation, H1 activation and exchange, followed by eventual t-butyl elimination. Density functional calculations are consistent with the observation of fast t-butyl exchange concurrent with slower H1 exchange. The σ-complex resulting from ipso attack of deuterium at the t-butyl carbon was 6.6 kcal/mol lower in energy than that of the σ-complex resulting from deuterium attack at C1. A better understanding of the t-butyl-catalyzed exchange could help in the design of labelling recipes for other phenolic metabolites. Copyright © 2016 The Authors. Journal of Labelled Compounds and Radiopharmaceuticals published by John Wiley & Sons, Ltd.

  1. Strategic Missile Defense & Nuclear Deterrence

    NASA Astrophysics Data System (ADS)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  2. Medical response to a radiologic/nuclear event: integrated plan from the Office of the Assistant Secretary for Preparedness and Response, Department of Health and Human Services.

    PubMed

    Coleman, C Norman; Hrdina, Chad; Bader, Judith L; Norwood, Ann; Hayhurst, Robert; Forsha, Joseph; Yeskey, Kevin; Knebel, Ann

    2009-02-01

    The end of the Cold War led to a reduced concern for a major nuclear event. However, the current threats from terrorism make a radiologic (dispersal or use of radioactive material) or nuclear (improvised nuclear device) event a possibility. The specter and enormousness of the catastrophe resulting from a state-sponsored nuclear attack and a sense of nihilism about the effectiveness of a response were such that there had been limited civilian medical response planning. Although the consequences of a radiologic dispersal device are substantial, and the detonation of a modest-sized (10 kiloton) improvised nuclear device is catastrophic, it is both possible and imperative that a medical response be planned. To meet this need, the Office of the Assistant Secretary for Preparedness and Response in the Department of Health and Human Services, in collaboration within government and with nongovernment partners, has developed a scientifically based comprehensive planning framework and Web-based "just-in-time" medical response information called Radiation Event Medical Management (available at http://www.remm.nlm.gov). The response plan includes (1) underpinnings from basic radiation biology, (2) tailored medical responses, (3) delivery of medical countermeasures for postevent mitigation and treatment, (4) referral to expert centers for acute treatment, and (5) long-term follow-up. Although continuing to evolve and increase in scope and capacity, current response planning is sufficiently mature that planners and responders should be aware of the basic premises, tools, and resources available. An effective response will require coordination, communication, and cooperation at an unprecedented level. The logic behind and components of this response are presented to allow for active collaboration among emergency planners and responders and federal, state, local, and tribal governments.

  3. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    NASA Astrophysics Data System (ADS)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  4. Deployment of the DosiKit System Under Operational Conditions: Experience From a French Defense National Nuclear Exercise.

    PubMed

    Entine, F; Bensimon Etzol, J; Bettencourt, C; Dondey, M; Michel, X; Gagna, G; Gellie, G; Corre, Y; Ugolin, N; Chevillard, S; Amabile, J-C

    2018-07-01

    Estimation of the dose received by accidentally irradiated victims is based on a tripod: clinical, biological, and physical dosimetry. The DosiKit system is an operational and mobile biodosimetry device allowing the measurement of external irradiation directly on the site of a radiological accident. This tool is based on capillary blood sample and hair follicle collection. The aim is to obtain a whole-body and local-surface dose assessment. This paper is about the technical evaluation of the DosiKit; the analytical process and scientific validation are briefly described. The Toulon exercise scenario was based on a major accident involving the reactor of a nuclear attack submarine. The design of the scenario made it impossible for several players (firefighters, medical team) to leave the area for a long time, and they were potentially exposed to high dose rates. The DosiKit system was fully integrated into a deployable radiological emergency laboratory, and the response to operational needs was very satisfactory.

  5. Cyber security evaluation of II&C technologies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thomas, Ken

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) tomore » address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.« less

  6. Requirements for estimation of doses from contaminants dispersed by a 'dirty bomb' explosion in an urban area.

    PubMed

    Andersson, K G; Mikkelsen, T; Astrup, P; Thykier-Nielsen, S; Jacobsen, L H; Hoe, S C; Nielsen, S P

    2009-12-01

    The ARGOS decision support system is currently being extended to enable estimation of the consequences of terror attacks involving chemical, biological, nuclear and radiological substances. This paper presents elements of the framework that will be applied in ARGOS to calculate the dose contributions from contaminants dispersed in the atmosphere after a 'dirty bomb' explosion. Conceptual methodologies are presented which describe the various dose components on the basis of knowledge of time-integrated contaminant air concentrations. Also the aerosolisation and atmospheric dispersion in a city of different types of conceivable contaminants from a 'dirty bomb' are discussed.

  7. National environmental observing system to mitigate the effects of nuclear-biological-chemical (NBC) attacks: strategic and tactical

    NASA Astrophysics Data System (ADS)

    Fleming, Rex J.

    2003-09-01

    The challenge of obtaining an adequate environmental support system to help mitigate the effects of various terrorist generated plumes is articulated and a fiscally responsible solution is presented. A substantially improved national system of upper air data observing systems serves as a powerful information source prior to a terrorist event. A mobile tactical observing system for measuring the environment and for measuring the composition and intensity of the plume is implemented immediately following an event. Only proven and tested technologies are used. Program costs, benefits for the fight against terrorism, and multiple benefits to other aspects of the economy are summarized.

  8. National Memorial Institute for the Prevention of Terrorism

    NASA Astrophysics Data System (ADS)

    Reimer, Dennis J.; Houghton, Brian K.; Powell, Ellen L.

    2004-09-01

    The National Memorial Institute for the Prevention of Terrorism (MIPT) in Oklahoma City is a living memorial to the victims, survivors, family members and rescue workers affected by the April 19, 1995 bombing of the Murrah Federal Building. The Institute conducts research into the development of technologies to counter biological, nuclear and chemical weapons of mass destruction and cyberterrorism, as well as research into the social and political causes and effects of terrorism. This paper describes MIPT funded research in areas of detection, decontamination, personal protective equipment, attack simulations, treatments, awareness, improved public communication during and after an incident, as well as lessons learned from terrorist incidents.

  9. National Memorial Institute for the Prevention of Terrorism

    NASA Astrophysics Data System (ADS)

    Reimer, Dennis J.; Houghton, Brian K.; Ellis, James O., III

    2003-09-01

    The National Memorial Institute for the Prevention of Terrorism in Oklahoma City is a living memorial to the victims, survivors, family members and rescue workers affected by the April 19, 1995 bombing of the Murrah Federal Building. The Institute conducts research into the development of technologies to counter biological, nuclear and chemical weapons of mass destruction and cyberterrorism, as well as research into the social and political causes and effects of terrorism. This paper describes MIPT funded research in areas of detection, decontamination, personal protective equipment, attack simulations, treatments, awareness, improved public communication during and after an incident, as well as lessons learned from terrorist incidents.

  10. Investigation of debranching pattern of a thermostable isoamylase and its application for the production of resistant starch.

    PubMed

    Li, Youran; Xu, Jingjing; Zhang, Liang; Ding, Zhongyang; Gu, Zhenghua; Shi, Guiyang

    2017-06-29

    Debranching enzymes contribute to the enzymatic production of resistant starch (RS) by reducing substrate molecular weight and increasing amylose yield. In the present study, the action pattern of a thermostable isoamylase-type debranching enzyme on different types of starch was investigated. The molecular weight distribution, glycosidic bond composition and contents of oligosaccharides released were monitored by various liquid chromatography techniques and nuclear magnetic resonance spectroscopy (NMR). These analyses showed that the isoamylase could specifically and efficiently attack α-1,6-glucosidic linkages at branch points, leaving the amylose favored by other amylolytic enzymes. Its ability to attack side chains composed of 1-3 glucose residues differentiates it from other isoamylases, a property which is also ideal for the RS preparation process. The enzyme was used as an auxiliary enzyme in the hydrolytic stage. The highest RS yield (53.8%) was achieved under the optimized conditions of 70 °C and pH 5.0, using 7 U isoamylase per g starch and 2 NU amylase per g starch. These data also help us better understand the application of isoamylase for preparation of other products from highly branched starch materials. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Dietary vitamin A regulates wingless-related MMTV integration site signaling to alter the hair cycle.

    PubMed

    Suo, Liye; Sundberg, John P; Everts, Helen B

    2015-05-01

    Alopecia areata (AA) is an autoimmune hair loss disease caused by a cell-mediated immune attack of the lower portion of the cycling hair follicle. Feeding mice 3-7 times the recommended level of dietary vitamin A accelerated the progression of AA in the graft-induced C3H/HeJ mouse model of AA. In this study, we also found that dietary vitamin A, in a dose dependent manner, activated the hair follicle stem cells (SCs) to induce the development and growth phase of the hair cycle (anagen), which may have made the hair follicle more susceptible to autoimmune attack. Our purpose here is to determine the mechanism by which dietary vitamin A regulates the hair cycle. We found that vitamin A in a dose-dependent manner increased nuclear localized beta-catenin (CTNNB1; a marker of canonical wingless-type Mouse Mammary Tumor Virus integration site family (WNT) signaling) and levels of WNT7A within the hair follicle bulge in these C3H/HeJ mice. These findings suggest that feeding mice high levels of dietary vitamin A increases WNT signaling to activate hair follicle SCs. © 2014 by the Society for Experimental Biology and Medicine.

  12. Timing of cyber conflict.

    PubMed

    Axelrod, Robert; Iliev, Rumen

    2014-01-28

    Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran's nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide.

  13. The contribution of collective attack tactics in differentiating handball score efficiency.

    PubMed

    Rogulj, Nenad; Srhoj, Vatromir; Srhoj, Ljerka

    2004-12-01

    The prevalence of 19 elements of collective tactics in score efficient and score inefficient teams was analyzed in 90 First Croatian Handball League--Men games during the 1998-1999 season. Prediction variables were used to describe duration, continuity, system, organization and spatial direction of attacks. Analysis of the basic descriptive and distribution statistical parameters revealed normal distribution of all variables and possibility to use multivariate methods. Canonic discrimination analysis and analysis of variance showed the use of collective tactics elements on attacks to differ statistically significantly between the winning and losing teams. Counter-attacks and uninterrupted attacks predominate in winning teams. Other types of attacks such as long position attack, multiply interrupted attack, attack with one circle runner attack player/pivot, attack based on basic principles, attack based on group cooperation, attack based on independent action, attack based on group maneuvering, rightward directed attack and leftward directed attack predominate in losing teams. Winning teams were found to be clearly characterized by quick attacks against unorganized defense, whereas prolonged, interrupted position attacks against organized defense along with frequent and diverse tactical actions were characteristic of losing teams. The choice and frequency of using a particular tactical activity in position attack do not warrant score efficiency but usually are consequential to the limited anthropologic potential and low level of individual technical-tactical skills of the players in low-quality teams.

  14. Predicting Factors of Zone 4 Attack in Volleyball.

    PubMed

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  15. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant: findings from the Icatibant Outcome Survey.

    PubMed

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence; Zanichelli, Andrea; Caballero, Teresa; Longhurst, Hilary J; Perrin, Amandine; Andresen, Irmgard

    2017-01-01

    Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. Data on LTP use, attacks, and treatments were recorded. Attack characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while patients were using LTP. Attack rate, attack severity, and the distribution of attack sites were similar across all types of LTP used, and were comparable to the results found in patients who did not receive LTP. Attacks were successfully treated with icatibant; 82.5% of all breakthrough attacks were treated with a single icatibant injection without C1-INH rescue medication. Treatment outcomes were comparable for breakthrough attacks across all LTP types, and for attacks without LTP. Patients who use LTP should be aware that breakthrough attacks can occur, and such attacks can be severe. Thus, patients with C1-INH-HAE using LTP should have emergency treatment readily available. Data from IOS show that icatibant is effective for the treatment of breakthrough attacks. Trial Registration NCT01034969.

  16. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less

  17. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-01-01

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  18. Method and tool for network vulnerability analysis

    DOEpatents

    Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  19. About Heart Attacks

    MedlinePlus

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  20. A graph-based system for network-vulnerability analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.

    1998-06-01

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  1. Application of Cellular Automata to Detection of Malicious Network Packets

    ERIC Educational Resources Information Center

    Brown, Robert L.

    2014-01-01

    A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…

  2. NTREES Testing and Operations Status

    NASA Technical Reports Server (NTRS)

    Emrich, Bill

    2007-01-01

    Nuclear Thermal Rockets or NTR's have been suggested as a propulsion system option for vehicles traveling to the moon or Mars. These engines are capable of providing high thrust at specific impulses at least twice that of today's best chemical engines. The performance constraints on these engines are mainly the result of temperature limitations on the fuel coupled with a limited ability to withstand chemical attack by the hot hydrogen propellant. To operate at maximum efficiency, fuel forms are desired which can withstand the extremely hot, hostile environment characteristic of NTR operation for at least several hours. The simulation of such an environment would require an experimental device which could simultaneously approximate the power, flow, and temperature conditions which a nuclear fuel element (or partial element) would encounter during NTR operation. Such a simulation would allow detailed studies of the fuel behavior and hydrogen flow characteristics under reactor like conditions to be performed. Currently, the construction of such a simulator has been completed at the Marshall Space Flight Center, and will be used in the future to evaluate a wide variety of fuel element designs and the materials of which they are fabricated. This present work addresses the operational status of the Nuclear Thermal Rocket Element Environmental Simulator or NTREES and some of the design considerations which were considered prior to and during its construction.

  3. Global health interdependence and the international physicians' movement.

    PubMed

    Gellert, G A

    1990-08-01

    International Physicians for the Prevention of Nuclear War has had an impressive public impact in the 1980s, helping to shatter the myths of surviving and medically responding to a nuclear attack. The 1990s present a new challenge for the medical community in a different social and international context characterized by increasing global interdependence. Another view of physician activism is presented to complement advocacy for nuclear disarmament in the promotion of peace. A framework for analysis is provided by "fateful visions"--accepted policy views of prospective superpower relations--drawn from practitioners of foreign policy, international relations, and security affairs. A perceptual gap may exist between physicians who wish to address underlying ethical and public health concerns on security issues and policy practitioners who are accustomed to discussion within existing policy frames of reference that can be pragmatically used. A strategy is proposed for physicians to use their specialized training and skills to evaluate trends in global health interdependence. The international physicians' movement may contribute substantively to the formulation of policy by expanding and interpreting an increasingly complex database on interdependence, and by creating a dialogue with policy formulators based on mutual recognition of the value and legitimacy of each professions' expertise and complementary contributions to international security policy.

  4. Cooperating attackers in neural cryptography.

    PubMed

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  5. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  6. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    ERIC Educational Resources Information Center

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  7. Analytical technique to address terrorist threats by chemical weapons of mass destruction

    NASA Astrophysics Data System (ADS)

    Dempsey, Patrick M.

    1997-01-01

    Terrorism is no longer an issue without effect on the American mind. We now live with the same concerns and fears that have been commonplace in other developed and third world countries for a long time. Citizens of other countries have long lived with the specter of terrorism and now the U.S. needs to be concerned and prepared for terrorist activities.T he terrorist has the ability to cause great destructive effects by focusing their effort on unaware and unprepared civilian populations. Attacks can range from simple explosives to sophisticated nuclear, chemical and biological weapons. Intentional chemical releases of hazardous chemicals or chemical warfare agents pose a great threat because of their ready availability and/or ease of production, and their ability to cause widespread damage. As this battlefront changes from defined conflicts and enemies to unnamed terrorists, we must implement the proper analytical tools to provide a fast and efficient response. Each chemical uses in a terrorists weapon leaves behind a chemical signature that can be used to identify the materials involved and possibly lead investigators to the source and to those responsible. New tools to provide fast and accurate detection for battlefield chemical and biological agent attack are emerging. Gas chromatography/mass spectrometry (GC/MS) is one of these tools that has found increasing use by the military to respond to chemical agent attacks. As the technology becomes smaller and more portable, it can be used by law enforcement personnel to identify suspected terrorist releases and to help prepare the response; define contaminated areas for evacuation and safety concerns, identify the proper treatment of exposed or affected civilians, and suggest decontamination and cleanup procedures.

  8. On Patarin's Attack against the lIC Scheme

    NASA Astrophysics Data System (ADS)

    Ogura, Naoki; Uchiyama, Shigenori

    In 2007, Ding et al. proposed an attractive scheme, which is called the l-Invertible Cycles (lIC) scheme. lIC is one of the most efficient multivariate public-key cryptosystems (MPKC); these schemes would be suitable for using under limited computational resources. In 2008, an efficient attack against lIC using Gröbner basis algorithms was proposed by Fouque et al. However, they only estimated the complexity of their attack based on their experimental results. On the other hand, Patarin had proposed an efficient attack against some multivariate public-key cryptosystems. We call this attack Patarin's attack. The complexity of Patarin's attack can be estimated by finding relations corresponding to each scheme. In this paper, we propose an another practical attack against the lIC encryption/signature scheme. We estimate the complexity of our attack (not experimentally) by adapting Patarin's attack. The attack can be also applied to the lIC- scheme. Moreover, we show some experimental results of a practical attack against the lIC/lIC- schemes. This is the first implementation of both our proposed attack and an attack based on Gröbner basis algorithm for the even case, that is, a parameter l is even.

  9. A reference model for model-based design of critical infrastructure protection systems

    NASA Astrophysics Data System (ADS)

    Shin, Young Don; Park, Cheol Young; Lee, Jae-Chon

    2015-05-01

    Today's war field environment is getting versatile as the activities of unconventional wars such as terrorist attacks and cyber-attacks have noticeably increased lately. The damage caused by such unconventional wars has also turned out to be serious particularly if targets are critical infrastructures that are constructed in support of banking and finance, transportation, power, information and communication, government, and so on. The critical infrastructures are usually interconnected to each other and thus are very vulnerable to attack. As such, to ensure the security of critical infrastructures is very important and thus the concept of critical infrastructure protection (CIP) has come. The program to realize the CIP at national level becomes the form of statute in each country. On the other hand, it is also needed to protect each individual critical infrastructure. The objective of this paper is to study on an effort to do so, which can be called the CIP system (CIPS). There could be a variety of ways to design CIPS's. Instead of considering the design of each individual CIPS, a reference model-based approach is taken in this paper. The reference model represents the design of all the CIPS's that have many design elements in common. In addition, the development of the reference model is also carried out using a variety of model diagrams. The modeling language used therein is the systems modeling language (SysML), which was developed and is managed by Object Management Group (OMG) and a de facto standard. Using SysML, the structure and operational concept of the reference model are designed to fulfil the goal of CIPS's, resulting in the block definition and activity diagrams. As a case study, the operational scenario of the nuclear power plant while being attacked by terrorists is studied using the reference model. The effectiveness of the results is also analyzed using multiple analysis models. It is thus expected that the approach taken here has some merits over the traditional design methodology of repeating requirements analysis and system design.

  10. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  11. Split-second escape decisions in blue tits (Parus caeruleus)

    NASA Astrophysics Data System (ADS)

    Lind, Johan; Kaby, Ulrika; Jakobsson, Sven

    2002-07-01

    Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial for survival and even minor mistakes in initial escape response can have devastating consequences. Birds may respond differently depending on the character of the predator's attack and these split-second decisions were studied using a model merlin (Falco columbarius) that attacked feeding blue tits (Parus caeruleus) from two different attack angles in two different speeds. When attacked from a low attack angle they took off more steeply than when attacked from a high angle. This is the first study to show that escape behaviour also depends on predator attack speed. The blue tits responded to a high-speed attack by dodging sideways more often than when attacked at a low speed. Escape speed was not significantly affected by the different treatments. Although they have only a split-second before escaping an attack, blue tits do adjust their escape strategy to the prevailing attack conditions.

  12. Hybrid attacks on model-based social recommender systems

    NASA Astrophysics Data System (ADS)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  13. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    NASA Astrophysics Data System (ADS)

    Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.

    2009-12-01

    This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).

  14. Post-Cold War Science and Technology at Los Alamos

    NASA Astrophysics Data System (ADS)

    Browne, John C.

    2002-04-01

    Los Alamos National Laboratory serves the nation through the development and application of leading-edge science and technology in support of national security. Our mission supports national security by: ensuring the safety, security, and reliability of the U.S. nuclear stockpile; reducing the threat of weapons of mass destruction in support of counter terrorism and homeland defense; and solving national energy, environment, infrastructure, and health security problems. We require crosscutting fundamental and advanced science and technology research to accomplish our mission. The Stockpile Stewardship Program develops and applies, advanced experimental science, computational simulation, and technology to ensure the safety and reliability of U.S. nuclear weapons in the absence of nuclear testing. This effort in itself is a grand challenge. However, the terrorist attack of September 11, 2001, reminded us of the importance of robust and vibrant research and development capabilities to meet new and evolving threats to our national security. Today through rapid prototyping we are applying new, innovative, science and technology for homeland defense, to address the threats of nuclear, chemical, and biological weapons globally. Synergistically, with the capabilities that we require for our core mission, we contribute in many other areas of scientific endeavor. For example, our Laboratory has been part of the NASA effort on mapping water on the moon and NSF/DOE projects studying high-energy astrophysical phenomena, understanding fundamental scaling phenomena of life, exploring high-temperature superconductors, investigating quantum information systems, applying neutrons to condensed-matter and nuclear physics research, developing large-scale modeling and simulations to understand complex phenomena, and exploring nanoscience that bridges the atomic to macroscopic scales. In this presentation, I will highlight some of these post-cold war science and technology advances including our national security contributions, and discuss some of challenges for Los Alamos in the future.

  15. Cyber-Physical Attacks With Control Objectives

    DOE PAGES

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-08-18

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  16. Cyber-Physical Attacks With Control Objectives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  17. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    NASA Astrophysics Data System (ADS)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  18. Attacks on public telephone networks: technologies and challenges

    NASA Astrophysics Data System (ADS)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  19. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  20. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  1. Robustness of coevolution in resolving prisoner's dilemma games on interdependent networks subject to attack

    NASA Astrophysics Data System (ADS)

    Liu, Penghui; Liu, Jing

    2017-08-01

    Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.

  2. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    PubMed Central

    Moisan, Frédéric; Gonzalez, Cleotilde

    2017-01-01

    Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain) and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive) in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies. PMID:28690557

  3. Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation

    NASA Astrophysics Data System (ADS)

    Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong

    2017-02-01

    We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.

  4. Blind Data Attack on BGP Routers

    DTIC Science & Technology

    2017-03-01

    implement blind attack protection, leaving long -standing connections, such as Border Gateway Protocol (BGP) sessions, vulnerable to exploitation. This...protection measures should a discovered vulnerability reduce attack complexity. 14. SUBJECT TERMS BGP, TCP, blind attack, blind data attack 15. NUMBER OF...implementations may not properly implement blind attack protection, leaving long -standing connections, such as BorderGateway Protocol (BGP) sessions

  5. A psychosocial risk assessment and management framework to enhance response to CBRN terrorism threats and attacks.

    PubMed

    Lemyre, Louise; Clément, Mélanie; Corneil, Wayne; Craig, Lorraine; Boutette, Paul; Tyshenko, Michael; Karyakina, Nataliya; Clarke, Robert; Krewski, Daniel

    2005-01-01

    Evidence in the disaster mental health literature indicates that psychosocial consequences of terrorism are a critical component of chemical, biological, radiological, and nuclear (CBRN) events, both at the clinical level and the normal behavioral and emotional levels. Planning for such psychosocial aspects should be an integral part of emergency preparedness. As Canada and other countries build the capacity to prevent, mitigate, and manage CBRN threats and events, it is important to recognize the range of social, psychological, emotional, spiritual, behavioral, and cognitive factors that may affect victims and their families, communities, children, the elderly, responders, decision makers, and others at all phases of terrorism, from threat to post-impact recovery. A structured process to assist CBRN emergency planners, decision makers, and responders in identifying psychosocial risks, vulnerable populations, resources, and interventions at various phases of a CBRN event to limit negative psychosocial impacts and promote resilience and adaptive responses is the essence of our psychosocial risk assessment and management (P-RAM) framework. This article presents the evidence base and conceptual underpinnings of the framework, the principles underlying its design, its key elements, and its use in the development of decision tools for responders, planners, decision makers, and the general public to better assess and manage psychosocial aspects of CBRN threats or attacks.

  6. Timing of cyber conflict

    PubMed Central

    Axelrod, Robert; Iliev, Rumen

    2014-01-01

    Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran’s nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide. PMID:24474752

  7. A method for phenomenological and chemical kinetics study of autocatalytic reactive dissolution by optical microscopy. The case of uranium dioxide dissolution in nitric acid media

    NASA Astrophysics Data System (ADS)

    Marc, Philippe; Magnaldo, Alastair; Godard, Jérémy; Schaer, Éric

    2018-03-01

    Dissolution is a milestone of the head-end of hydrometallurgical processes, as the stabilization rates of the chemical elements determine the process performance and hold-up. This study aims at better understanding the chemical and physico-chemical phenomena of uranium dioxide dissolution reactions in nitric acid media in the Purex process, which separates the reusable materials and the final wastes of the spent nuclear fuels. It has been documented that the attack of sintering-manufactured uranium dioxide solids occurs through preferential attack sites, which leads to the development of cracks in the solids. Optical microscopy observations show that in some cases, the development of these cracks leads to the solid cleavage. It is shown here that the dissolution of the detached fragments is much slower than the process of the complete cleavage of the solid, and occurs with no disturbing phenomena, like gas bubbling. This fact has motivated the measurement of dissolution kinetics using optical microscopy and image processing. By further discriminating between external resistance and chemical reaction, the "true" chemical kinetics of the reaction have been measured, and the highly autocatalytic nature of the reaction confirmed. Based on these results, the constants of the chemical reactions kinetic laws have also been evaluated.

  8. Host tracking or cryptic adaptation? Phylogeography of Pediobius saulius (Hymenoptera, Eulophidae), a parasitoid of the highly invasive horse-chestnut leafminer

    PubMed Central

    Hernández-López, Antonio; Rougerie, Rodolphe; Augustin, Sylvie; Lees, David C; Tomov, Rumen; Kenis, Marc; Çota, Ejup; Kullaj, Endrit; Hansson, Christer; Grabenweger, Giselher; Roques, Alain; López-Vaamonde, Carlos

    2012-01-01

    Classical biological control is often advocated as a tool for managing invasive species. However, accurate evaluations of parasitoid species complexes and assessment of host specificity are impeded by the lack of morphological variation. Here, we study the possibility of host races/species within the eulophid wasp Pediobius saulius, a pupal generalist parasitoid that parasitize the highly invasive horse-chestnut leaf-mining moth Cameraria ohridella. We analysed the population genetic structure, host associations and phylogeographic patterns of P. saulius in Europe using the COI mitochondrial gene. This marker strongly supports a division into at least five highly differentiated parasitoid complexes, within two of which clades with differing degrees of host specialization were found: a Balkan clade that mainly (but not only) attacks C. ohridella and a more generalist European group that attacks many hosts, including C. ohridella. The divergence in COI (up to 7.6%) suggests the existence of cryptic species, although this is neither confirmed by nuclear divergence nor morphology. We do not find evidence of host tracking. The higher parasitism rates observed in the Balkans and the scarcity of the Balkan–Cameraria haplotypes out of the Balkans open the possibility of using these Balkan haplotypes as biological control agents of C. ohridella elsewhere in Europe. PMID:25568046

  9. Medical countermeasures for unwanted CBRN exposures: Part I chemical and biological threats with review of recent countermeasure patents.

    PubMed

    Singh, Vijay K; Garcia, Melissa; Wise, Stephen Y; Seed, Thomas M

    2016-12-01

    The threat of chemical, biological, radiological, and nuclear (CBRN) warfare has been addressed as the uppermost risk to national security since the terrorist attacks on 11 September 2001. Despite significant scientific advances over the past several decades toward the development of safe, non-toxic and effective countermeasures to combat CBRN threats, relatively few countermeasures have been approved by the US Food and Drug Administration (US FDA). Therefore, countermeasures capable of protecting the population from the effects of CBRN attack remain a significant unmet medical need. Chemical and biological (CB) threat agents can be particularly hazardous due to their effectiveness in small quantities and ease of distribution. Area covered: This article reviews the development of countermeasures for CB threats and highlights specific threats for which at least one countermeasure has been approved following the FDA Animal Rule. Patents of CB countermeasures since 2010 have been included. Expert opinion: Nine CB countermeasures have received FDA approval for use in humans following the Animal Rule, and a number of promising CB countermeasures are currently under development. In the next few years, we should expect to have multiple countermeasures approved by the FDA for each indication allowing for more flexible and effective treatment options.

  10. Individuals' decisions affecting radiation exposure after a nuclear explosion.

    PubMed

    Florig, H Keith; Fischhoff, Baruch

    2007-05-01

    In the aftermath of a nuclear attack, shelters can offer potentially important protection. How well they fill that role depends on a set of interdependent decisions made by the individuals and organizations that must prepare and use them. We look at three such decisions. For each, we begin with formal analysis of the consequences expected from different possible actions. Those analyses are, then, reviewed in terms of how individuals facing these choices will perceive them, given the information that they are likely to have. The first example suggests that preparing a home shelter according to guidelines from the Department of Homeland Security may not pass a cost-benefit test. The second example explores the use of readily available information about a blast to infer how urgently shelter should be sought. The third example considers when shelters should be left, suggesting that individuals with the best shelters and slowest evacuation speeds should evacuate last, if they have the provisions needed to remain. In each case, helping people to protect themselves requires prior risk analyses and communication development.

  11. The influence of water on the nanomechanical behavior of the plant biopolyester cutin as studied by AFM and solid-state NMR.

    PubMed

    Round, A N; Yan, B; Dang, S; Estephan, R; Stark, R E; Batteas, J D

    2000-11-01

    Atomic force microscopy and solid-state nuclear magnetic resonance have been used to investigate the effect of water absorption on the nanoscale elastic properties of the biopolyester, cutin, isolated from tomato fruit cuticle. Changes in the humidity and temperature at which fruits are grown or stored can affect the plant surface (cuticle) and modify its susceptibility to pathogenic attack by altering the cuticle's rheological properties. In this work, atomic force microscopy measurements of the surface mechanical properties of isolated plant cutin have been made as a first step to probing the impact of water uptake from the environment on surface flexibility. A dramatic decrease in surface elastic modulus (from approximately 32 to approximately 6 MPa) accompanies increases in water content as small as 2 wt %. Complementary solid-state nuclear magnetic resonance measurements reveal enhanced local mobility of the acyl chain segments with increasing water content, even at molecular sites remote from the covalent cross-links that are likely to play a crucial role in cutin's elastic properties.

  12. Remote inspection with multi-copters, radiological sensors and SLAM techniques

    NASA Astrophysics Data System (ADS)

    Carvalho, Henrique; Vale, Alberto; Marques, Rúben; Ventura, Rodrigo; Brouwer, Yoeri; Gonçalves, Bruno

    2018-01-01

    Activated material can be found in different scenarios, such as in nuclear reactor facilities or medical facilities (e.g. in positron emission tomography commonly known as PET scanning). In addition, there are unexpected scenarios resulting from possible accidents, or where dangerous material is hidden for terrorism attacks using nuclear weapons. Thus, a technological solution is important to cope with fast and reliable remote inspection. The multi-copter is a common type of Unmanned Aerial Vehicle (UAV) that provides the ability to perform a first radiological inspection in the described scenarios. The paper proposes a solution with a multi-copter equipped with on-board sensors to perform a 3D reconstruction and a radiological mapping of the scenario. A depth camera and a Geiger-Müler counter are the used sensors. The inspection is performed in two steps: i) a 3D reconstruction of the environment and ii) radiation activity inference to localise and quantify sources of radiation. Experimental results were achieved with real 3D data and simulated radiation activity. Experimental tests with real sources of radiation are planned in the next iteration of the work.

  13. Responding to chemical, biological, or nuclear terrorism: the indirect and long-term health effects may present the greatest challenge.

    PubMed

    Hyams, Kenneth C; Murphy, Frances M; Wessely, Simon

    2002-04-01

    The possibility of terrorists employing chemical, biological, or nuclear/ radiological (CBN) materials has been a concern since 1995 when sarin gas was dispersed in a Tokyo subway. Contingency planning almost exclusively involved detection. containment, and emergency health care for mass casualties. However, it is clear that even small-scale CBN incidents--like the recent spread of anthrax spores through the mail--can cause widespread confusion, fear, and psychological stress that have lasting effects on the health of affected communities and on a nation's sense of well-being. More emphasis therefore needs to be placed on indirect effects and on the medical, social, economic, and legal consequences that follow months to years afterward. To respond effectively to CBN attacks, a comprehensive strategy needs to be developed that includes not only emergency response, but also long-term health care, risk communication, research, and economic assistance. Organizing an effective response challenges government institutions because the issues involved--eligibility for health care, the effects of low-level exposure to toxic agents. stress-related illnesses, unlicensed therapeutics. financial compensation--are complex and controversial.

  14. Research on high power intra-channel crosstalk attack in optical networks

    NASA Astrophysics Data System (ADS)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  15. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    MedlinePlus

    ... a Heart Attack WARNING SIGNS OF HEART ATTACK, STROKE & CARDIAC ARREST HEART ATTACK WARNING SIGNS CHEST DISCOMFORT ... nausea or lightheadedness. Learn more about heart attack STROKE WARNING SIGNS Spot a stroke F.A.S.T.: - ...

  16. The role of mental disorder in attacks on European politicians 1990-2004.

    PubMed

    James, D V; Mullen, P E; Meloy, J R; Pathé, M T; Farnham, F R; Preston, L; Darnley, B

    2007-11-01

    The only systematic studies of attacks on public figures come from the USA. These studies de-emphasize the role of mental illness and suggest threats are of no predictive value. This study re-examines these questions through a study of attacks on European politicians. All non-terrorist attacks on elected politicians in Western Europe between 1990 and 2004 were analysed. Twenty-four attacks were identified, including five involving fatalities, and eight serious injuries. Ten attackers were psychotic, four drunk, nine politically motivated and one unclassifiable. Eleven attackers evidenced warning behaviours. The mentally disordered, most of whom gave warnings, were responsible for most of the fatal and seriously injurious attacks. A greater awareness of the link between delusional fixations on public figures and subsequent attacks could aid prevention. Equally importantly, recognition would encourage earlier intervention in people who, irrespective of whether they eventually attack, have delusional preoccupations which ruin their lives.

  17. An Exploration of Hypotheses that Explain Herbivore and Pathogen Attack in Restored Plant Communities

    PubMed Central

    Blaisdell, G. Kai; Roy, Bitty A.; Pfeifer-Meister, Laurel; Bridgham, Scott D.

    2015-01-01

    Many hypotheses address the associations of plant community composition with natural enemies, including: (i) plant species diversity may reduce enemy attack, (ii) attack may increase as host abundance increases, (iii) enemy spillover may lead to increased attack on one host species due to transmission from another host species, or enemy dilution may lead to reduced attack on a host that would otherwise have more attack, (iv) physical characteristics of the plant community may influence attack, and (v) plant vigor may affect attack. Restoration experiments with replicated plant communities provide an exceptional opportunity to explore these hypotheses. To explore the relative predictive strengths of these related hypotheses and to investigate the potential effect of several restoration site preparation techniques, we surveyed arthropod herbivore and fungal pathogen attack on the six most common native plant species in a restoration experiment. Multi-model inference revealed a weak but consistent negative correlation with pathogen attack and host diversity across the plant community, and no correlation between herbivory and host diversity. Our analyses also revealed host species-specific relationships between attack and abundance of the target host species, other native plant species, introduced plant species, and physical community characteristics. We found no relationship between enemy attack and plant vigor. We found minimal differences in plant community composition among several diverse site preparation techniques, and limited effects of site preparation techniques on attack. The strongest associations of community characteristics with attack varied among plant species with no community-wide patterns, suggesting that no single hypothesis successfully predicts the dominant community-wide trends in enemy attack. PMID:25699672

  18. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the computational cost. The proposed algorithm is validated through a linearized longitudinal motion of a UAV example. Finally, we propose an attack attenuation strategy via the controller design for CPSs that are robust to various types of cyber attacks. While the previous studies have investigated a secure control by assuming a specific attack strategy, in this research we propose a hybrid robust control scheme that contains multiple sub-controllers, each matched to a specific type of cyber attacks. Then the system can be adapted to various cyber attacks (including those that are not assumed for sub-controller design) by switching its sub-controllers to achieve the best performance. Then, a method for designing a secure switching logic to counter all possible cyber attacks is proposed and it verifies mathematically the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by an example with the hybrid H2 - H-infinity controller applied to a UAV example.

  19. Method for Integrated Simulation (MINTSIM)

    DTIC Science & Technology

    1976-01-01

    sorties allocated to attack SAMs. FAPA = fraction of striking aircraft attacking air bases which attack parked aircraft in the open. TAAB...each striking aircraft. FAS = fraction of striking aircraft attacking air bases which attack sheltered aircraft. (NOTE: FAPA + FAS = 1.0

  20. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less

  1. Web Forms and Untraceable DDoS Attacks

    NASA Astrophysics Data System (ADS)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  2. Replacement Attack: A New Zero Text Watermarking Attack

    NASA Astrophysics Data System (ADS)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  3. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  4. Simulation of Attacks for Security in Wireless Sensor Network.

    PubMed

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  5. Heartburn or Chest Pain: When Is It Heart Attack?

    MedlinePlus

    Heartburn or heart attack: When to worry Severe heartburn and heart attack can be hard to tell apart. Understand how they typically ... flow to your heart (angina) or an actual heart attack. Heartburn, angina and heart attack may feel very ...

  6. Know the Warning Signs of a Heart Attack

    MedlinePlus

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  7. Percolation of localized attack on isolated and interdependent random networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2014-03-01

    Percolation properties of isolated and interdependent random networks have been investigated extensively. The focus of these studies has been on random attacks where each node in network is attacked with the same probability or targeted attack where each node is attacked with a probability being a function of its centrality, such as degree. Here we discuss a new type of realistic attacks which we call a localized attack where a group of neighboring nodes in the networks are attacked. We attack a randomly chosen node, its neighbors, and its neighbor of neighbors and so on, until removing a fraction (1 - p) of the network. This type of attack reflects damages due to localized disasters, such as earthquakes, floods and war zones in real-world networks. We study, both analytically and by simulations the impact of localized attack on percolation properties of random networks with arbitrary degree distributions and discuss in detail random regular (RR) networks, Erdős-Rényi (ER) networks and scale-free (SF) networks. We extend and generalize our theoretical and simulation results of single isolated networks to networks formed of interdependent networks.

  8. Stealthy false data injection attacks using matrix recovery and independent component analysis in smart grid

    NASA Astrophysics Data System (ADS)

    JiWei, Tian; BuHong, Wang; FuTe, Shang; Shuaiqi, Liu

    2017-05-01

    Exact state estimation is vital important to maintain common operations of smart grids. Existing researches demonstrate that state estimation output could be compromised by malicious attacks. However, to construct the attack vectors, a usual presumption in most works is that the attacker has perfect information regarding the topology and so on even such information is difficult to acquire in practice. Recent research shows that Independent Component Analysis (ICA) can be used for inferring topology information which can be used to originate undetectable attacks and even to alter the price of electricity for the profits of attackers. However, we found that the above ICA-based blind attack tactics is merely feasible in the environment with Gaussian noises. If there are outliers (device malfunction and communication errors), the Bad Data Detector will easily detect the attack. Hence, we propose a robust ICA based blind attack strategy that one can use matrix recovery to circumvent the outlier problem and construct stealthy attack vectors. The proposed attack strategies are tested with IEEE representative 14-bus system. Simulations verify the feasibility of the proposed method.

  9. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    PubMed Central

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  10. TANDI: threat assessment of network data and information

    NASA Astrophysics Data System (ADS)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  11. Preparedness of Belgian civil hospitals for chemical, biological, radiation, and nuclear incidents: are we there yet?

    PubMed

    Mortelmans, Luc J M; Van Boxstael, Sam; De Cauwer, Harald G; Sabbe, Marc B

    2014-08-01

    As one of Europe's most densely populated countries with multiple nuclear installations and a prominent petrochemical industry, Belgium is at some reasonable risk for terrorist attacks or accidental chemical, biological, radiation, and nuclear (CBRN) incidents. We hypothesize that local hospitals are not sufficiently prepared to deal with these incidents. All 138 Belgian hospitals with an emergency department (ED) were sent a survey on their preparedness. Data on hospital disaster planning, risk perception, availability of decontamination units, personal protective equipment, antidotes, radiation detection, infectiologists, isolation measures, and staff training were collected. The response rate was 72%. Although 71% of hospitals reported being at risk for CBRN incidents, only 53% planned for the same in their disaster plans. Only 11% of hospitals had decontamination facilities in front of or at the ED entrance and only 6% had appropriate personal protective equipment for triage and decontaminating teams. Atropine was available at all centers, but more specific antidotes such as hydroxycobolamine, thiosulphate, or pralidoxime were less available (47, 47, and 19%, respectively). Six percent of hospitals had radiodetection equipment with an alarm function and 14% had a nuclear specialist available 24/7. Infectiologists were continuously available in 26% of the total EDs surveyed. Individual isolation facilities were present in 36% of the EDs, and isolation facilities capable of housing larger groups were present in 9%. University hospitals were significantly better prepared than community hospitals. There are serious gaps in hospital preparedness for CBRN incidents in Belgium. Lack of financial resources is a major obstacle in achieving sufficient preparedness.

  12. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  13. Pre-attack signs and symptoms in cluster headache: Characteristics and time profile.

    PubMed

    Snoer, Agneta; Lund, Nunu; Beske, Rasmus; Jensen, Rigmor; Barloese, Mads

    2018-05-01

    Introduction In contrast to the premonitory phase of migraine, little is known about the pre-attack (prodromal) phase of a cluster headache. We aimed to describe the nature, prevalence, and duration of pre-attack symptoms in cluster headache. Methods Eighty patients with episodic cluster headache or chronic cluster headache, according to ICHD-3 beta criteria, were invited to participate. In this observational study, patients underwent a semi-structured interview where they were asked about the presence of 31 symptoms/signs in relation to a typical cluster headache attack. Symptoms included previously reported cluster headache pre-attack symptoms, premonitory migraine symptoms and accompanying symptoms of migraine and cluster headache. Results Pre-attack symptoms were reported by 83.3% of patients, with an average of 4.25 (SD 3.9) per patient. Local and painful symptoms, occurring with a median of 10 minutes before attack, were reported by 70%. Local and painless symptoms and signs, occurring with a median of 10 minutes before attack, were reported by 43.8% and general symptoms, occurring with a median of 20 minutes before attack, were reported by 62.5% of patients. Apart from a dull/aching sensation in the attack area being significantly ( p < 0.05) more frequent among men and episodic patients, compared with women and chronic patients respectively, no other differences in the prevalence of pre-attack symptoms were identified between groups. Conclusion Pre-attack symptoms are frequent in cluster headache. Since the origin of cluster headache attacks is still unresolved, studies of pre-attack symptoms could contribute to the understanding of cluster headache pathophysiology. Furthermore, identification and recognition of pre-attack symptoms could potentially allow earlier abortive treatment.

  14. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    PubMed

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  15. Hereditary Angioedema Attacks Resolve Faster and Are Shorter after Early Icatibant Treatment

    PubMed Central

    Maurer, Marcus; Kaplan, Allen; Investigators, on behalf of I. O. S.

    2013-01-01

    Background Attacks of hereditary angioedema (HAE) are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. Objective To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. Methods The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009–February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. Results Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥1 hour (6.1 hours versus 16.8 hours [p<0.001]). Similar significant effects were observed for <2 hours versus ≥2 hours (7.2 hours versus 20.2 hours [p<0.001]) and <5 hours versus ≥5 hours (8.0 hours versus 23.5 hours [p<0.001]). Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]). Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. Conclusion Early blockade of the bradykinin B2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution. PMID:23390491

  16. Adaptive optimisation-offline cyber attack on remote state estimator

    NASA Astrophysics Data System (ADS)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  17. Public knowledge of heart attack symptoms in Beijing residents.

    PubMed

    Zhang, Qing-Tan; Hu, Da-Yi; Yang, Jin-Gang; Zhang, Shou-Yan; Zhang, Xin-Quan; Liu, Shu-Shan

    2007-09-20

    Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy, and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care. Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack. A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006. Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community. A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms. Public knowledge of common heart attack symptoms as well as less common heart attack symptoms is deficient in Beijing residents. But their knowledge of calling emergency medical services when someone is having a heart attack is relatively adequate. Public health efforts are needed to increase the recognition of the major heart attack symptoms in both the general public and groups at high risk for an acute cardiac event, especially in socioeconomically disadvantaged subgroups, including persons with low education level, low household income, and no health insurance coverage.

  18. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bentz, A; Buddemeier, B; Dombroski, M

    Following the events of September 11, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet,more » there is still much to learn about how to best respond to an IND event. Understanding the state of knowledge, identifying gaps, and making recommendations for how to fill those gaps, this paper will provide a framework under which past findings can be understood and future research can fit. The risk of an improvised nuclear device (IND) detonation may seem unlikely; and while this is hopefully true, due to its destructive capability, IND events must be prepared for. Many people still live under the Cold War mentality that if a city is attacked with a nuclear weapon, there is little chance of survival. This assumption, while perhaps true in the case of multiple, thermonuclear weapons exchanges, does not hold for the current threat. If a single IND were detonated in the United States, there would be many casualties at the point of impact; however, there would also be many survivors and the initial response by two major groups will mean the difference between life and death for many people. These groups are the first responders and the public. Understanding how these two groups prepare, react and interact will improve response to nuclear terrorism. Figure 1 provides a visualization of the response timeline of an IND event. For the purposes of this assessment, it is assumed that to accurately inform the public, three functions need to be fulfilled by response personnel, namely planning, developing situational awareness, and developing a public message. Planning varies widely from city to city, and to date no comprehensive study has been completed to assess how individual cities are progressing with preparation plans. Developing situational awareness about an IND detonation has been well researched over the years, yet it is far from fully understood. While messaging is an integral component to response, it is one that suffers from a dearth of knowledge. The public will have a certain level of education and preparation. After the detonation the public will respond naturally and upon receiving the responders message will react to the message and may modify their behavior accordingly. Reviewing the nodes under both headings, responders and public will help better prepare the country to meet the challenges of an IND attack.« less

  20. Improving the Rainbow Attack by Reusing Colours

    NASA Astrophysics Data System (ADS)

    Ågren, Martin; Johansson, Thomas; Hell, Martin

    Hashing or encrypting a key or a password is a vital part in most network security protocols. The most practical generic attack on such schemes is a time memory trade-off attack. Such an attack inverts any one-way function using a trade-off between memory and execution time. Existing techniques include the Hellman attack and the rainbow attack, where the latter uses different reduction functions ("colours") within a table.

  1. Changes in calcium and iron levels in the brains of rats during kainate induced epilepsy

    NASA Astrophysics Data System (ADS)

    Ren, Min-Qin; Ong, Wei-Yi; Makjanic, Jagoda; Watt, Frank

    1999-10-01

    Epilepsy is a recurrent disorder of cerebral function characterised by sudden brief attacks of altered consciousness, motor activity or sensory phenomena, and affects approximately 1% of the population. Kainic acid injection induces neuronal degeneration in rats, is associated with glial hypertrophy and proliferation in the CA3-CA4 fields of hippocampal complex, and is a model for temporal lobe epilepsy. In this study we have applied Nuclear Microscopy to the investigation of the elemental changes within the hippocampus and the cortex areas of the rat brain following kainate injection. Analyses of unstained freeze dried tissue sections taken at 1 day and 1, 2, 3 and 4 weeks following injection were carried out using the Nuclear Microscopy facility at the Research Centre for Nuclear Microscopy, National University of Singapore. Quantitative analysis and elemental mapping indicates that there are significant changes in the calcium levels and distributions in the hippocampus as early as 1 day following injection. Preliminary results indicate a rapid increase in cellular calcium. High levels of calcium can activate calcium dependent proteins and phospholipases. Activation of phospholipase A 2 can be harmful to surrounding neurons through free radical damage. In addition to observed increases in calcium, there was evidence of increases in iron levels. This is consistent with measurements in other degenerative brain disorders, and may signal a late surge in free radical production.

  2. Simulation of Attacks for Security in Wireless Sensor Network

    PubMed Central

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  3. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  4. The anatomy of a shark attack: a case report and review of the literature.

    PubMed

    Caldicott, D G; Mahajani, R; Kuhn, M

    2001-07-01

    Shark attacks are rare but are associated with a high morbidity and significant mortality. We report the case of a patient's survival from a shark attack and their subsequent emergency medical and surgical management. Using data from the International Shark Attack File, we review the worldwide distribution and incidence of shark attack. A review of the world literature examines the features which make shark attacks unique pathological processes. We offer suggestions for strategies of management of shark attack, and techniques for avoiding adverse outcomes in human encounters with these endangered creatures.

  5. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    NASA Astrophysics Data System (ADS)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  6. Novel Method For Low-Rate Ddos Attack Detection

    NASA Astrophysics Data System (ADS)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  7. Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment

    NASA Astrophysics Data System (ADS)

    Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung

    2016-07-01

    Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.

  8. An entangling-probe attack on Shor's algorithm for factorization

    NASA Astrophysics Data System (ADS)

    Azuma, Hiroo

    2018-02-01

    We investigate how to attack Shor's quantum algorithm for factorization with an entangling probe. We show that an attacker can steal an exact solution of Shor's algorithm outside an institute where the quantum computer is installed if he replaces its initialized quantum register with entangled qubits, namely the entangling probe. He can apply arbitrary local operations to his own probe. Moreover, we assume that there is an unauthorized person who helps the attacker to commit a crime inside the institute. He tells garbage data obtained from measurements of the quantum register to the attacker secretly behind a legitimate user's back. If the attacker succeeds in cracking Shor's algorithm, the legitimate user obtains a random answer and does not notice the attacker's illegal acts. We discuss how to detect the attacker. Finally, we estimate a probability that the quantum algorithm inevitably makes an error, of which the attacker can take advantage.

  9. Use of the Panic Attack Questionnaire-IV to assess non-clinical panic attacks and limited symptom panic attacks in student and community samples.

    PubMed

    Norton, Peter J; Zvolensky, Michael J; Bonn-Miller, Marcel O; Cox, Brian J; Norton, G Ron

    2008-10-01

    Since its development in the mid-1980s, the Panic Attack Questionnaire (PAQ) has been one of the more, if not the most, commonly used self-report tools for assessing panic attacks. The usage of the instrument, however, has come amid potential concerns that instructions and descriptions may lead to an over-estimate of the prevalence of panic attacks. Furthermore, the instrument has not been revised since 1992, despite changes in DSM-IV criteria and more recent developments in the understanding of panic attacks. As a result, this paper describes a revision of the PAQ to improve the instruction and descriptive set, and to fully assess features of panic derived from recent conceptualizations. Students meeting DSM-IV panic attack criteria and those endorsing panic attacks, but not meeting criteria, showed few differences with the exception that those not meeting DSM-IV criteria typically reported a longer onset-to-peak intensity time than did Panickers. Results were cross-validated and extended using an independent Community Sample. A full descriptive phenomenology of panic attacks is described, and future directions for studying panic attacks using the PAQ are presented.

  10. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    PubMed Central

    Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-01-01

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework. PMID:29065461

  11. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    PubMed

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  12. Lethality of sea lamprey attacks on lake trout in relation to location on the body surface

    USGS Publications Warehouse

    Bergstedt, Roger A.; Schneider, Clifford P.; O'Gorman, Robert

    2001-01-01

    We compared the locations of healed attack marks of the sea lamprey Petromyzon marinus on live lake trout Salvelinus namaycush with those of unhealed attack marks on dead lake trout to determine if the lethality of a sea lamprey attack was related to attack location. Lake trout were collected from Lake Ontario, live fish with gill nets in September 1985 and dead fish with trawls in October 1983−1986. Attack location was characterized by the percent distances from snout to tail and from the ventral to the dorsal midline. Kolmogorov−Smirnov two-sample tests did not detect significant differences in the distribution of attack location along either the anteroposterior axis or the dorsoventral axis. When attack locations were grouped into six anatomical regions historically used to record sea lamprey attacks, dead fish did not exhibit a significantly higher proportion of attacks in the more anterior regions. Even if the differences in attack location on live and dead fish were significant, they were too small to imply substantial spatial differences in attack lethality that should be accounted for when modeling the effects of sea lampreys feeding on lake trout. We suggest that the tendency for sea lamprey attacks to occur on the anterior half of the fish is related to the lower amplitude of lateral body movement there during swimming and thus the lower likelihood of being dislodged.

  13. Serial agonistic attacks by greylag goose families, Anser anser, against the same opponent

    PubMed Central

    Scheiber, Isabella B.R.; Kotrschal, Kurt; Weiß, Brigitte M.

    2011-01-01

    It is known from primates that alliance partners may support each other’s interests in competition with others, for example, through repeated agonistic attacks against a particular individual. We examined serial aggressive interactions between greylag goose families and other flock members. We found that repeated attacks towards the same individual were common and that up to five serial attacks by family members followed an initial attack. Family size did not affect the frequency of such serial attacks. Juvenile geese evidently benefited most from active social support through serial attacks. About 60% of the juveniles’ lost primary interactions were subsequently reversed by another family member. This may be one of the reasons why juveniles rank higher in the social hierarchy than would be expected from their age and size alone. Losses in serial attacks predominantly occurred against other, presumably higher-ranking, family geese and ganders. We propose three major functions/consequences of serial attacks. Analogous to primates, serial attacks in greylag geese may serve to reinforce a losing experience of an opponent defeated in a preceding attack. On the side of the winning family, serial attacks may reinforce the experience of winning. Both winning and losing experiences are linked with physiological consequences in higher vertebrates, affecting the future social performance of winners or losers. Finally, serial attacks may signal the agonistic potential of a family to other flock members. This is supported by heart rate data, which indicate that greylags are competent to interpret third-party relationships. PMID:21984838

  14. Khyâl attacks: a key idiom of distress among traumatized cambodia refugees.

    PubMed

    Hinton, Devon E; Pich, Vuth; Marques, Luana; Nickerson, Angela; Pollack, Mark H

    2010-06-01

    Traumatized Cambodian refugees with PTSD often complain of khyâl attacks. The current study investigates khyâl attacks from multiple perspectives and examines the validity of a model of how khyâl attacks are generated. The study found that khyâl attacks had commonly been experienced in the previous 4 weeks and that their severity was strongly correlated with the severity of PTSD (PTSD Checklist). It was found that khyâl attacks were triggered by various processes--such as worry, trauma recall, standing up, going to a mall--and that khyâl attacks almost always met panic attack criteria. It was also found that during a khyâl attack there was great fear that death might occur from bodily dysfunction. It was likewise found that a complex nosology of khyâl attacks exists that rates the attacks on a scale of severity, that the severity determines how the khyâl attacks should be treated and that those treatments are often complex. As illustrated by the article, khyâl attacks constitute a key aspect of trauma ontology in this group, a culturally specific experiencing of anxiety and trauma-related disorder. The article also contributes to the study of trauma somatics, that is, to the study of how trauma results in specific symptoms in a specific cultural context, showing that a key part of the trauma-somatic reticulum is often a cultural syndrome.

  15. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    NASA Astrophysics Data System (ADS)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to separate the power grid into several subnetworks, then distributed protection strategy is applied to each subnetwork.

  16. Public knowledge of heart attack in a Nepalese population survey.

    PubMed

    Limbu, Yuba R; Malla, Rabi; Regmi, Shyam R; Dahal, Ramesh; Nakarmi, Hari L; Yonzan, Ganesh; Gartaula, Ritu P

    2006-01-01

    Limited knowledge of heart attack symptoms may prevent patients from seeking time-dependent thrombolytic therapy, an intervention that offers impressive survival benefit. Previous studies carried out in developed countries demonstrated a deficit of knowledge about a wide range of heart attack symptoms. The aim of this study was to describe knowledge of heart attack, knowledge of heart attack symptoms, and anticipated first response to symptoms among the lay public in Nepal. A total of 1192 participants (657 men and 535 women age 16 to 88 years old) were interviewed in a cross-sectional manner. Those <16 years of age, all health professionals, and individuals with a history of heart attack were excluded. A total of 862 (72.3%) participants had heard of heart attack. Significantly more male than female participants had heard of heart attack (P <.001). Of the respondents, 91.7% with >or=10 years of education (ED-2) had heard of heart of attack, whereas only 54% respondents with <10 years of education or who were illiterate (unable to read and write) (ED-1) had heard of heart attack, and in both the male and female populations, a higher percentage of the ED-2 group had heard of heart attack than the ED-1 group (92.6% vs. 60% and 85.6% vs. 49.6%, respectively). A significantly higher number of respondents from 31 to 50 years of age (AGE-2) had heard of heart attack than those 16 to 30 years of age (AGE-1) and those >50 years of age (AGE-3) (P <.001). Among 862 respondents who had heard of heart attack, 21.3% could not name any heart attack symptoms. A total of 16 different heart attack symptoms were named. Fainting or collapsing (48%), chest pain (22.4%), shortness of breath (9%), dizziness (8.4%), palpitations (7.4%), and sweating (7.4%) were the leading symptoms named by respondents. Fainting or collapsing and chest pain and shortness of breath were named more frequently among the ED-2 group respondents and the AGE-3 group men. Only 3.7% could name >or=2 typical heart attack symptoms. A significantly larger number of the ED-2 group named >or=2 typical symptoms than their counterparts (P <0.001). A large number (77.6%) of respondents preferred immediate hospital referral and/or doctor consultation after a heart attack. In Nepal, better-educated men are more aware of heart attack. Fainting or collapsing and chest pain and shortness of breath were leading heart attack symptoms named by the general population. Public heart attack awareness is not adequate and knowledge of wide range of heart attack symptoms is deficient in the Nepalese general population.

  17. Radiation scientists and homeland security.

    PubMed

    Rose, Christopher M

    2002-05-01

    Radiation scientists represent an important resource in homeland defense. Security analysts worry that a crude but deadly radiological bomb might be fashioned from stolen nuclear material and a few sticks of dynamite. Such a device could kill dozens, hundreds, and possibly thousands and could contaminate a square mile or more. Emergency workers may call upon radiation scientists to aid the injured. Educational materials are available on the ACR, ASTRO, and RRS websites, linked to the Armed Forces Radiobiology Research Institute and the Oak Ridge National Laboratory, to provide radiation workers material that they can use to help emergency room and civil defense personnel after a terrorist attack. Radiation scientists are urged to obtain these materials and contact their local hospital and public health authorities to volunteer their services and expertise.

  18. Interest Rate Demands and Television Viewing-Is a Single Exposure More Influential Than Routine Viewing?

    PubMed

    Hetsroni, Amir; Reizer, Abira; Ben Zion, Uri

    2017-04-01

    This study examined the impact of media consumption, and particularly exposure to television, on decisions regarding interest rate demands. One hundred and fifty-four participants were randomly divided into two groups: in the manipulation group, participants were exposed to a news clip about an Iranian nuclear attack on Israel, whereas in the control group, the participants were not exposed to the film. Both groups filled a questionnaires regarding their interest rate requirements in different situations, their media conception behaviors, and demographic questionnaires. Frequent routine viewing increased the interest rate demands only among participants in the manipulation group, but the manipulation itself did not have a significant effect on interest rate demands. The results are explained in terms of cultivation theory.

  19. Ground wave emergency network final operational capability. Environmental assessment for southern Arkansas relay node site no. RN 8C912AR

    NASA Astrophysics Data System (ADS)

    1993-02-01

    The Ground Wave Emergency Network (GWEN) is a radio communication system designed to relay emergency messages between strategic military areas in the continental United States. The system is immune to the effects of high-attitude electromagnetic pulse (HEMP) energy surges caused by nuclear bursts in the ionosphere that would disrupt conventional communications equipment such as telephones and shortwave radios. A failure of such equipment would prevent timely communications among top military and civilian leaders and strategic Air Force locations and prevent U.S. assessment and retaliation during an attack. GWEN is an essential part of a defense modernization program to upgrade and improve our nation's communications system, thereby strengthening deterrence.

  20. Activation analysis study on Li-ion batteries for nuclear forensic applications

    NASA Astrophysics Data System (ADS)

    Johnson, Erik B.; Whitney, Chad; Holbert, Keith E.; Zhang, Taipeng; Stannard, Tyler; Christie, Anthony; Harper, Peter; Anderson, Blake; Christian, James F.

    2015-06-01

    The nuclear materials environment has been increasing significantly in complexity over the past couple of decades. The prevention of attacks from nuclear weapons is becoming more difficult, and nuclear forensics is a deterrent by providing detailed information on any type of nuclear event for proper attribution. One component of the nuclear forensic analysis is a measurement of the neutron spectrum. As an example, the neutron component provides information on the composition of the weapons, whether boosting is involved or the mechanisms used in creating a supercritical state. As 6Li has a large cross-section for thermal neutrons, the lithium battery is a primary candidate for assessing the neutron spectrum after detonation. The absorption process for 6Li yields tritium, which can be measured at a later point after the nuclear event, as long as the battery can be processed in a manner to successfully extract the tritium content. In addition, measuring the activated constituents after exposure provides a means to reconstruct the incident neutron spectrum. The battery consists of a spiral or folded layers of material that have unique, energy dependent interactions associated with the incident neutron flux. A detailed analysis on the batteries included a pre-irradiated mass spectrometry analysis to be used as input for neutron spectrum reconstruction. A set of batteries were exposed to a hard neutron spectrum delivered by the University of Massachusetts, Lowell research reactor Fast Neutron Irradiator (FNI). The gamma spectra were measured from the batteries within a few days and within a week after the exposure to obtain sufficient data on the activated materials in the batteries. The activity was calculated for a number of select isotopes, indicating the number of associated neutron interactions. The results from tritium extraction are marginal. A measurable increase in detected particles (gammas and betas) below 50 keV not self-attenuated by the battery was observed, yet as the spectra are coarse, the gamma information is not separable from tritium spectra. The activation analysis was successful, and the incident neutron spectrum was reconstructed using materials found in lithium batteries.

  1. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  2. The effect of climate variability on urinary stone attacks: increased incidence associated with temperature over 18 °C: a population-based study.

    PubMed

    Park, Hyoung Keun; Bae, Sang Rak; Kim, Satbyul E; Choi, Woo Suk; Paick, Sung Hyun; Ho, Kim; Kim, Hyeong Gon; Lho, Yong Soo

    2015-02-01

    The aim of this study was to evaluate the effect of seasonal variation and climate parameters on urinary tract stone attack and investigate whether stone attack is increased sharply at a specific point. Nationwide data of total urinary tract stone attack numbers per month between January 2006 and December 2010 were obtained from the Korean Health Insurance Review and Assessment Service. The effects of climatic factors on monthly urinary stone attack were assessed using auto-regressive integrated moving average (ARIMA) regression method. A total of 1,702,913 stone attack cases were identified. Mean monthly and monthly average daily urinary stone attack cases were 28,382 ± 2,760 and 933 ± 85, respectively. The stone attack showed seasonal trends of sharp incline in June, a peak plateau from July to September, and a sharp decline after September. The correlation analysis showed that ambient temperature (r = 0.557, p < 0.001) and relative humidity (r = 0.513, p < 0.001) were significantly associated with urinary stone attack cases. However, after adjustment for trends and seasonality, ambient temperature was the only climate factor associated with the stone attack cases in ARIMA regression test (p = 0.04). Threshold temperature was estimated as 18.4 °C. Risk of urinary stone attack significantly increases 1.71% (1.02-2.41 %, 95% confidence intervals) with a 1 °C increase of ambient temperature above the threshold point. In conclusion, monthly urinary stone attack cases were changed according to seasonal variation. Among the climates variables, only temperature had consistent association with stone attack and when the temperature is over 18.4 °C, urinary stone attack would be increased sharply.

  3. Reexperiencing symptoms, dissociation, and avoidance behaviors in daily life of patients with PTSD and patients with panic disorder with agoraphobia.

    PubMed

    Pfaltz, Monique C; Michael, Tanja; Meyer, Andrea H; Wilhelm, Frank H

    2013-08-01

    Panic attacks are frequently perceived as life threatening. Panic disorder (PD) patients may therefore experience symptoms of posttraumatic stress disorder (PTSD). The authors explored this in 28 healthy controls, 17 PTSD patients, and 24 PD patients with agoraphobia who completed electronic diaries 36 times during 1 week. Patient groups frequently reported dissociation as well as thoughts, memories, and reliving of their trauma or panic attacks. PTSD patients reported more trauma/panic attack thoughts (incidence rate ratio [IRR] = 2.9) and memories (IRR = 2.8) than PD patients. Patient groups relived their trauma or panic attacks equally frequently, and reported comparable bodily reactions and distress associated with trauma or panic attack memories. Clinical groups avoided trauma or panic attack reminders more often than healthy controls (avoidance of trauma- or panic attack-related thoughts (IRR = 8.0); avoidance of things associated with the trauma or panic attack (IRR = 40.7). PD patients avoided trauma or panic attack reminders less often than PTSD patients (avoidance of trauma- or panic attack-related thoughts [IRR = 2.5]; avoidance of things associated with the trauma or panic attack [IRR = 4.1]), yet these differences were nonsignificant when controlling for functional impairment. In conclusion, trauma-like symptoms are common in PD with agoraphobia and panic attacks may be processed similarly as trauma in PTSD. Copyright © 2013 International Society for Traumatic Stress Studies.

  4. False Positive and False Negative Effects on Network Attacks

    NASA Astrophysics Data System (ADS)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  5. The non-trusty clown attack on model-based speaker recognition systems

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2015-03-01

    Biometric detectors for speaker identification commonly employ a statistical model for a subject's voice, such as a Gaussian Mixture Model, that combines multiple means to improve detector performance. This allows a malicious insider to amend or append a component of a subject's statistical model so that a detector behaves normally except under a carefully engineered circumstance. This allows an attacker to force a misclassification of his or her voice only when desired, by smuggling data into a database far in advance of an attack. Note that the attack is possible if attacker has access to database even for a limited time to modify victim's model. We exhibit such an attack on a speaker identification, in which an attacker can force a misclassification by speaking in an unusual voice, and replacing the least weighted component of victim's model by the most weighted competent of the unusual voice of the attacker's model. The reason attacker make his or her voice unusual during the attack is because his or her normal voice model can be in database, and by attacking with unusual voice, the attacker has the option to be recognized as himself or herself when talking normally or as the victim when talking in the unusual manner. By attaching an appropriately weighted vector to a victim's model, we can impersonate all users in our simulations, while avoiding unwanted false rejections.

  6. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  7. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  8. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  9. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    PubMed

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  10. Security Assessment of Cyberphysical Digital Microfluidic Biochips.

    PubMed

    Ali, Sk Subidh; Ibrahim, Mohamed; Sinanoglu, Ozgur; Chakrabarty, Krishnendu; Karri, Ramesh

    2016-01-01

    A digital microfluidic biochip (DMFB) is an emerging technology that enables miniaturized analysis systems for point-of-care clinical diagnostics, DNA sequencing, and environmental monitoring. A DMFB reduces the rate of sample and reagent consumption, and automates the analysis of assays. In this paper, we provide the first assessment of the security vulnerabilities of DMFBs. We identify result-manipulation attacks on a DMFB that maliciously alter the assay outcomes. Two practical result-manipulation attacks are shown on a DMFB platform performing enzymatic glucose assay on serum. In the first attack, the attacker adjusts the concentration of the glucose sample and thereby modifies the final result. In the second attack, the attacker tampers with the calibration curve of the assay operation. We then identify denial-of-service attacks, where the attacker can disrupt the assay operation by tampering either with the droplet-routing algorithm or with the actuation sequence. We demonstrate these attacks using a digital microfluidic synthesis simulator. The results show that the attacks are easy to implement and hard to detect. Therefore, this work highlights the need for effective protections against malicious modifications in DMFBs.

  11. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    PubMed

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  12. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    PubMed Central

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Results Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. Conclusion The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources. PMID:17274813

  13. Robustness analysis of interdependent networks under multiple-attacking strategies

    NASA Astrophysics Data System (ADS)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  14. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.

    PubMed

    Grosshans, Frédéric; Cerf, Nicolas J

    2004-01-30

    A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual Gaussian attack. Consequently, non-Gaussian coherent attacks do not need to be considered in the security analysis of such quantum cryptosystems.

  15. A comparison of the nature and correlates of panic attacks in the context of Panic Disorder and Social Anxiety Disorder.

    PubMed

    Brown, Lily A; LeBeau, Richard; Liao, Betty; Niles, Andrea N; Glenn, Daniel; Craske, Michelle G

    2016-01-30

    Panic attacks occurring outside of Panic Disorder are not well-understood despite their inclusion as a diagnostic specifier in the Diagnostic and Statistical Manual for Mental Disorders (DSM-5). This study compares panic attacks in the context of Panic Disorder compared to social anxiety in terms of their symptom frequency, severity, and clinical correlates. Participants (n=404) were interviewed using the Anxiety Disorders Interview Schedule (ADIS-IV-L; Brown et al., 1994), from which we analyzed interviewer ratings of panic attacks and panic attack symptoms, as well as other demographic and clinical characteristics. Panic attacks in the context of Panic Disorder were characterized by a greater number and severity of symptoms compared to panic attacks in the context of Social Anxiety Disorder, and were associated with a history of traumatization, inpatient psychiatric treatment, and benzodiazepine use. Social anxiety panic attacks were associated with reduced physical health concerns. Cognitive panic attack symptoms were more prevalent in Panic Disorder and were associated with a variety of poor clinical correlates. Panic attacks in the context of Panic Disorder are more severe than those in social anxiety, and this may be driven by cognitive disturbances during those attacks. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  16. Heart Attack Recovery FAQs

    MedlinePlus

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  17. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  18. Sensitivity to carbon dioxide in subjects with a single lifetime panic attack: possible clinical "bedside" predictive test for panic disorder after a first attack.

    PubMed

    Berzak, Elina; Reznik, Mila; Narsia, Oxana; Benjamin, Jonathan

    2004-01-01

    There is currently no way of knowing whether a patient who has recently had a single panic attack has incipient panic disorder. Sensitivity to carbon dioxide (CO2) is lower in healthy volunteers than in panic disorder patients. If this is also true of people who experience a single lifetime panic attack, it could be used as a prognostic test. Subjects with a single lifetime panic attack and subjects with panic disorder received an inhalation of 35% CO2. Subjects completed the panic symptoms scale (PSS), and also stated whether they considered that they had experienced an attack. None of 14 subjects with a single lifetime panic attack, compared to 7 of 17 subjects with panic disorder (P=.009), had an attack. The PSS also distinguished between the groups. The 35% CO2 challenge warrants further investigation as a predictive test after a first panic attack.

  19. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets.

    PubMed

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.

  20. The effect of nursing professional pay structures and pay levels on hospitals' heart attack outcomes.

    PubMed

    Brown, Mark P

    2006-01-01

    The effect of nursing professionals (i.e., nurse aid/orderly, licensed practical nurse, registered nurse) pay structures and pay levels on hospitals risk-adjusted heart attack outcomes was determined. Operationalizing hospitals' heart attack outcomes as their thirty-day risk-adjusted mortality rates, a positive curvilinear relation is hypothesized between pay dispersion and hospitals' heart attack outcomes, whereas a direct relation is hypothesized between pay level and hospitals' heart attack outcomes. Pay level is also hypothesized as a moderator of the relation between pay dispersion and hospitals' heart attack outcomes. Using a sample of 138 California hospitals, support is not found for either the curvilinear relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes, or the direct relation between nursing professionals' pay level and hospitals' heart attack outcomes. Support is found for the moderation hypothesis in which nursing professionals' pay level moderates the relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes. Implications for practice are discussed in light of the study's results.

  1. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    PubMed Central

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  2. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    PubMed Central

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  3. Heart Attack

    MedlinePlus

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  4. Microvascular Angina

    MedlinePlus

    ... to the Terms and Conditions and Privacy Policy Heart Attack Tools & Resources My Cardiac Coach What Is a ... Heart Attack Warning Signs: Patient sheet | Infographic | Quiz Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  5. Using the Domain Name System to Thwart Automated Client-Based Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so.more » Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.« less

  6. Incidence and impact of dog attacks on guide dogs in the UK.

    PubMed

    Brooks, A; Moxon, R; England, G C W

    2010-06-19

    In a retrospective survey, researchers identified 100 incidents of attacks on guide dogs by other dogs. These were reviewed in order to determine the number, severity and impact on the handler and dog, and the characteristics of the aggressors and victims. During the study period there were more than three attacks reported each month, with 61 per cent of the attacks being upon dogs that were in harness and working with an owner or trainer. The majority of the dogs that were attacked were male (62 per cent), and the breeds that were over-represented (relative to their prevalence in the general guide dog population) were the labrador and the golden retriever x flat-coated retriever crossbreed. Most of the attacks occurred in public places between 09.00 and 15.00 and the majority (61 per cent) of the attacking dogs were off the lead at the time of the attack. Thirty-eight per cent of the attacking dogs were of bull breeds, which were over-represented among attackers compared with the proportion of this breed type in the general dog population. Veterinary attention was sought after 41 per cent of the attacks, and in 19 per cent of instances there was injury to the handler or to a member of the public. The attacks were reported to have affected the working performance and behaviour of the victim dog in 45 per cent of the instances, and two dogs had to be subsequently withdrawn from working as guide dogs.

  7. Robustness and structure of complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai

    This dissertation covers the two major parts of my PhD research on statistical physics and complex networks: i) modeling a new type of attack -- localized attack, and investigating robustness of complex networks under this type of attack; ii) discovering the clustering structure in complex networks and its influence on the robustness of coupled networks. Complex networks appear in every aspect of our daily life and are widely studied in Physics, Mathematics, Biology, and Computer Science. One important property of complex networks is their robustness under attacks, which depends crucially on the nature of attacks and the structure of the networks themselves. Previous studies have focused on two types of attack: random attack and targeted attack, which, however, are insufficient to describe many real-world damages. Here we propose a new type of attack -- localized attack, and study the robustness of complex networks under this type of attack, both analytically and via simulation. On the other hand, we also study the clustering structure in the network, and its influence on the robustness of a complex network system. In the first part, we propose a theoretical framework to study the robustness of complex networks under localized attack based on percolation theory and generating function method. We investigate the percolation properties, including the critical threshold of the phase transition pc and the size of the giant component Pinfinity. We compare localized attack with random attack and find that while random regular (RR) networks are more robust against localized attack, Erdoḧs-Renyi (ER) networks are equally robust under both types of attacks. As for scale-free (SF) networks, their robustness depends crucially on the degree exponent lambda. The simulation results show perfect agreement with theoretical predictions. We also test our model on two real-world networks: a peer-to-peer computer network and an airline network, and find that the real-world networks are much more vulnerable to localized attack compared with random attack. In the second part, we extend the tree-like generating function method to incorporating clustering structure in complex networks. We study the robustness of a complex network system, especially a network of networks (NON) with clustering structure in each network. We find that the system becomes less robust as we increase the clustering coefficient of each network. For a partially dependent network system, we also find that the influence of the clustering coefficient on network robustness decreases as we decrease the coupling strength, and the critical coupling strength qc, at which the first-order phase transition changes to second-order, increases as we increase the clustering coefficient.

  8. Phenomenology of panic attacks: a descriptive study of panic disorder patients' self-reports.

    PubMed

    Aronson, T A; Logue, C M

    1988-01-01

    The phenomenology of panic disorder and panic attacks was systematically assessed in 46 consecutive patients. The results suggest that DSM-III criteria include several symptoms that are not frequently present during a panic attack and that DSM-III's characterization of a panic attack is imprecise and misleading. Panic attacks were found to vary in intensity, frequency, spontaneity, and associated symptoms. A panic attack typically presents as a unified symptom complex of psychic anxiety and multiple somatic symptoms in multiple body systems. It occurs in a crescendolike pattern, is self-limited, and often leaves the subject weak or shaken. The temporal course as much as the symptomatic presentation defines a panic attack.

  9. Finite Energy and Bounded Attacks on Control System Sensor Signals

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less

  10. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    PubMed Central

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  11. Cougar attacks on children: injury patterns and treatment.

    PubMed

    Kadesky, K M; Manarey, C; Blair, G K; Murphy, J J; Verchere, C; Atkinson, K

    1998-06-01

    Cougar attacks on humans appear to be on the rise. A review of all attacks on children was performed to determine the method of attack and injury patterns so that a treatment regimen as well as possible preventative measures could be determined. A review of all attacks, including attacks on children, was performed, including three recent attacks treated at our institution. Situation, adult supervision, patient age, injuries recorded, survival, and mode of attack, if known, were reviewed. There were 50 documented attacks on children with a 25% fatality rate. Most children were not alone at the time of the attack (92%), and in many instances adult supervision was present or nearby. Severe head and neck lacerations along with puncture wounds were the most common injury. Examples of typical cervical injuries include a nonfatal vertebral artery injury, phrenic nerve injury, a fatal internal carotid artery injury, and a fatal cervical spine injury. The cougar was rabid in two cases. Pasteurella resulted in late infections in two patients. Based on the pattern of injuries, the authors recommend aggressive evaluation for occult cervical injuries as well as surgical debridement. Antibiotics should cover oropharyngeal flora including Pasteurella multocida. Rabies prophylaxis is indicated. Adult supervision in wilderness areas is not necessarily protective.

  12. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    PubMed

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  13. Incidence and impact of dog attacks on guide dogs in the UK: an update.

    PubMed

    Moxon, R; Whiteside, H; England, G C W

    2016-04-09

    Data on dog attacks on Guide Dogs' stock were reviewed to investigate the characteristics of the attacks. An average of 11.2 attacks occurred each month. Nearly all of the attacks occurred in public areas, 68.4 per cent of victim dogs were qualified guide dogs and 55.5 per cent of victim dogs were working in harness when they were attacked. Guide Dogs' stock were injured in 43.2 per cent of attacks and veterinary costs for attacks were estimated at £34,514.30. Over 40 per cent of qualified guide dogs' working ability was affected and >20 per cent of qualified guide dogs required some time off from working after a dog attack. Twenty dogs were permanently withdrawn from the Guide Dogs' programme as a result of dog attacks, 13 of which were qualified and working with guide dog owners at the time of the withdrawal; this resulted in a financial cost of >£600,000 to the charity. More importantly perhaps, temporary and permanent withdrawals have a significant impact upon the mobility and independence of guide dog owners and in many cases significantly impacted their emotional well-being. British Veterinary Association.

  14. Childhood internalizing and externalizing problems predict the onset of clinical panic attacks over adolescence: the TRAILS study.

    PubMed

    Mathyssek, Christina M; Olino, Thomas M; Verhulst, Frank C; van Oort, Floor V A

    2012-01-01

    Panic attacks are a source of individual suffering and are an independent risk factor for later psychopathology. However, much less is known about risk factors for the development of panic attacks, particularly during adolescence when the incidence of panic attacks increases dramatically. We examined whether internalizing and externalizing problems in childhood predict the onset of panic attacks in adolescence. This study is part of the TRacking Adolescents' Individual Lives Survey (TRAILS), a Dutch longitudinal population cohort study (N = 1,584). Internalizing and Externalizing Problems were collected using the Youth Self-Report (YSR) and the parent-report Child Behavior Checklist (CBCL) at baseline (age 10-12). At age 18-20, DSM-IV defined panic attacks since baseline were assessed with the Composite International Diagnostic Interview (CIDI). We investigated whether early adolescent Internalizing and Externalizing Problems predicted panic attacks between ages 10-20 years, using survival analysis in univariate and multivariate models. There were N = 314 (19.8%) cases who experienced at least one DSM-IV defined panic attack during adolescence and N = 18 (1.2%) who developed panic disorder during adolescence. In univariate analyses, CBCL Total Problems, Internalizing Problems and three of the eight syndrome scales predicted panic attack onset, while on the YSR all broad-band problem scales and each narrow-band syndrome scale predicted panic attack onset. In multivariate analyses, CBCL Social Problems (HR 1.19, p<.05), and YSR Thought Problems (HR 1.15, p<.05) and Social Problems (HR 1.26, p<.01) predicted panic attack onset. Risk indicators of panic attack include the wide range of internalizing and externalizing problems. Yet, when adjusted for co-occurring problem behaviors, Social Problems were the most consistent risk factor for panic attack onsets in adolescence.

  15. Countermeasures for unintentional and intentional video watermarking attacks

    NASA Astrophysics Data System (ADS)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  16. Unstable Angina

    MedlinePlus

    ... Women This content was last reviewed July 2015. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ... Recovery FAQs • Heart Attack Tools & Resources • Support Network Heart Attack Tools & Resources My Cardiac Coach What Is a ...

  17. Acute Coronary Syndrome

    MedlinePlus

    ... angina? This content was last reviewed July 2015. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ... Recovery FAQs • Heart Attack Tools & Resources • Support Network Heart Attack Tools & Resources My Cardiac Coach What Is a ...

  18. Analysis of characteristics associated with reinjection of icatibant: Results from the icatibant outcome survey.

    PubMed

    Longhurst, Hilary J; Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Fabien, Vincent; Zanichelli, Andrea; Maurer, Marcus

    2015-01-01

    Phase 3 icatibant trials showed that most hereditary angioedema (HAE) (C1 inhibitor deficiency) acute attacks were treated successfully with one injection of icatibant, a selective bradykinin B2 receptor antagonist. We conducted a post hoc analysis of icatibant reinjection for HAE type I and II attacks in a real-world setting by using data from the Icatibant Outcome Survey, an ongoing observational study that monitors the safety and effectiveness of icatibant treatment. Descriptive retrospective analyses of icatibant reinjection were performed on Icatibant Outcome Survey data (February 2008 to December 2012). New attacks were defined as the onset of new symptoms after full resolution of the previous attack. Potential associations between the patient and attack characteristics and reinjection were explored by using logistic regression analysis. Icatibant was administered for 652 attacks in 170 patients with HAE type I or II. Most attacks (89.1%) were treated with a single icatibant injection. For attacks that required two or three injections, the second injection was given a median of 11.0 hours after the first injection, with 90.4% of second injections administered ≥6 hours after the first injection. Time to resolution and attack duration were significantly longer for two or three injections versus one icatibant injection (p < 0.0001 and p < 0.05, respectively). Multivariate logistic regression analysis identified sex, attack severity, and laryngeal attacks as significantly correlated with reinjection (all p ≤ 0.05). These factors did not remain predictors for reinjection when two outlier patients with distinct patterns of icatibant use were excluded. In this real-world setting, most HAE attacks resolved with one icatibant injection. There was no distinct profile for patients or attacks that required reinjection when outliers with substantially different patterns of use were excluded. Because new attacks were not distinguished from the recurrence of symptoms, reinjection rates may be slightly higher than shown here. Clinical trial identifier: NCT01034969.

  19. Enhanced diffie-hellman algorithm for reliable key exchange

    NASA Astrophysics Data System (ADS)

    Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj

    2017-11-01

    The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.

  20. The panic attack-posttraumatic stress disorder model: applicability to orthostatic panic among Cambodian refugees.

    PubMed

    Hinton, Devon E; Hofmann, Stefan G; Pitman, Roger K; Pollack, Mark H; Barlow, David H

    2008-01-01

    This article examines the ability of the panic attack-posttraumatic stress disorder (PTSD) model to predict how panic attacks are generated and how panic attacks worsen PTSD. The article does so by determining the validity of the panic attack-PTSD model in respect to one type of panic attack among traumatized Cambodian refugees: orthostatic panic (OP) attacks (i.e. panic attacks generated by moving from lying or sitting to standing). Among Cambodian refugees attending a psychiatric clinic, the authors conducted two studies to explore the validity of the panic attack-PTSD model as applied to OP patients (i.e. patients with at least one episode of OP in the previous month). In Study 1, the panic attack-PTSD model accurately indicated how OP is seemingly generated: among OP patients (N = 58), orthostasis-associated flashbacks and catastrophic cognitions predicted OP severity beyond a measure of anxious-depressive distress (Symptom Checklist-90-R subscales), and OP severity significantly mediated the effect of anxious-depressive distress on Clinician-Administered PTSD Scale severity. In Study 2, as predicted by the panic attack-PTSD model, OP had a mediational role in respect to the effect of treatment on PTSD severity: among Cambodian refugees with PTSD and comorbid OP who participated in a cognitive behavioural therapy study (N = 56), improvement in PTSD severity was partially mediated by improvement in OP severity.

  1. Epileptic negative drop attacks in atypical benign partial epilepsy: a neurophysiological study.

    PubMed

    Hirano, Yoshiko; Oguni, Hirokazu; Osawa, Makiko

    2009-03-01

    We conducted a computer-assisted polygraphic analysis of drop attacks in a child with atypical benign partial epilepsy (ABPE) to investigate neurophysiological characteristics. The patient was a six-year two-month-old girl, who had started to have focal motor seizures, later combined with daily epileptic negative myoclonus (ENM) and drop attacks, causing multiple injuries. We studied episodes of ENM and drop attacks using video-polygraphic and computer-assisted back-averaging analysis. A total of 12 ENM episodes, seven involving the left arm (ENMlt) and five involving both arms (ENMbil), and five drop attacks were captured for analysis. All episodes were time-locked to spike-and-wave complexes (SWC) arising from both centro-temporo-parietal (CTP) areas. The latency between the onset of SWC and ENMlt, ENMbil, and drop attacks reached 68 ms, 42 ms, and 8 ms, respectively. The height of the spike as well as the slow-wave component of SWC for drop attacks were significantly larger than that for both ENMlt and ENMbil (p < 0.05). Drop attacks were considered to be epileptic negative myoclonus involving not only upper proximal but also axial muscles, causing the body to fall. Thus, drop attacks in ABPE are considered to be epileptic negative drop attacks arising from bilateral CTP foci and differ from drop attacks of a generalized origin seen in Lennox-Gastaut syndrome and myoclonic-astatic epilepsy.

  2. Seven Deadliest Network Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, findmore » out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.« less

  3. Dynamic defense and network randomization for computer systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chavez, Adrian R.; Stout, William M. S.; Hamlet, Jason R.

    The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that the network becomes dynamically configured. A plurality of machine learning algorithms are configured to recognize an active attack pattern. Notification of the attack can be generated, and knowledge gained from the detected attack pattern can be utilized to improve the knowledge of the algorithms to detect a subsequent attack vector(s). Further, network settings and application communications can be dynamically randomized, wherein artificial diversity converts control systems into moving targets that help mitigate the early reconnaissancemore » stages of an attack. An attack(s) based upon a known static address(es) of a critical infrastructure network device(s) can be mitigated by the dynamic randomization. Network parameters that can be randomized include IP addresses, application port numbers, paths data packets navigate through the network, application randomization, etc.« less

  4. Automatic Inference of Cryptographic Key Length Based on Analysis of Proof Tightness

    DTIC Science & Technology

    2016-06-01

    within an attack tree structure, then expand attack tree methodology to include cryptographic reductions. We then provide the algorithms for...maintaining and automatically reasoning about these expanded attack trees . We provide a software tool that utilizes machine-readable proof and attack metadata...and the attack tree methodology to provide rapid and precise answers regarding security parameters and effective security. This eliminates the need

  5. Cyber Signal/Noise Characteristics and Sensor Models for Early Cyber Indications and Warning

    DTIC Science & Technology

    2005-09-01

    investigating and simulating attack scenarios. The sensors are, in effect , mathematical functions. These functions range from simple functions of...172 8.1.2 Examine each attack scenario or case to derive the cause- effect network for the attack scenario...threat profiles............................ 174 8.1.4 Develop attack profiles by enlarging the cause- effect network of each attack scenario with

  6. Remixing the ‘Appropriate Mix’: Reassessing NATO’s Deterrence and Defense Posture in the Face of New Threats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Juarez, Anthony

    The North Atlantic Treaty Organization (NATO) and the countries of Europe face a renewed challenge from the east vis-à-vis the Putin regime in Moscow. In the face of these new challenges, NATO must reconsider its deterrence and defense posture in order to deter conflict in Europe. Unfortunately, Russian attempts to rewrite the rules of the post-Cold War international order by force have been coupled with nuclear saber rattling and overt nuclear threats. Russia’s nuclear threats, in addition to provocative changes to Russia’s nuclear posture in its Military Doctrine, are methods to make up for Russia’s conventional military inferiority relative tomore » NATO and the United States. Some have described Moscow’s actions as laying the groundwork for a nuclear coercion strategy. While the decrease in the nuclear arsenals of Russia and the United States has reduced the likelihood of nuclear annihilation to an all-time low since the height of the Cold War, Russia’s nuclear coercion strategy is increasing the probability of nuclear employment in Europe. The probability of nuclear use is compounded by Russia’s tremendous local military advantage around its periphery in spite of U.S. global military primacy. This military advantage increases the incentive to use military force if Russian decision-makers conclude that a quick military victory is possible, or if Russian leaders miscalculate based on an incorrect assessment of military force balance or resolve of their adversary. The integration of Lithuania, Latvia, and Estonia (referred to as the Baltics in this paper) into the NATO alliance in 2004 makes Russia’s military advantage in its periphery increasingly relevant. Each NATO state is required to assist any NATO state that comes under attack per Article V of the North Atlantic Treaty. The Baltic states’ proximity to Russia, their weak indigenous militaries, their former status as Soviet Republics, large population of ethnic Russians, and Russian President Vladimir V. Putin’s claim that he will protect Russians wherever they are makes the Baltics the most likely flashpoint for conflict between NATO and Russia. This analysis will tackle the problem of reshaping NATO’s deterrence and defense posture in light of the new Russian threat and its obligation to defend its most vulnerable members. Specifically, it will assess the suitability of NATO’s “appropriate mix” of nuclear, conventional, and missile defense capabilities to deterring conventional conflict with Russia and, if conventional deterrence fails, preventing Russian nuclear escalation. It will use a scenario-based approach informed by a deterrence model to explore how changes to NATO’s posture and policy could impact the deterrence of Russian aggression.« less

  7. Attack Coverage in High-Level Men’s Volleyball: Organization on the Edge of Chaos?

    PubMed Central

    Laporta, Lorenzo; Nikolaidis, Pantelis; Thomas, Luke; Afonso, José

    2015-01-01

    Change is pervasive, but emerging patterns are occasionally detectable through analysis of systemic behaviors. Match analysis uses these patterns in order to reduce the degree of improvisation and to optimize the training process. However, it is possible that certain game phases elude systematic patterning. In this vein, our aim was to analyze the case of attack coverage in men’s volleyball, as we suspected it would elude systematic patterning and has received negligible attention in scientific research. We analyzed the occurrence of attack coverage in 4544 plays of the 2011 Volleyball World League. A Chi-square test with residual adjusted values was applied to explore significant associations between variables. A Monte Carlo correction was applied, as some cells had n<5. Effect sizes were determined using Cramer’s V. Overall, attack coverage occurred in 3.89% of ball possessions, and 23 distinct structures emerged. These structures lacked significant associations with the game complex, setting zone, and effect of attack coverage. Conversely, attack coverage structures showed significant associations with the attack zone and tempo, with very strong effect sizes (V=0.472 and V=0.521, respectively). As certain attack zones are deeply associated with attack tempo, it is apparent that quicker attack plays affect attack coverage structuring, promoting the formation of less complex structures. Ultimately, attack coverage structures seem to depend on momentary constraints, thereby rendering rigid systematization impracticable. Still, we contended that a principle-based approach might be suitable. This invites researchers to rethink how to interpret game regularities. PMID:26557208

  8. Cued Panic Attacks in Body Dysmorphic Disorder

    PubMed Central

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  9. Randomness determines practical security of BB84 quantum key distribution.

    PubMed

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-10

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  10. Attacks by jaguars (Panthera onca) on humans in central Brazil: report of three cases, with observation of a death.

    PubMed

    Neto, Manoel Francisco Campos; Garrone Neto, Domingos; Haddad, Vidal

    2011-06-01

    Conflicts between humans and big cats have been known for centuries throughout the world, but have intensified in recent decades. Recently, attacks by Panthera onca on humans in Brazil have been brought to the forefront through exposure in the press and because of the severity of the attacks. We report 3 cases of patients attacked by jaguars in provoked and predatory situations. Two patients survived the attacks and one died. Attack mechanisms and lesions in victims are discussed. The attacks demonstrate a real risk of accidents from jaguars in certain regions, such as the Pantanal and the Amazon. Copyright © 2011 Wilderness Medical Society. Published by Elsevier Inc. All rights reserved.

  11. Randomness determines practical security of BB84 quantum key distribution

    PubMed Central

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-01-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359

  12. Randomness determines practical security of BB84 quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  13. A Novel Network Attack Audit System based on Multi-Agent Technology

    NASA Astrophysics Data System (ADS)

    Jianping, Wang; Min, Chen; Xianwen, Wu

    A network attack audit system which includes network attack audit Agent, host audit Agent and management control center audit Agent is proposed. And the improved multi-agent technology is carried out in the network attack audit Agent which has achieved satisfactory audit results. The audit system in terms of network attack is just in-depth, and with the function improvement of network attack audit Agent, different attack will be better analyzed and audit. In addition, the management control center Agent should manage and analyze audit results from AA (or HA) and audit data on time. And the history files of network packets and host log data should also be audit to find deeper violations that cannot be found in real time.

  14. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    NASA Astrophysics Data System (ADS)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  15. Percolation of localized attack on complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2015-02-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erdős-Rényi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  16. Face liveness detection for face recognition based on cardiac features of skin color image

    NASA Astrophysics Data System (ADS)

    Suh, Kun Ha; Lee, Eui Chul

    2016-07-01

    With the growth of biometric technology, spoofing attacks have been emerged a threat to the security of the system. Main spoofing scenarios in the face recognition system include the printing attack, replay attack, and 3D mask attack. To prevent such attacks, techniques that evaluating liveness of the biometric data can be considered as a solution. In this paper, a novel face liveness detection method based on cardiac signal extracted from face is presented. The key point of proposed method is that the cardiac characteristic is detected in live faces but not detected in non-live faces. Experimental results showed that the proposed method can be effective way for determining printing attack or 3D mask attack.

  17. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  18. Electricity generation and health.

    PubMed

    Markandya, Anil; Wilkinson, Paul

    2007-09-15

    The provision of electricity has been a great benefit to society, particularly in health terms, but it also carries health costs. Comparison of different forms of commercial power generation by use of the fuel cycle methods developed in European studies shows the health burdens to be greatest for power stations that most pollute outdoor air (those based on lignite, coal, and oil). The health burdens are appreciably smaller for generation from natural gas, and lower still for nuclear power. This same ranking also applies in terms of greenhouse-gas emissions and thus, potentially, to long-term health, social, and economic effects arising from climate change. Nuclear power remains controversial, however, because of public concern about storage of nuclear waste, the potential for catastrophic accident or terrorist attack, and the diversion of fissionable material for weapons production. Health risks are smaller for nuclear fusion, but commercial exploitation will not be achieved in time to help the crucial near-term reduction in greenhouse-gas emissions. The negative effects on health of electricity generation from renewable sources have not been assessed as fully as those from conventional sources, but for solar, wind, and wave power, such effects seem to be small; those of biofuels depend on the type of fuel and the mode of combustion. Carbon dioxide (CO2) capture and storage is increasingly being considered for reduction of CO2 emissions from fossil fuel plants, but the health effects associated with this technology are largely unquantified and probably mixed: efficiency losses mean greater consumption of the primary fuel and accompanying increases in some waste products. This paper reviews the state of knowledge regarding the health effects of different methods of generating electricity.

  19. Colony-stimulating factors for the treatment of the hematopoietic component of the acute radiation syndrome (H-ARS): a review.

    PubMed

    Singh, Vijay K; Newman, Victoria L; Seed, Thomas M

    2015-01-01

    One of the greatest national security threats to the United States is the detonation of an improvised nuclear device or a radiological dispersal device in a heavily populated area. As such, this type of security threat is considered to be of relatively low risk, but one that would have an extraordinary high impact on health and well-being of the US citizenry. Psychological counseling and medical assessments would be necessary for all those significantly impacted by the nuclear/radiological event. Direct medical interventions would be necessary for all those individuals who had received substantial radiation exposures (e.g., >1 Gy). Although no drugs or products have yet been specifically approved by the United States Food and Drug Administration (US FDA) to treat the effects of acute radiation syndrome (ARS), granulocyte colony-stimulating factor (G-CSF), granulocyte macrophage colony-stimulating factor (GM-CSF), and pegylated G-CSF have been used off label for treating radiation accident victims. Recent threats of terrorist attacks using nuclear or radiologic devices makes it imperative that the medical community have up-to-date information and a clear understanding of treatment protocols using therapeutically effective recombinant growth factors and cytokines such as G-CSF and GM-CSF for patients exposed to injurious doses of ionizing radiation. Based on limited human studies with underlying biology, we see that the recombinants, G-CSF and GM-CSF appear to have modest, but significant medicinal value in treating radiation accident victims. In the near future, the US FDA may approve G-CSF and GM-CSF as ‘Emergency Use Authorization’ (EUA) for managing radiation-induced aplasia, an ARS-related pathology. In this article, we review the status of growth factors for the treatment of radiological/nuclear accident victims.

  20. Chernobyl and Fukushima nuclear accidents: what has changed in the use of atmospheric dispersion modeling?

    PubMed

    Benamrane, Y; Wybo, J-L; Armand, P

    2013-12-01

    The threat of a major accidental or deliberate event that would lead to hazardous materials emission in the atmosphere is a great cause of concern to societies. This is due to the potential large scale of casualties and damages that could result from the release of explosive, flammable or toxic gases from industrial plants or transport accidents, radioactive material from nuclear power plants (NPPs), and chemical, biological, radiological or nuclear (CBRN) terrorist attacks. In order to respond efficiently to such events, emergency services and authorities resort to appropriate planning and organizational patterns. This paper focuses on the use of atmospheric dispersion modeling (ADM) as a support tool for emergency planning and response, to assess the propagation of the hazardous cloud and thereby, take adequate counter measures. This paper intends to illustrate the noticeable evolution in the operational use of ADM tools over 25 y and especially in emergency situations. This study is based on data available in scientific publications and exemplified using the two most severe nuclear accidents: Chernobyl (1986) and Fukushima (2011). It appears that during the Chernobyl accident, ADM were used few days after the beginning of the accident mainly in a diagnosis approach trying to reconstruct what happened, whereas 25 y later, ADM was also used during the first days and weeks of the Fukushima accident to anticipate the potentially threatened areas. We argue that the recent developments in ADM tools play an increasing role in emergencies and crises management, by supporting stakeholders in anticipating, monitoring and assessing post-event damages. However, despite technological evolutions, its prognostic and diagnostic use in emergency situations still arise many issues. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Turning the tide of public opinion on nuclear power

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cohen, B.L.

    1997-04-01

    Until the early 1970s, the tide of public opinion in the United States was strongly in favor of nuclear power. New power plants were coming on line frequently, and in 1973-74, there were close to 40 new orders per year for new reactors in the United States. Official government projections estimated 1000 operating reactors by the year 2000. Fuel reprocessing, plutonium recycle, and breeder reactor development were also proceeding smoothly and rapidly. But, in the mid-1970s, the tide suddenly turned against the nuclear industry. How did this come about? In the late 1960s, energetic and idealistic young people who hadmore » never experienced economic insecurity or World Wars came of age. Environmentalism was an attractive outlet for their activity in most of the Western world. In the United States, opposition to the Vietnam War, in which these young people had a personal stake, was even more popular at first, but by the early 1970s, Vietnam was winding down, and they turned also to Environmentalism. Numerous environmental groups started up, aided heavily by the favorable connotation of the very word {open_quotes}environmentalist{close_quotes} in the public mind. Their organizational experience, political savvy, and media connections gained from their antiwar protests were powerful assets. But the groups needed specific targets to attack, and they soon found that nuclear power was well-suited for that purpose. Here was a new technology, coming on at a very rapid pace. To the public, radiation was highly mysterious, and people were well aware that it could be dangerous. And, the word danger had taken on a new meaning. Previous generations were well acquainted with death and were much less averse to risk-taking than the generation of the 1970s.« less

  2. A multidisciplinary approach to the identification and evaluation of novel concepts for deeply buried hardened target defeat

    NASA Astrophysics Data System (ADS)

    Branscome, Ewell Caleb

    During the Cold War, Deeply Buried Hardened Targets (DBHTs) and the assets they protected were of great strategic and tactical concern to the Department of Defense. Megaton-class nuclear warheads were the only viable means of attacking many of these facilities, and even so, a small subset of DBHTs was anticipated to be robust even in the face of such an attack. Post Cold War, the threat posed by DBHTs has not disappeared. Rather, the conventional warfare advantages of the United States have led to an increasing emphasis by potential adversaries on the construction and use of hardened facilities such as DBHTs for protection of both conventional and unconventional assets. Further, the shift in perceived relative risk to the United States' national security from large scale all-out nuclear attack towards very limited attack by Weapons of Mass Destruction (WMD) has led some to hypothesize that "self-deterrence" may diminish the strategic value of current inventory nuclear weapons. The objective of the work described was to identify and explore a paradigm shifting solution that could offer leap-ahead capabilities to counter current and future DBHT threats while mitigating or eliminating the "self-deterrence" issue. Systematic evaluation of DHBT defeat alternatives lead to the selection of a thermal subterrene as a hypothetical means of providing such a capability. A number of possible implementation alternatives for a thermal subterrene were investigated, resulting in the identification of the RadioIsotope Powered Thermal Penetrator (RIPTP) concept for providing an effectively unlimited hard rock penetration capability using near-term technologies. However, the proposed approach was novel and thus required formulation and application of a physics based multidisciplinary analysis code to enable evaluation of lv design alternatives and analysis of performance. Technical considerations identified as important to the feasibility of a RIPTP for DBHT defeat included: packing of RIPTP components in available volume; close-contact melting in a medium with nonlinear thermodynamic properties; radiation shielding; radiation health physics; point source plume dispersal calculations; alternative technologies for production of radioisotopes; chemical and physical properties of isotope compounds; nuclear reactor characteristics; high temperature material stability and inter-material compatibility; weapon and delivery system integration; a variety of heat transfer regimes including radiation, conduction, convection, nucleate boiling, and film boiling; thermal/mechanical stress analysis (steady-state and transient); rock physical and thermodynamic properties as a function of temperature; detection/mapping of deeply buried facility spaces; and more. The following disciplinary analyses were composed into a multidisciplinary analysis code for a RIPTP: packing of RIPTP components in available volume; close-contact melting analysis; transmutation of isotope species by neutron activation; reactor neutron economy; radioisotope power generation through decay; metamodelled radiation shielding calculations for a RIPTP; and steady state thermal analyses for a RIPTP in various scenarios. Filtering of radioisotopes for potential suitability, their possible production mechanisms, state of technological development, and multidisciplinary analysis code predicted performance lead to the identification of Thulium-170 as the best isotope for powering a RIPTP using present-day technology and technical data. Ytterbium-169 was identified as an alternative isotope offering the potential for significant potential improvements over Thulium-170 in radiological safety as well as RIPTP performance and producibility. Production, however, was determined to require identification of a cost effective technology for highly enriching Ytterbium-168 from its low natural abundance. Performance analysis of the identified baseline Thulium-170 RIPTP suggested that the predicted low penetration rate of about 10 meters/day could be a significant negative factor with regards to possible viability of the concept. Consequently, a survey for potentially enabling technologies was performed using an adaptation of the Technology Impact Forecasting (TIF) approach. It was found that the greatest potential for improving performance of the baseline Thulium-170 RIPTP resulted from increasing overall power density of the penetrator. Several possible technology approaches to achieving significantly increased penetration rates (approximately 50 meters/day expected penetration rate vs. original 13 meters/day) were proposed. However, it was determined that the hypothetical technology having the greatest potential impact on thermal subterrene viability for DHBT defeat with respect to penetration rate was cost-effective enrichment for Ytterbium-168. Development of such a technology would eliminate or enormously reduce the impact of all identified RIPTP performance and producibility concerns. Alternatively, relaxation of the requirement for no radiological hazard to enemy combatants would enable selection of a fissile powered thermal subterrene to provide required power densities consistent with rapid penetration.

  3. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    MedlinePlus

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Heart Attack or Sudden Cardiac Arrest: How Are They Different? ... and procedures related to heart disease and stroke. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  4. Risk Management

    DTIC Science & Technology

    2011-06-02

    actively attack the risks, they will actively attack you.” -Tom Gib Why do Risk Management? 8 “The first step in the risk management process is to...opportunities to manage and improve our chances of success. - Roger Vanscoy “If you do not actively attack the risks, they will actively attack ...our risks provides opportunities to manage and improve our chances of success. - Roger Vanscoy “If you do not actively attack the risks, they will

  5. Experimental implementation of non-Gaussian attacks on a continuous-variable quantum-key-distribution system.

    PubMed

    Lodewyck, Jérôme; Debuisschert, Thierry; García-Patrón, Raúl; Tualle-Brouri, Rosa; Cerf, Nicolas J; Grangier, Philippe

    2007-01-19

    An intercept-resend attack on a continuous-variable quantum-key-distribution protocol is investigated experimentally. By varying the interception fraction, one can implement a family of attacks where the eavesdropper totally controls the channel parameters. In general, such attacks add excess noise in the channel, and may also result in non-Gaussian output distributions. We implement and characterize the measurements needed to detect these attacks, and evaluate experimentally the information rates available to the legitimate users and the eavesdropper. The results are consistent with the optimality of Gaussian attacks resulting from the security proofs.

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    John Homer; Ashok Varikuti; Xinming Ou

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability ofmore » the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.« less

  7. On resilience studies of system detection and recovery techniques against stealthy insider attacks

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.

    2016-05-01

    With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.

  8. Response of the REWARD detection system to the presence of a Radiological Dispersal Device

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Luis, R.; Baptista, M.; Barros, S.

    2015-07-01

    In recent years an increased international concern has emerged about the radiological and nuclear (RN) threats associated with the illicit trafficking of nuclear and radioactive materials that could be potentially used for terrorist attacks. The objective of the REWARD (Real Time Wide Area Radiation Surveillance System) project, co-funded by the European Union 7. Framework Programme Security, consisted in building a mobile system for real time, wide area radiation surveillance, using a CdZnTe detector for gamma radiation and a neutron detector based on novel silicon technologies. The sensing unit includes a GPS system and a wireless communication interface to send themore » data remotely to a monitoring base station, where it will be analyzed in real time and correlated with historical data from the tag location, in order to generate an alarm when an abnormal situation is detected. Due to its portability and accuracy, the system will be extremely useful in many different scenarios such as nuclear terrorism, lost radioactive sources, radioactive contamination or nuclear accidents. This paper shortly introduces the REWARD detection system, depicts some terrorist threat scenarios involving radioactive sources and special nuclear materials and summarizes the simulation work undertaken during the past three years in the framework of the REWARD project. The main objective consisted in making predictions regarding the behavior of the REWARD system in the presence of a Radiological Dispersion Device (RDD), one of the reference scenarios foreseen for REWARD, using the Monte Carlo simulation program MCNP6. The reference scenario is characterized in detail, from the i) radiological protection, ii) radiation detection requirements and iii) communications points of view. Experimental tests were performed at the Fire Brigades Facilities in Rome and at the Naples Fire Brigades, and the results, which validate the simulation work, are presented and analyzed. The response of the REWARD detection system to the presence of an RDD is predicted and discussed. (authors)« less

  9. A proposed benchmark problem for cargo nuclear threat monitoring

    NASA Astrophysics Data System (ADS)

    Wesley Holmes, Thomas; Calderon, Adan; Peeples, Cody R.; Gardner, Robin P.

    2011-10-01

    There is currently a great deal of technical and political effort focused on reducing the risk of potential attacks on the United States involving radiological dispersal devices or nuclear weapons. This paper proposes a benchmark problem for gamma-ray and X-ray cargo monitoring with results calculated using MCNP5, v1.51. The primary goal is to provide a benchmark problem that will allow researchers in this area to evaluate Monte Carlo models for both speed and accuracy in both forward and inverse calculational codes and approaches for nuclear security applications. A previous benchmark problem was developed by one of the authors (RPG) for two similar oil well logging problems (Gardner and Verghese, 1991, [1]). One of those benchmarks has recently been used by at least two researchers in the nuclear threat area to evaluate the speed and accuracy of Monte Carlo codes combined with variance reduction techniques. This apparent need has prompted us to design this benchmark problem specifically for the nuclear threat researcher. This benchmark consists of conceptual design and preliminary calculational results using gamma-ray interactions on a system containing three thicknesses of three different shielding materials. A point source is placed inside the three materials lead, aluminum, and plywood. The first two materials are in right circular cylindrical form while the third is a cube. The entire system rests on a sufficiently thick lead base so as to reduce undesired scattering events. The configuration was arranged in such a manner that as gamma-ray moves from the source outward it first passes through the lead circular cylinder, then the aluminum circular cylinder, and finally the wooden cube before reaching the detector. A 2 in.×4 in.×16 in. box style NaI (Tl) detector was placed 1 m from the point source located in the center with the 4 in.×16 in. side facing the system. The two sources used in the benchmark are 137Cs and 235U.

  10. A Nuclear Attack on Traumatic Brain Injury: Sequestration of Cell Death in the Nucleus.

    PubMed

    Tajiri, Naoki; De La Peña, Ike; Acosta, Sandra A; Kaneko, Yuji; Tamir, Sharon; Landesman, Yosef; Carlson, Robert; Shacham, Sharon; Borlongan, Cesar V

    2016-04-01

    Exportin 1 (XPO1/CRM1) plays prominent roles in the regulation of nuclear protein export. Selective inhibitors of nuclear export (SINE) are small orally bioavailable molecules that serve as drug-like inhibitors of XPO1, with potent anti-cancer properties. Traumatic brain injury (TBI) presents with a secondary cell death characterized by neuroinflammation that is putatively regulated by nuclear receptors. Here, we report that the SINE compounds (KPT-350 or KPT-335) sequestered TBI-induced neuroinflammation-related proteins (NF-(k)B, AKT, FOXP1) within the nucleus of cultured primary rat cortical neurons, which coincided with protection against TNF-α (20 ng/mL)-induced neurotoxicity as shown by at least 50% and 100% increments in preservation of cell viability and cellular enzymatic activity, respectively, compared to non-treated neuronal cells (P's < 0.05). In parallel, using an in vivo controlled cortical impact (CCI) model of TBI, we demonstrate that adult Sprague-Dawley rats treated post-injury with SINE compounds exhibited significant reductions in TBI-induced behavioral and histological deficits. Animals that received KPT-350 orally starting at 2 h post-TBI and once a day thereafter over the next 4 days exhibited significantly better motor coordination, and balance in the rotorod test and motor asymmetry test by 100-200% improvements, as early as 4 h after initial SINE compound injection that was sustained during subsequent KPT-350 dosing, and throughout the 18-day post-TBI study period compared to vehicle treatment (P's < 0.05). Moreover, KPT-350 reduced cortical core impact area and peri-impact cell death compared to vehicle treatment (P's < 0.05). Both in vitro and in vivo experiments revealed that KPT-350 increased XPO1, AKT, and FOXP1 nuclear expression and relegated NF-(k)B expression within the neuronal nuclei. Altogether, these findings advance the utility of SINE compounds to stop trafficking of cell death proteins within the nucleus as an efficacious treatment for TBI. © 2016 John Wiley & Sons Ltd.

  11. Is It Time To Consider Global Sharing of Integral Physics Data?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harold F. McFarlane

    The innocent days of the Atoms for Peace program vanished with the suicide attack on the World Trade Center in New York City that occurred while the GLOBAL 2001 international nuclear fuel cycle conference was convened in Paris. Today’s reality is that maintaining an inventory of unirradiated highly enriched uranium or plutonium for critical experiments requires a facility to accept substantial security cost and intrusion. In the context of a large collection of benchmark integral experiments collected over several decades and the ongoing rapid advances in computer modeling and simulation, there seems to be ample incentive to reduce both themore » number of facilities and material inventory quantities worldwide. As a result of ongoing nonproliferation initiatives, there are viable programs that will accept highly enriched uranium for down blending into commercial fuel. Nevertheless, there are formidable hurdles to overcome before national institutions will voluntarily give up existing nuclear research capabilities. GLOBAL 2005 was the appropriate forum to begin fostering a new spirit of cooperation that could lead to improved international security and better use of precious research and development resources, while ensuring access to existing and future critical experiment data.« less

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Myers, C.W.; Giraud, K.M.

    Newcomer countries expected to develop new nuclear power programs by 2030 are being encouraged by the International Atomic Energy Agency to explore the use of shared facilities for spent fuel storage and geologic disposal. Multinational underground nuclear parks (M-UNPs) are an option for sharing such facilities. Newcomer countries with suitable bedrock conditions could volunteer to host M-UNPs. M-UNPs would include back-end fuel cycle facilities, in open or closed fuel cycle configurations, with sufficient capacity to enable M-UNP host countries to provide for-fee waste management services to partner countries, and to manage waste from the M-UNP power reactors. M-UNP potential advantagesmore » include: the option for decades of spent fuel storage; fuel-cycle policy flexibility; increased proliferation resistance; high margin of physical security against attack; and high margin of containment capability in the event of beyond-design-basis accidents, thereby reducing the risk of Fukushima-like radiological contamination of surface lands. A hypothetical M-UNP in crystalline rock with facilities for small modular reactors, spent fuel storage, reprocessing, and geologic disposal is described using a room-and-pillar reference-design cavern. Underground construction cost is judged tractable through use of modern excavation technology and careful site selection. (authors)« less

  13. Impact of Tumarkin attacks on complaints and work ability in Ménière's disease.

    PubMed

    Pyykkö, Ilmari; Manchaiah, Vinaya; Zou, Jing; Levo, Hilla; Kentala, Erna

    2018-05-22

    The purpose of the present study was to characterize the occurrence of Tumarkin attacks in patients with Ménière'sdisease (MD), and to study its association with reported complaints, severity of consequences, and also self-reported work ability. The study used a cross-sectional design. Data obtained from the Finnish Ménière Federation using an electronic survey was analyzed. 602 people with MD responded to the survey (62% response rate) with a mean age of 56.7 years and a mean duration of the disease 12.4 years. 49% of the respondents experienced Tumarkin attacks, which lasted for a few seconds to a few minutes. There were significant differences in complaints reported by MD patients with and without Tumarkin attacks. Respondents with Tumarkin attacks experienced various consequences, including tripping, falls, fear, anxiety, problems in dyadic life, and even transient loss of consciousness. Respondents with Tumarkin attacks had more frequently applied for pension than those not having Tumarkin attacks. On an average, respondents with Tumarkin attacks had less self-reported working ability when compared to those without Tumarkin attacks. The current study results suggest various differences in terms of complaints reported, severity of consequences, and the self-reported working ability in MD patients with and without Tumarkin attacks. Hearing healthcare professionals must examine Tumarkin attacks and their consequences in patients with MD during clinical examinations. In addition, the therapy should focus on alleviating the consequences and improving work ability.

  14. Netwar

    NASA Astrophysics Data System (ADS)

    Keen, Arthur A.

    2006-04-01

    This paper describes technology being developed at 21st Century Technologies to automate Computer Network Operations (CNO). CNO refers to DoD activities related to Attacking and Defending Computer Networks (CNA & CND). Next generation cyber threats are emerging in the form of powerful Internet services and tools that automate intelligence gathering, planning, testing, and surveillance. We will focus on "Search-Engine Hacks", queries that can retrieve lists of router/switch/server passwords, control panels, accessible cameras, software keys, VPN connection files, and vulnerable web applications. Examples include "Titan Rain" attacks against DoD facilities and the Santy worm, which identifies vulnerable sites by searching Google for URLs containing application-specific strings. This trend will result in increasingly sophisticated and automated intelligence-driven cyber attacks coordinated across multiple domains that are difficult to defeat or even understand with current technology. One traditional method of CNO relies on surveillance detection as an attack predictor. Unfortunately, surveillance detection is difficult because attackers can perform search engine-driven surveillance such as with Google Hacks, and avoid touching the target site. Therefore, attack observables represent only about 5% of the attacker's total attack time, and are inadequate to provide warning. In order to predict attacks and defend against them, CNO must also employ more sophisticated techniques and work to understand the attacker's Motives, Means and Opportunities (MMO). CNO must use automated reconnaissance tools, such as Google, to identify information vulnerabilities, and then utilize Internet tools to observe the intelligence gathering, planning, testing, and collaboration activities that represent 95% of the attacker's effort.

  15. Securing internet by eliminating DDOS attacks

    NASA Astrophysics Data System (ADS)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  16. Monitoring the Attack Incidences and Damage Caused by the Almond Bark Beetle, Scolytus amygdali, in Almond Orchards

    PubMed Central

    Cuthbertson, Andrew G. S.; Braham, Mohamed

    2018-01-01

    The almond bark beetle, Scolytus amygdali Geurin-Meneville, is responsible for significant loss of fruit production in almond orchards throughout the world. Here, we studied the damage and the incidences of S. amygdali attack on two different scales: (1) at the level of a single tree; and (2) in an entire orchard. Our results revealed no differences in attack level among four orientations (east, west, south and north sides) for the whole tree. However, the bark that was facing west side in the direction of the prevailing wind was found to be the most suitable for females to initiate attack in Stratum S2. Attack distribution remains the same among different strata (strata is vertical divisions of the tree from the ground to the uppermost twigs with ~40 cm intervals). More than 50% of attack was observed in the trunk of the tree and upper strata. However, multiplication rate (number of emerged adults/maternal gallery) varies significantly between strata. In addition, we studied attack intensity (holes produced by beetle per tree) comparing it to tree morphology (flowers, leaves and circumferences) and gum deposit. Our results revealed a positive correlation between attack intensity and gum deposits, and a negative correlation between attack intensity and tree morphology. This revealed that gum on the tree was an indicator for attack intensity. A positive correlation between attack intensity and the circumference of the tree revealed that older trees were more susceptible to S. amygdali attack. These results, while preliminary, aim to help in the monitoring of S. amygdali populations before deciding to apply any control measures. PMID:29301271

  17. On the IDAGAM I Combat Model.

    DTIC Science & Technology

    1977-06-01

    defense missions in locations between the FEBA and the attackers’ targets; b) AAA can attack only aircraft attacking the guns them- selves or the targets...the guns are defending; c) SAM weapon systems can attack not only aircraft attack- ing them and the targets they defend but also, although possibly...Corporation), P.E. Louer (Department of the Army) and B.R. McEnany (Joint Chiefs of Staff/Studies, Analysis and Gaming Agency) for their help- ful

  18. Terror attacks influence driving behavior in Israel

    PubMed Central

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  19. Atoms for peace and the nonproliferation treaty: unintended consequences

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Streeper, Charles Blamires

    2009-01-01

    In April 2009, President Obama revived nonproliferation and arms control efforts with a speech calling for the worldwide abolition of nuclear weapons. His speech correctly acknowledged the threat of nuclear terrorism and the vulnerabilities of the related unsecure nuclear materials. Unfortunately, the president did not mention and has not mentioned in any speech the threat posed by at-risk radiological materials. Nonproliferation efforts have a well documented history of focus on special nuclear materials (fissionable weapons usable materials or SNM), and other key materials (chemical and biological) and technologies for a Weapon of Mass Destruction (WMD). Such intense focus on WMDmore » related materials/technologies is essential for international safety and security and merit continued attention and funding. However, the perception that radioactive sealed sources (sources) are of less concern than WMD is unfortunate. These perceptions are based solely on the potentially enormous and tragic consequences associated with their deliberate or accidental misuse and proliferation concerns. However, there is a documented history of overemphasis on the nuclear threat at the expense of ignoring the far more likely and also devastating chemical and biological threats. The radiological threat should not be minimized or excluded from policy discussions and decisions on these far ranging scopes of threat to the international community. Sources have a long history of use; and a wider distribution worldwide than fissile materials. Pair this with their broad ranges in isotopes/activities along with scant national and international attention and mechanisms for their safe and secure management and it is not difficult to envision a deadly threat. Arguments that minimize or divert attention away from sources may have the effect of distracting necessary policy attention on preventing/mitigating a radiological dispersal event. The terrorist attacks on 9/11 should be a clear reminder of the inherent danger of diminishing or dismissing lower-level threats in exchange for enhanced focus on high priority special nuclear materials with the basis for this emphasis being solely on the magnitude of the consequences of a single event. Mitigating all possible or likely terrorist attacks is impossible; however, weaponized sources, in the form of a radiological dispersal device, have been a declared target material of Al-Qaida. Eisenhower's Atoms for Peace initiative promoted the spread of the paradoxical beneficial yet destructive properties of the atom. Typically, the focus of nonproliferation efforts focuses on the fissile materials associated with Weapons of Mass Destruction, with less emphasis on radioactive materials that could be used for a Weapon of Mass Disruption. Most nonproliferation policy discussion involves securing or preventing the diversion of weapons grade fissile materials (uranium (U) with concentration of over 90% of the isotope {sup 235}U (HEU) and plutonium with more than 90% of the isotope {sup 239}Pu), with scant attention given to the threat posed by a prolific quantity of sources spread worldwide. Further acerbating the problem of inattention, it appears that the momentum of the continued evolution in the beneficial applications of sources will only increase in the near future. Several expert studies have demonstrated on the potentially devastating economic, psychological and public health impacts of terrorist use of a radiological dispersal or radiation emitting device (ROD/RED) in a metropolis. The development of such a weapon, from the acquisition of the radioactive material to the technical knowledge needed to fashion it into an ROD, is many orders of magnitude easier than diverting enough fissile material for and fabrication/acquisition of a nuclear weapon. Unlike nuclear weapons, worldwide, there are many well documented accounts of accidental and purposeful diversions of radioactive materials from regulatory control. As of the end of 2008, the International Atomic Energy Agency's (IAEA) Illicit Trafficking Database had logged 1562 incidents, of which only 18 include weapons grade nuclear materials. As much as 66% of the radioactive material involved in these incidents was not recovered. Since 2004, there has been a 75% increase in incidents of unrecoverable material, much of which is labeled dangerous with potential for deterministic health affects if misused. This makes clear that a black market of illicit trade in sources exists. The incidents reported to the IAEA's database rely only on voluntary state reporting; therefore, the number of lost or stolen sources is expected to be much higher.« less

  20. Childhood Internalizing and Externalizing Problems Predict the Onset of Clinical Panic Attacks over Adolescence: The TRAILS Study

    PubMed Central

    Mathyssek, Christina M.; Olino, Thomas M.; Verhulst, Frank C.; van Oort, Floor V. A.

    2012-01-01

    Background Panic attacks are a source of individual suffering and are an independent risk factor for later psychopathology. However, much less is known about risk factors for the development of panic attacks, particularly during adolescence when the incidence of panic attacks increases dramatically. We examined whether internalizing and externalizing problems in childhood predict the onset of panic attacks in adolescence. Method This study is part of the TRacking Adolescents’ Individual Lives Survey (TRAILS), a Dutch longitudinal population cohort study (N = 1,584). Internalizing and Externalizing Problems were collected using the Youth Self-Report (YSR) and the parent-report Child Behavior Checklist (CBCL) at baseline (age 10–12). At age 18–20, DSM-IV defined panic attacks since baseline were assessed with the Composite International Diagnostic Interview (CIDI). We investigated whether early adolescent Internalizing and Externalizing Problems predicted panic attacks between ages 10–20 years, using survival analysis in univariate and multivariate models. Results There were N = 314 (19.8%) cases who experienced at least one DSM-IV defined panic attack during adolescence and N = 18 (1.2%) who developed panic disorder during adolescence. In univariate analyses, CBCL Total Problems, Internalizing Problems and three of the eight syndrome scales predicted panic attack onset, while on the YSR all broad-band problem scales and each narrow-band syndrome scale predicted panic attack onset. In multivariate analyses, CBCL Social Problems (HR 1.19, p<.05), and YSR Thought Problems (HR 1.15, p<.05) and Social Problems (HR 1.26, p<.01) predicted panic attack onset. Conclusion Risk indicators of panic attack include the wide range of internalizing and externalizing problems. Yet, when adjusted for co-occurring problem behaviors, Social Problems were the most consistent risk factor for panic attack onsets in adolescence. PMID:23251576

  1. Effectiveness of icatibant for treatment of hereditary angioedema attacks is not affected by body weight: findings from the Icatibant Outcome Survey, a cohort observational study.

    PubMed

    Caballero, Teresa; Zanichelli, Andrea; Aberer, Werner; Maurer, Marcus; Longhurst, Hilary J; Bouillet, Laurence; Andresen, Irmgard

    2018-01-01

    Icatibant is a bradykinin B2-receptor antagonist used for the treatment of hereditary angioedema attacks resulting from C1-inhibitor deficiency. Treatment is not adjusted by body weight however the impact of body mass index (BMI) on the effectiveness of icatibant is not documented in the literature. We examined disease characteristics and icatibant treatment effectiveness in patients stratified by BMI in the Icatibant Outcome Survey, an ongoing, international, observational study monitoring the real-world safety and effectiveness of icatibant. Attack and treatment characteristics as well as outcomes following treatment with icatibant were compared among patients with underweight, normal, overweight, and obese BMI. Data from 2697 icatibant-treated attacks in 342 patients (3.5, 44.7, 34.8, and 17.0% patients of underweight, normal, overweight, and obese BMI, respectively) were analyzed. There was no significant difference in the frequency and severity of attacks across BMI groups, although obese patients tended to have more attacks of high severity. There was no impact of BMI on the frequency of laryngeal attacks, but patients with normal BMI had fewer cutaneous attacks and more abdominal attacks. Most attacks (71.9-83.8%) were treated with a single icatibant injection without the need for rescue with plasma-derived C1-inhibitor (pdC1-INH), regardless of BMI. Patients with obese BMI used pdC1-INH as rescue treatment more often (P < 0.0001; P = 0.0232 excluding 2 outliers) and treated attacks earlier than patients with normal BMI (P = 0.007). Furthermore, time to resolution and duration of attack were shorter for patients with high BMI (P < 0.001 for overweight and P < 0.05 for obese versus normal). Overall, icatibant was comparatively effective in treating attacks in patients across all BMI groups. Trial registration NCT01034969.

  2. Somatic panic-attack equivalents in a community sample of Rwandan widows who survived the 1994 genocide

    PubMed Central

    Hagengimana, Athanase; Hinton, Devon; Bird, Bruce; Pollack, Mark; Pitman, Roger K.

    2009-01-01

    The present study is the first to attempt to determine rates of panic attacks, especially ‘somatically focused’ panic attacks, panic disorder, symptoms of post-traumatic stress disorder (PTSD), and depression levels in a population of Rwandans traumatized by the 1994 genocide. The following measures were utilized: the Rwandan Panic-Disorder Survey (RPDS); the Beck Depression Inventory (BDI); the Harvard Trauma Questionnaire (HTQ); and the PTSD Checklist (PCL). Forty of 100 Rwandan widows suffered somatically focused panic attacks during the previous 4 weeks. Thirty-five (87%) of those having panic attacks suffered panic disorder, making the rate of panic disorder for the entire sample 35%. Rwandan widows with panic attacks had greater psychopathology on all measures. Somatically focused panic-attack subtypes seem to constitute a key response to trauma in the Rwandan population. Future studies of traumatized non-Western populations should carefully assess not only somatoform disorder but also somatically focused panic attacks. PMID:12581815

  3. Sub-threshold panic attacks and agoraphobic avoidance increase comorbidity of mental disorders: results from an adult general population sample.

    PubMed

    Pané-Farré, Christiane A; Fenske, Kristin; Stender, Jan P; Meyer, Christian; John, Ulrich; Rumpf, Hans-Jürgen; Hapke, Ulfert; Hamm, Alfons O

    2013-06-01

    Full-blown panic attacks are frequently associated with other mental disorders. Most comorbidity analyses did not discriminate between isolated panic attacks vs. panic attacks that occurred in the context of a panic disorder and rarely evaluated the impact of comorbid agoraphobia. Moreover, there are no larger scale epidemiological studies regarding the influence of sub-threshold panic attacks. 4075 German-speaking respondents aged 18-64 were interviewed using the fully structured Munich Composite International Diagnostic Interview. Limited symptom attacks, isolated panic attacks, and panic disorder were associated with other lifetime DSM-IV disorders with monotonically increasing odds and increasing tendency for multiple comorbidities across the three groups. The presence of agoraphobia was associated with more frequent comorbidity in all panic subgroups and also in persons who never experienced panic attacks. The present study suggests that populations with isolated or limited symptom should be carefully attended to in clinical practice, especially if agoraphobia is present. Copyright © 2013 Elsevier Ltd. All rights reserved.

  4. UDP-glucuronosyltransferase-dependent bioactivation of clofibric acid to a DNA-damaging intermediate in mouse hepatocytes.

    PubMed

    Ghaoui, Roula; Sallustio, Benedetta C; Burcham, Philip C; Fontaine, Frank R

    2003-05-06

    Glucuronidation of a number of carboxyl-containing drugs generates reactive acyl glucuronide metabolites. These electrophilic species alkylate cell proteins and may be implicated in the pathogenesis of a number of toxic syndromes seen in patients receiving the parent aglycones. Whether acyl glucuronides also attack nuclear DNA is unknown, although the acyl glucuronide formed from clofibric acid was recently found to decrease the transfection efficiency of phage DNA and generate strand breaks in plasmid DNA in vitro. To determine if such a DNA damage occurs within a cellular environment, the comet assay (i.e. single-cell gel electrophoresis) was used to detect DNA lesions in the nuclear genome of isolated mouse hepatocytes cultured with clofibric acid. Overnight exposure to 50 microM and higher concentrations of clofibric acid produced concentration-dependent increases in the comet areas of hepatocyte nuclei, with 1 mM clofibrate producing a 3.6-fold elevation over controls. These effects closely coincided with culture medium concentrations of the glucuronide metabolite formed from clofibric acid, 1-O-beta-clofibryl glucuronide. Consistent with a role for glucuronidation in the DNA damage observed, the glucuronidation inhibitor borneol diminished glucuronide formation from 100 microM clofibrate by 98% and returned comet areas to baseline levels. Collectively, these results suggest that the acyl glucuronide formed from clofibric acid is capable of migrating from its site of formation within the endoplasmic reticulum to generate strand nicks in nuclear DNA.

  5. Chemical Warfare and Medical Response During World War I

    PubMed Central

    Fitzgerald, Gerard J.

    2008-01-01

    The first large-scale use of a traditional weapon of mass destruction (chemical, biological, or nuclear) involved the successful deployment of chemical weapons during World War I (1914–1918). Historians now refer to the Great War as the chemist’s war because of the scientific and engineering mobilization efforts by the major belligerents. The development, production, and deployment of war gases such as chlorine, phosgene, and mustard created a new and complex public health threat that endangered not only soldiers and civilians on the battlefield but also chemical workers on the home front involved in the large-scale manufacturing processes. The story of chemical weapons research and development during that war provides useful insights for current public health practitioners faced with a possible chemical weapons attack against civilian or military populations. PMID:18356568

  6. Challenges to Leadership: Responding to Biological Threats

    DTIC Science & Technology

    2011-10-01

    incident leadership suitable for a biological crisis.   1                                                              1 One useful survey, limited to...and with great urgency, it is more likely than not that a weapon of mass destruction will be used in a terrorist attack somewhere in the world by the...end of 2013. The Commission further believes that terrorists are more likely to be able to obtain and use a biological weapon than a nuclear

  7. Comparison of Fission Product Yields and Their Impact

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    S. Harrison

    2006-02-01

    This memorandum describes the Naval Reactors Prime Contractor Team (NRPCT) Space Nuclear Power Program (SNPP) interest in determining the expected fission product yields from a Prometheus-type reactor and assessing the impact of these species on materials found in the fuel element and balance of plant. Theoretical yield calculations using ORIGEN-S and RACER computer models are included in graphical and tabular form in Attachment, with focus on the desired fast neutron spectrum data. The known fission product interaction concerns are the corrosive attack of iron- and nickel-based alloys by volatile fission products, such as cesium, tellurium, and iodine, and the radiologicalmore » transmutation of krypton-85 in the coolant to rubidium-85, a potentially corrosive agent to the coolant system metal piping.« less

  8. Chemical warfare and medical response during World War I.

    PubMed

    Fitzgerald, Gerard J

    2008-04-01

    The first large-scale use of a traditional weapon of mass destruction (chemical, biological, or nuclear) involved the successful deployment of chemical weapons during World War I (1914-1918). Historians now refer to the Great War as the chemist's war because of the scientific and engineering mobilization efforts by the major belligerents. The development, production, and deployment of war gases such as chlorine, phosgene, and mustard created a new and complex public health threat that endangered not only soldiers and civilians on the battlefield but also chemical workers on the home front involved in the large-scale manufacturing processes. The story of chemical weapons research and development during that war provides useful insights for current public health practitioners faced with a possible chemical weapons attack against civilian or military populations.

  9. 'What to do if it happens': planners, pamphlets and propaganda in the age of the H-bomb.

    PubMed

    Smith, Melissa

    2009-06-01

    In 1955, a highly secret Government report painted a bleak picture of Britain after a nuclear war. Without greatly improved civil defence measures, the report warned, a hydrogen bomb attack on Britain could kill one-third of the population within 24h and leave swathes of land uninhabitable. But Government advice to the public told a different story, offering cheerful advice about vacuuming up radioactive fallout and building shelters from books and furniture. Meanwhile, civil defence spending cuts left the public lacking even the standard of protection they had enjoyed during the Second World War. This seemingly paradoxical Government response was shaped by conflicting financial and political pressures, and by the work of the Home Office scientists whose research underpinned British civil defence planning.

  10. A Game Theoretical Approach to Hacktivism: Is Attack Likelihood a Product of Risks and Payoffs?

    PubMed

    Bodford, Jessica E; Kwan, Virginia S Y

    2018-02-01

    The current study examines hacktivism (i.e., hacking to convey a moral, ethical, or social justice message) through a general game theoretic framework-that is, as a product of costs and benefits. Given the inherent risk of carrying out a hacktivist attack (e.g., legal action, imprisonment), it would be rational for the user to weigh these risks against perceived benefits of carrying out the attack. As such, we examined computer science students' estimations of risks, payoffs, and attack likelihood through a game theoretic design. Furthermore, this study aims at constructing a descriptive profile of potential hacktivists, exploring two predicted covariates of attack decision making, namely, peer prevalence of hacking and sex differences. Contrary to expectations, results suggest that participants' estimations of attack likelihood stemmed solely from expected payoffs, rather than subjective risks. Peer prevalence significantly predicted increased payoffs and attack likelihood, suggesting an underlying descriptive norm in social networks. Notably, we observed no sex differences in the decision to attack, nor in the factors predicting attack likelihood. Implications for policymakers and the understanding and prevention of hacktivism are discussed, as are the possible ramifications of widely communicated payoffs over potential risks in hacking communities.

  11. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  12. Induction of panic attack by stimulation of the ventromedial hypothalamus.

    PubMed

    Wilent, W Bryan; Oh, Michael Y; Buetefisch, Cathrin M; Bailes, Julian E; Cantella, Diane; Angle, Cindy; Whiting, Donald M

    2010-06-01

    Panic attacks are sudden debilitating attacks of intense distress often accompanied by physical symptoms such as shortness of breath and heart palpitations. Numerous brain regions, hormones, and neurotransmitter systems are putatively involved, but the etiology and neurocircuitry of panic attacks is far from established. One particular brain region of interest is the ventromedial hypothalamus (VMH). In cats and rats, electrical stimulation delivered to the VMH has been shown to evoke an emotional "panic attack-like" escape behavior, and in humans, stimulation targeting nuclei just posterior or anterior to the VMH has reportedly induced panic attacks. The authors report findings obtained in an awake patient undergoing bilateral implantation of deep brain stimulation electrodes into the hypothalamus that strongly implicates the VMH as being critically involved in the genesis of panic attacks. First, as the stimulating electrode progressed deeper into the VMH, the intensity of stimulation required to evoke an attack systematically decreased; second, while stimulation of the VMH in either hemisphere evoked panic, stimulation that appeared to be in the center of the VMH was more potent. Thus, this evidence supports the role of the VMH in the induction of panic attacks purported by animal studies.

  13. Random Visitor: Defense against Identity Attacks in P2P Networks

    NASA Astrophysics Data System (ADS)

    Gu, Jabeom; Nah, Jaehoon; Kwon, Hyeokchan; Jang, Jonsoo; Park, Sehyun

    Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.

  14. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    PubMed

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  15. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    PubMed Central

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773

  16. Attack Detection in Sensor Network Target Localization Systems With Quantized Data

    NASA Astrophysics Data System (ADS)

    Zhang, Jiangfan; Wang, Xiaodong; Blum, Rick S.; Kaplan, Lance M.

    2018-04-01

    We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center. A general attack is considered at some sensors that attempts to cause the fusion center to produce an inaccurate estimation of the target location with a large mean-square-error. The attack is a combination of man-in-the-middle, hacking, and spoofing attacks that can effectively change both signals going into and coming out of the sensor nodes in a realistic manner. We show that the essential effect of attacks is to alter the estimated distance between the target and each attacked sensor to a different extent, giving rise to a geometric inconsistency among the attacked and unattacked sensors. Hence, with the help of two secure sensors, a class of detectors are proposed to detect the attacked sensors by scrutinizing the existence of the geometric inconsistency. We show that the false alarm and miss probabilities of the proposed detectors decrease exponentially as the number of measurement samples increases, which implies that for sufficiently large number of samples, the proposed detectors can identify the attacked and unattacked sensors with any required accuracy.

  17. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  18. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  19. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  20. Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Drame, B.; Toler, L.; Bachner, Katherine

    The single greatest threat to U.S. homeland security remains the proliferation of nuclear weapons, especially among terrorists and other non-state actors who are not governed by the Non-Proliferation Treaty. One of the most important tools for combating terrorism among such rogue actors is counter-financing. Without funding, terrorists cannot acquire, maintain, or deploy nuclear weapons. According to the official report of the 9/11 Commission, counter-financing could have prevented the attacks of September 11, 2001. Unfortunately, no single country can defeat global terrorism. Successful counter-financing requires significant international cooperation. Since 2001, the United States and the European Union, despite vastly different approachesmore » to intelligence gathering, have shared information through the Terrorist Finance Tracking Program (TFTP). That shared information allows authorities to trace suspicious transactions, identify culprits, and map out global terrorist networks. The TFTP successfully thwarted a 2011 plot to assassinate the Saudi Arabian Ambassador to the U.S. and multiple threats during the 2012 Summer Olympics in London; it also aided in the investigation of the 2013 Boston Marathon bombing. That program is necessary but not sufficient. To strengthen our ability to detect and disrupt terrorist plotting and prevent nuclear proliferation, we must expand and coordinate two additional transnational measures: (1) the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a standardized global messaging network for financial institutions to quickly, accurately, and securely send and receive money transfer instructions, and (2) International Bank Account Numbers (IBAN) to identify individual accounts involved in international transactions. Both initiatives were incompletely adopted in the wake of 9/11, but most global banks use one or neither. More fully implementing and coordinating these two systems would allow for coherent information sharing, an essential tool for combating money laundering and terrorist financing, verifying sanctions against rogue nations and non-state actors, tracking nuclear proliferation networks, and protecting dual-use materials. These steps can save lives without interfering with state sovereignty or individual rights. The specter of nuclear threat is real and constant. This paper will provide forensic analysis of the most effective financial tools and policies to combat that threat, placing special emphasis on multinational and public-private cooperation.« less

  1. The Role of Nuclear Medicine in the Staging and Management of Human Immune Deficiency Virus Infection and Associated Diseases.

    PubMed

    Ankrah, Alfred O; Glaudemans, Andor W J M; Klein, Hans C; Dierckx, Rudi A J O; Sathekge, Mike

    2017-06-01

    Human immune deficiency virus (HIV) is a leading cause of death. It attacks the immune system, thereby rendering the infected host susceptible to many HIV-associated infections, malignancies and neurocognitive disorders. The altered immune system affects the way the human host responds to disease, resulting in atypical presentation of these disorders. This presents a diagnostic challenge and the clinician must use all diagnostic avenues available to diagnose and manage these conditions. The advent of highly active antiretroviral therapy (HAART) has markedly reduced the mortality associated with HIV infection but has also brought in its wake problems associated with adverse effects or drug interaction and may even modulate some of the HIV-associated disorders to the detriment of the infected human host. Nuclear medicine techniques allow non-invasive visualisation of tissues in the body. By using this principle, pathophysiology in the body can be targeted and the treatment of diseases can be monitored. Being a functional imaging modality, it is able to detect diseases at the molecular level, and thus it has increased our understanding of the immunological changes in the infected host at different stages of the HIV infection. It also detects pathological changes much earlier than conventional imaging based on anatomical changes. This is important in the immunocompromised host as in some of the associated disorders a delay in diagnosis may have dire consequences. Nuclear medicine has played a huge role in the management of many HIV-associated disorders in the past and continues to help in the diagnosis, prognosis, staging, monitoring and assessing the response to treatment of many HIV-associated disorders. As our understanding of the molecular basis of disease increases nuclear medicine is poised to play an even greater role. In this review we highlight the functional basis of the clinicopathological correlation of HIV from a metabolic view and discuss how the use of nuclear medicine techniques, with particular emphasis of F-18 fluorodeoxyglucose, may have impact in the setting of HIV. We also provide an overview of the role of nuclear medicine techniques in the management of HIV-associated disorders.

  2. National Counterterrorism Center: 2007 Report on Terrorism

    DTIC Science & Technology

    2008-04-30

    Approximately one half of the attacks in the NCTC database involve no loss of life. An attack that damages a pipeline and a car bomb attack that kills 100...rose by about 30 percent and 20 percent, respectively. Overall, suicide bombing attacks rose by about 50 percent and suicide car bombings about 40...January 2007, in Nukhaib, Al Anbar, Iraq, armed assailants in three cars attacked two buses transporting Shiite pilgrims back from the Hajj in Mecca to Al

  3. Combating Paramilitary Terrorism on the Homefront: An Examination of Capabilities and Limitations of U.S. Response Forces

    DTIC Science & Technology

    2015-12-01

    paramilitary methods with devastating results. This thesis examines the paramilitary terrorist attacks that occurred in Beslan in 2004 and in Mumbai in...paramilitary attack to be established. 14. SUBJECT TERMS paramilitary terrorism, North Hollywood shootout, Mumbai attack, Beslan school attack, posse...paramilitary terrorist attacks that occurred in Beslan in 2004 and in Mumbai in 2008 in an attempt to understand the threat and to establish the criteria for

  4. US Army Attack Aviation in a Decisive Action Environment: History, Doctrine, and a Need for Doctrinal Refinement

    DTIC Science & Technology

    2015-05-23

    flight. The design used the engine, transmission, and rotor system of the UH-1 design. In doing so, Bell helicopters publicly declared that the Cobra...Public Release; Distribution is Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT The attack helicopter airframe and role evolved slowly, over time, to...attack helicopter doctrine, heavily influenced by the Global War on Terror and the 11th Attack Helicopter Regiment’s disastrous deep attack during

  5. Attack rates of Sirex noctilio and patterns of pine tree defenses and mortality in northern Patagonia.

    PubMed

    Martinson, S J; Fernádez Ajó, A A; Martínez, A S; Krivak-Tetley, F E; Villacide, J M; Ayres, M P; Corley, J C

    2018-04-18

    Accidental and intentional global movement of species has increased the frequency of novel plant-insect interactions. In Patagonia, the European woodwasp, Sirex noctilio, has invaded commercial plantations of North American pines. We compared the patterns of resin defenses and S. noctilio-caused mortality at two mixed-species forests near San Carlos de Bariloche, Argentina. We observed lower levels of resin flow and higher levels of mortality in Pinus contorta compared with Pinus ponderosa. In general, S. noctilio attacked trees with lower resin compared with neighboring trees. Resin production in P. ponderosa was not related to growth rates, but for P. contorta, slower growing trees produced less resin than faster growing conspecifics. For all infested trees, attack density and number of drills (ovipositor probes) per attack did not vary with resin production. Most attacks resulted in one or two drills. Attack rates and drills/attack were basically uniform across the bole of the tree except for a decrease in both drills/attack and attack density in the upper portion of the crown, and an increase in the attack density for the bottom 10% of the tree. Planted pines in Patagonia grow faster than their counterparts in North America, and produce less resin, consistent with the growth-differentiation balance hypothesis. Limited resin defenses may help to explain the high susceptibility of P. contorta to woodwasps in Patagonia.

  6. Management of children and young people (CYP) with asthma: a clinical audit report.

    PubMed

    Levy, Mark L; Ward, Angela; Nelson, Sara

    2018-05-21

    An asthma attack or exacerbation signals treatment failure. Most attacks are preventable and failure to recognize risk of asthma attacks are well recognized as risk factors for future attacks and even death. Of the 19 recommendations made by the United Kingdom National Review of Asthma Deaths (NRAD) (1) only one has been partially implemented-a National Asthma Audit; however, this hasn't reported yet. The Harrow Clinical Commissioning Group (CCG) in London implemented a clinical asthma audit on 291 children and young people aged under 19 years (CYP) who had been treated for asthma attacks in 2016. This was funded as a Local Incentive Scheme (LIS) aimed at improving quality health care delivery. Two years after the publication of the NRAD report it is surprising that risks for future attacks were not recognized, that few patients were assessed objectively during attacks and only 10% of attacks were followed up within 2 days. However, it is encouraging that CYP hospital admissions following the audit were reduced by 16%, with clear benefit for patients, their families and the local health economy. This audit has provided an example of how clinicians can focus learning on patients who have had asthma attacks and utilize these events as a catalyst for active reflection in particular on modifiable risk factors. Through identification of these risks and active optimization of management, preventable asthma attacks could become 'never events'.

  7. Alligator attacks in southwest Florida.

    PubMed

    Harding, Brett E; Wolf, Barbara C

    2006-05-01

    The American alligator inhabits bodies of fresh water in Florida and other southeastern states. Although attacks on pets are frequent, alligator attacks on humans are relatively rare because of the animal's natural fear of man. Because of the rarity of attacks on humans, the pathologic findings and pathophysiology of death in such cases have not been well characterized in the literature. We report three cases of fatal alligator attacks that occurred in southwest Florida, each with different pathologic findings and mechanisms of death. Although the cause of death in each case was attributed to the alligator attack, the mechanisms of death differed and included exsanguination because of amputation of an extremity, overwhelming sepsis, and drowning. These cases illustrate the varied pathophysiologies associated with deaths due to alligator attacks on humans and the features that distinguish alligator bites from those of other aquatic predators.

  8. A closer look at the relationships between panic attacks, emergency department visits and non-cardiac chest pain.

    PubMed

    Foldes-Busque, Guillaume; Denis, Isabelle; Poitras, Julien; Fleet, Richard P; Archambault, Patrick; Dionne, Clermont E

    2017-01-01

    This study examined the prevalence of emergency department visits prompted by panic attacks in patients with non-cardiac chest pain. A validated structured telephone interview was used to assess panic attacks and their association with the emergency department consultation in 1327 emergency department patients with non-cardiac chest pain. Patients reported at least one panic attack in the past 6 months in 34.5 per cent (95% confidence interval: 32.0%-37.1%) of cases, and 77.1 per cent (95% confidence interval: 73.0%-80.7%) of patients who reported panic attacks had visited the emergency department with non-cardiac chest pain following a panic attack. These results indicate that panic attacks may explain a significant proportion of emergency department visits for non-cardiac chest pain.

  9. A Delayed Neutron Counting System for the Analysis of Special Nuclear Materials

    NASA Astrophysics Data System (ADS)

    Sellers, Madison Theresa

    Nuclear forensic analysis is a modem science that uses numerous analytical techniques to identify and attribute nuclear materials in the event of a nuclear explosion, radiological terrorist attack or the interception of illicit nuclear material smuggling. The Canadian Department of National Defence has participated in recent international exercises that have highlighted the Nation's requirement to develop nuclear forensics expertise, protocol and capabilities, specifically pertaining to the analysis of special nuclear materials (SNM). A delayed neutron counting (DNC) system has been designed and established at the Royal Military College of Canada (RMC) to enhance the Government's SNM analysis capabilities. This analytical technique complements those already at RMC by providing a rapid and non-destructive method for the analysis of the fissile isotopes of both uranium (U) and plutonium (Pu). The SLOWPOKE-2 reactor at RMC produces a predominately thermal neutron flux. These neutrons induce fission in the SNM isotopes 233U, 235U and 239Pu releasing prompt fast neutrons, energy and radioactive fission fragments. Some of these fission fragments undergo beta - decay and subsequently emit neutrons, which can be recorded by an array of sensitive 3He detectors. The significant time period between the fission process and the release of these neutrons results in their identification as 'delayed neutrons'. The recorded neutron spectrum varies with time and the count rate curve is unique to each fissile isotope. In-house software, developed by this project, can analyze this delayed neutron curve and provides the fissile mass in the sample. Extensive characterization of the DNC system has been performed with natural U samples with 235 U content ranging from 2--7 microg. The system efficiency and dead time behaviour determined by the natural uranium sample analyses were validated by depleted uranium samples with similar quantities of 235 U resulting in a typical relative error of 3.6%. The system has accurately determined 235U content over three orders of magnitude with 235U amounts as low as 10 ng. The results have also been proven to be independent of small variations in total analyte volume and geometry, indicating that it is an ideal technique for the analysis of samples containing SNM in a variety of different matrices. The Analytical Sciences Group at RMC plans to continue DNC system development to include 233U and 239pu analysis and mixtures of SNM isotopes. Keywords: delayed neutron counting, special nuclear materials, nuclear forensics.

  10. Develop a solution for protecting and securing enterprise networks from malicious attacks

    NASA Astrophysics Data System (ADS)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic as they are configured on a per-zone basis. Depending on the type of screen being configured, there may be additional settings beyond simply blocking the traffic. Attack prevention is also a native function of any firewall. Juniper Firewall handles traffic on a per-flow basis. We can use flows or sessions as a way to determine whether traffic attempting to traverse the firewall is legitimate. We control the state-checking components resident in Juniper Firewall by configuring "flow" settings. These settings allow you to configure state checking for various conditions on the device. You can use flow settings to protect against TCP hijacking, and to generally ensure that the fire-wall is performing full state processing when desired. We take a case study of attack on a network and perform study of the detection of the malicious packets on a Net screen Firewall. A new solution for securing enterprise networks will be developed here.

  11. Percolation Features on Climate Network under Attacks of El Niño Events

    NASA Astrophysics Data System (ADS)

    Lu, Z.

    2015-12-01

    Percolation theory under different attacks is one of the main research areas in complex networks but never be applied to investigate climate network. In this study, for the first time we construct a climate network of surface air temperature field to analyze its percolation features. Here, we regard El Niño event as a kind of naturally attacks generated from Pacific Ocean to attack its upper climate network. We find that El Niño event leads an abrupt percolation phase transition to the climate network which makes it splitting and unstable suddenly. Comparing the results of the climate network under three different forms of attacks, including most connected attack (MA), localized attack (LA) and random attack (RA) respectively, it is found that both MA and LA lead first-order transition and RA leads second-order transition to the climate network. Furthermore, we find that most real attacks consist of all these three forms of attacks. With El Niño event emerging, the ratios of LA and MA increase and dominate the style of attack while RA decreasing. It means the percolation phase transition due to El Niño events is close to first-order transition mostly affected by LA and MA. Our research may help us further understand two questions from perspective of percolation on network: (1) Why not all warming in Pacific Ocean but El Niño events could affect the climate. (2) Why the climate affected by El Niño events changes abruptly.

  12. Symptom Induction and De-escalation in the Treatment of Panic Attacks.

    ERIC Educational Resources Information Center

    Dattilio, Frank M.

    1990-01-01

    Describes technique known as symptom induction and de-escalation for panic attacks in which goal is to reproduce the type of situation that may precipitate an attack and then to show the client how the attacks can be "turned on" as well as "turned off." (ABL)

  13. Don't Take a Chance with a Heart Attack: Know the Facts and Act Fast

    MedlinePlus

    heart attack Know the symptoms. Take action. call Don’t Take a Chance With a Heart Attack: Know the Facts and Act Fast “ One evening ... didn’t think I could be having a heart attack. I didn’t expect it to happen to ...

  14. Learn What a Heart Attack Feels Like--It Could Save Your Life

    MedlinePlus

    Learn What a Heart Attack Feels Like— It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to ... heart attack warning signs. Your chest hurts or feels squeezed. One or both arms, your back, shoulders, ...

  15. Case report: Pig attack with successful postexposure prophylaxis management.

    PubMed

    Hall, A Brad; Smith, David; Palmer, Jillian

    2014-05-01

    The domesticated pig or boar is ubiquitous to agriculture around the world and is an important food product in most countries. The males that are able to grow tusks that can approach 5 in are the primary contributor to morbidity and mortality from boar attacks. Literature surrounding domesticated boar attacks is sparse. There are no published cases of domesticated boar attacks that describe successful bacterial postexposure prophylaxis. We present a case report of an attack on an adult female by a domesticated boar.

  16. Cougar attacks on humans: a case report.

    PubMed

    McKee, Denise

    2003-01-01

    Cougar attacks on humans are increasing. Presented is a case report of a nonfatal 2-year-old male cougar attack on an 8-year-old girl in British Columbia. Discussions of wound management, rabies postexposure prophylaxis (RPEP), and the possible psychologic ramifications of such an attack are presented. Also reviewed are recommendations on actions that may be helpful in preventing an attack following a sudden encounter with a cougar. Humans must learn to coexist with cougars, which present a small but real threat to people.

  17. Epidemics of panic during a bioterrorist attack--a mathematical model.

    PubMed

    Radosavljevic, Vladan; Radunovic, Desanka; Belojevic, Goran

    2009-09-01

    A bioterrorist attacks usually cause epidemics of panic in a targeted population. We have presented epidemiologic aspect of this phenomenon as a three-component model--host, information on an attack and social network. We have proposed a mathematical model of panic and counter-measures as the function of time in a population exposed to a bioterrorist attack. The model comprises ordinary differential equations and graphically presented combinations of the equations parameters. Clinically, we have presented a model through a sequence of psychic conditions and disorders initiated by an act of bioterrorism. This model might be helpful for an attacked community to timely and properly apply counter-measures and to minimize human mental suffering during a bioterrorist attack.

  18. Framework and methodology for supply chain lifecycle analytics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hamlet, Jason; Eames, Brandon K.; Kao, Gio K.

    The various technologies presented herein relate to pertaining to identifying and mitigating risks and attacks on a supply chain. A computer-implemented representation of a supply chain is generated comprising nodes (locations) and edges (objects, information). Risk to attack and different attack vectors can be defined for the various nodes and edges, and further, based upon the risks and attacks, (difficulty, consequence) pairs can be determined. One or more mitigations can be generated to increase a difficulty of attack and/or reduce consequence of an attack. The one or more mitigations can be constrained, e.g., by cost, time, etc., to facilitate determinationmore » of how feasible a respective mitigation is to implement with regard to finances available, duration to implement, etc. A context-free grammar can be utilized to identify one or more attacks in the supply chain. Further, the risks can undergo a ranking to enable mitigation priority to be determined.« less

  19. Wind-tunnel investigation of the flow correction for a model-mounted angle of attack sensor at angles of attack from -10 deg to 110 deg. [Langley 12-foot low speed wind tunnel test

    NASA Technical Reports Server (NTRS)

    Moul, T. M.

    1979-01-01

    A preliminary wind tunnel investigation was undertaken to determine the flow correction for a vane angle of attack sensor over an angle of attack range from -10 deg to 110 deg. The sensor was mounted ahead of the wing on a 1/5 scale model of a general aviation airplane. It was shown that the flow correction was substantial, reaching about 15 deg at an angle of attack of 90 deg. The flow correction was found to increase as the sensor was moved closer to the wing or closer to the fuselage. The experimentally determined slope of the flow correction versus the measured angle of attack below the stall angle of attack agreed closely with the slope of flight data from a similar full scale airplane.

  20. Modeling and Managing Risk in Billing Infrastructures

    NASA Astrophysics Data System (ADS)

    Baiardi, Fabrizio; Telmon, Claudio; Sgandurra, Daniele

    This paper discusses risk modeling and risk management in information and communications technology (ICT) systems for which the attack impact distribution is heavy tailed (e.g., power law distribution) and the average risk is unbounded. Systems with these properties include billing infrastructures used to charge customers for services they access. Attacks against billing infrastructures can be classified as peripheral attacks and backbone attacks. The goal of a peripheral attack is to tamper with user bills; a backbone attack seeks to seize control of the billing infrastructure. The probability distribution of the overall impact of an attack on a billing infrastructure also has a heavy-tailed curve. This implies that the probability of a massive impact cannot be ignored and that the average impact may be unbounded - thus, even the most expensive countermeasures would be cost effective. Consequently, the only strategy for managing risk is to increase the resilience of the infrastructure by employing redundant components.

Top