Science.gov

Sample records for nuclear smuggling deterrence

  1. Preliminary evaluation of a fluorescence and radioisotope nuclear smuggling deterrence tag - final report (IL500E)

    SciTech Connect

    Hartenstein, S.D.; Aryaeinejad, R.; Delmastro, J.R.

    1997-04-01

    This report summarizes the efforts completed in identifying candidate fluorescence compounds and radioisotopes for a developing tagging system. The tagging system is being developed as a deterrent to nuclear smuggling, by providing a means of: (1) tracing materials and pilferers to the facility of origin for any recovered special nuclear materials, (2) inventory control of long-term stored items containing special nuclear materials, and (3) tracking materials transferred between facilities. The system uses three types of materials to cover a range of applications intended to prevent the pilfering of special nuclear materials. One material, fluorescent compounds which are invisible without ultraviolet or near-infrared detection systems, is marked on controlled items with a tracking pattern that corresponds to a specified item in a specified location in the data control system. The tagging system uses an invisible, fluorescent dusting powder to mark equipment and personnel who inappropriately handle the tagged material. The tagging system also uses unique combinations of radionuclides to identify the facility of origin for any special nuclear material. This report also summarizes the efforts completed in identifying hardware that will be used for the tagging system. This hardware includes the devices for applying the tagging materials, the commercially available fluorescence detection systems, and gamma ray detection systems assembled from existing, commercially available technologies.

  2. Nuclear Smuggling Detection and Deterrence FY 2016 Data Analysis Annual Report

    SciTech Connect

    Enders, Alexander L.; Harris, Tyrone C.; Pope, Thomas C.; Patterson, Jeremy B.

    2017-01-01

    The National Nuclear Security Administration’s Office of Nuclear Smuggling Detection and Deterrence (NSDD) has facilitated the installation of more than 3,500 radiation portal monitors (RPMs) at 606 sites in 56 countries worldwide. This collection of RPMs represents the world’s largest network of radiation detectors and provides one element in the defense-in-depth approach that supports the Global Nuclear Detection Architecture. These systems support NSDD’s mission to build partner country capability to deter, detect, and interdict the illicit transport of radiological and fissile material through strategic points of entry and exit at seaports, airports, and border crossings. NSDD works collaboratively with partner countries and international organizations to optimize the operation of these RPMs. The large amount of data provided by NSDD partner countries highlights the close cooperation and partnerships NSDD has built with 56 countries around the world. Thirty-seven of these countries shared at least some RPM-related data with NSDD in fiscal year 2016. This significant level of data sharing is a key element that distinguishes the NSDD office as unique among nuclear nonproliferation programs and initiatives: NSDD can provide specific, objective, data-driven decisions and support for sustaining the radiation detection systems it helped deploy. This data analysis report summarizes and aggregates the RPM data provided to the NSDD office for analysis and review in fiscal year 2016. The data can be used to describe RPM performance and characterize the wide diversity of NSDD deployment sites. For example, NSDD deploys detector systems across sites with natural background radiation levels that can vary by a factor of approximately six from site to site. Some lanes have few occupancies, whereas others have approximately 8,000 occupancies per day and the different types of cargo that travel through a site can result in site-wide alarm rates that range from near 0% at

  3. Technical description of candidate fluorescence compounds and radioisotopes for a nuclear smuggling deterrence tag (IL500E)

    SciTech Connect

    Hartenstein, S.D.; Aryaeinejad, R.

    1996-03-01

    This report summarizes the efforts completed in identifying candidate fluorescence compounds and radioisotopes for a developing tagging system. The tagging system is being developed as a deterrent to nuclear smuggling, by providing a means of: (1) tracing materials and pilferers to the facility of origin for any recovered special nuclear materials; (2) inventory control of long-term stored items containing special nuclear materials; and (3) tracking materials transferred between facilities. The tagging system uses four types of tagging materials to cover a range of applications intended to prevent the pilfering of special nuclear materials. One material, fluorescent compounds which are invisible without ultraviolet or near-infrared detection systems, is marked on controlled items with a tracking pattern that corresponds to a specified item in a specified location in the data control system. The tagging system uses an invisible, fluorescent dusting powder to mark equipment and personnel who inappropriately handle the tagged material. The tagging system also uses unique combinations of radionuclides to identify the facility of origin for any special nuclear material. Currently, 18 long-lived radioisotopes, 38 short-live radioisotopes and 10 fluorescent compounds have been selected as candidate materials for the tagging system.

  4. Training options for countering nuclear smuggling

    SciTech Connect

    Ball, D Y; Erickson, S A

    1999-07-01

    The burden of stopping a nuclear smuggling attempt at the border rests most heavily on the front-line customs inspector. He needs to know how to use the technological tools at his disposal, how to discern tell-tale anomalies in export documents and manifests, how to notice psychological signs of a smuggler's tension, and how to search anything that might hide nuclear material. This means that assistance in the counter-nuclear smuggling training of customs officers is one of the most critical areas of help that the United States can provide. This paper discusses the various modes of specialized training, both in the field and in courses, as well as the types of assistance that can be provided. Training for nuclear customs specialists, and supervisors and managers of nuclear smuggling detection systems is also important, and differs from front-line inspector training in several aspects. The limitations of training and technological tools such as expert centers that will overcome these limitations are also discussed. Training assistance planned by DOE/NN-43 to Russia within the Second Line of Defense program is discussed in the light of these options, and future possibilities for such training are projected.

  5. Nuclear deterrence, morality, and realism

    SciTech Connect

    Finnis, J.; Boyle, J.M. Jr.; Grisez, G.

    1987-01-01

    Nuclear deterrence deserves rigorous, objective ethical analysis. In providing it, the authors of this book face realities - the Soviet threat, possible nuclear holocaust, strategic imperatives - but they also unmask moral evasions - deterrence cannot be bluff, pure counterforce, the lesser (or greater) evil, or a step towards disarmament. They conclude that the deterrent is unjustifiable and examine the new questions of conscience that this raises for everyone.

  6. Detector Requirements to Curb Nuclear Smuggling

    SciTech Connect

    Erickson, S A

    2001-11-14

    The problem of stopping nuclear smuggling of terrorist nuclear devices is a complex one, owing to the variety of pathways by which such a device can be transported. To fashion new detection systems that improve the chances of detecting such a device, it is important to know the various requirements and conditions that would be imposed on them by both the types of devices that might be smuggled and by the requirement that it not overly interfere with the transportation of legitimate goods. Requirements vary greatly from low-volume border crossings to high-volume industrial container ports, and the design of systems for them is likely to be quite different. There is also a further need to detect these devices if they are brought into a country via illicit routes, i.e., those which do not pass through customs posts, but travel overland though open space or to a smaller, unguarded airport or seaport. This paper describes some generic uses of detectors, how they need to be integrated into customs or other law enforcement systems, and what the specifications for such detectors might be.

  7. Busting Myths about Nuclear Deterrence

    DTIC Science & Technology

    2015-01-01

    Strategic Studies Quarterly ♦ Spring 2015 [ 17 ] Busting Myths about Nuclear Deterrence America is embarked on a quest for a world without nuclear...Cervantes’s Don Quixote, tilting fatefully at windmills. Currently, there are too many er- roneous popular myths accepted uncritically by too many people...about US nuclear capability. This commentary serves as a myth buster to elu- cidate these beliefs and confront them with the facts about America’s

  8. A treaty to ban nuclear smuggling: The next step in nuclear material control?

    SciTech Connect

    Carnahan, B.M.; Smith, J.R.

    1994-10-01

    Since the demise of the Soviet Union, reports have continued to surface that weapons-usable nuclear material has been smuggled out of former Soviet territory into the hands of proliferant states. So far, few examples of nuclear smuggling have involved serious quantities of weapons-usable material, and much purported smuggling has involved attempted fraud rather than an effort to transfer fissile material. In no instance has an actual transfer to a potential proliferant state been verified.

  9. Minimum Nuclear Deterrence Research

    DTIC Science & Technology

    2003-05-15

    Systems and Concepts Office Contract No: DTRA01-00- D -0003, Delivery Order 0018 Prepared by: Team Lead – Gregory Giles Christine Cleary...projects on chemical, biological, and nuclear weapons issues. This work was performed for DTRA under contract DTRA01-00- D -0003, Task 18...highly provocative. The same reasoning would seem to apply not only to U.S. operational nuclear forces but also the “responsive force” of reserve

  10. Detecting nuclear materials smuggling: performance evaluation of container inspection policies.

    PubMed

    Gaukler, Gary M; Li, Chenhua; Ding, Yu; Chirayath, Sunil S

    2012-03-01

    In recent years, the United States, along with many other countries, has significantly increased its detection and defense mechanisms against terrorist attacks. A potential attack with a nuclear weapon, using nuclear materials smuggled into the country, has been identified as a particularly grave threat. The system for detecting illicit nuclear materials that is currently in place at U.S. ports of entry relies heavily on passive radiation detectors and a risk-scoring approach using the automated targeting system (ATS). In this article we analyze this existing inspection system and demonstrate its performance for several smuggling scenarios. We provide evidence that the current inspection system is inherently incapable of reliably detecting sophisticated smuggling attempts that use small quantities of well-shielded nuclear material. To counter the weaknesses of the current ATS-based inspection system, we propose two new inspection systems: the hardness control system (HCS) and the hybrid inspection system (HYB). The HCS uses radiography information to classify incoming containers based on their cargo content into "hard" or "soft" containers, which then go through different inspection treatment. The HYB combines the radiography information with the intelligence information from the ATS. We compare and contrast the relative performance of these two new inspection systems with the existing ATS-based system. Our studies indicate that the HCS and HYB policies outperform the ATS-based policy for a wide range of realistic smuggling scenarios. We also examine the impact of changes in adversary behavior on the new inspection systems and find that they effectively preclude strategic gaming behavior of the adversary. © 2011 Society for Risk Analysis.

  11. Nuclear deterrence: New risks, new opportunities

    SciTech Connect

    Kelleher, C.M.; Kerr, F.J.; Quester, G.H.

    1986-01-01

    This book presents papers on nuclear weapons strategy. Topics considered include new technologies, arms control, risk assessment, nuclear winter, nuclear deterrence, military strategy, ballistic missile defense, proliferation, global military balance, West European politics, the Chinese view, non-proliferation policy, and first-use.

  12. British nuclear deterrent after the cold war

    SciTech Connect

    Witney, N.K.

    1995-11-01

    The Trident nuclear deterrent program is one of the United Kingdom`s largest-ever military acquisitions. Planned and initiated in the depths of the Cold War, it is now coming to fruition, when the most obvious justification for it--the Soviet threat to Western Europe--has disappeared. The continuation of the program is not in doubt; the money is largely spent or committed, and the main political parties agree on deploying the force. But the rationale needs refurbishment. Britain has traditionally preferred to represent her nuclear capability primarily as a contribution to NATO`s collective deterrence. The second center of decisionmaking concept defined a particular value for that contribution. This rationale seized the moral high ground (by associating Britain`s deterrent with NATO`s strategy to prevent war), guarded the proliferation flank, and underpinned Anglo-American relations.

  13. ASSESSING THE UNCERTAINTY OF NUCLEAR DETERRENCE

    DTIC Science & Technology

    2017-04-22

    escalation. Examining militarized interstate dispute (MID) data from the Cold War suggests nations alter their behavior with regard to initiating conflict...escalatory actions after obtaining nuclear weapons.11 Consider Figure 2 which breaks down hostility levels from MIDs over the Cold War years from 1946...nuclear deterrence of “mutually severe retaliatory threats” dominated U.S. policy throughout the Cold War.22 With a mutually assured destruction (MAD

  14. Nuclear deterrence in South Asia

    SciTech Connect

    Hagerty, D.T.

    1995-12-31

    Did India and Pakistan nearly fight a nuclear war in 1990? In a provocative 1993 article, Seymour M. Hersh claims that they did. During a crisis with India over the rapidly escalating insurgency in Kashmir, Pakistan openly deployed its main armored tank units along the Indian border and, in secret, placed its nuclear-weapons arsenal on alert. As a result, the Bush Administration became convinced that the world was on the edge of a nuclear exchange between Pakistan and India. Universe of cases is admittedly small, but my argument is supported by recent research indicating that preemptive attacks of any kind have been historically rarer than conventionally believed. The nuclear era has seen two instances of preventive attacks against nuclear facilities-the 1981 Israeli bombing of Iraq`s Osirak nuclear facility and the allied coalition`s 1991 air war against Iraq-but both of these actions were taken without fear of nuclear reprisal. In situations where nuclear retaliation has been a possibility, no leader of nuclear weapon state has chosen to launch a preemptive first strike. 97 refs.

  15. On Nuclear Deterrence and Assurance

    DTIC Science & Technology

    2009-01-01

    Japan Consider Nuclear Weapons,” Japan Times, 6 September 2006; and Tim Johnson, “Nuclear Ta- boo Slowly Giving Way,” Miami Herald, 24 September 2006, 1...66. Winston Churchill, quoted in a speech by Prime Minister Margaret Thatcher to a joint meeting of the US Congress, 20 February 1985, http

  16. Crisis relocation and nuclear deterrence. Student essay

    SciTech Connect

    Kiser, J.L.

    1986-04-07

    The difficulty of providing adequate protection to the civilian population with some kind of civil defense program is magnified by the technology available in the nuclear age. The United States expanded its civil defense program in the 1950's to include a measure of protection in the event of the explosion of nuclear devices. However, the history of the United States civil defense program has been generally characterized by inadequate funding and little interest at all levels of government. Most recently, the civil defense program has been associated and considered a component of nuclear deterrence. Under the direction of the Federal Emergency Management Agency, the government will rely on crisis relocation as the primary means of protecting the population in the event of a nuclear attack or detonation. This plan envisions that evacuation of the population from high-risk areas to safer host areas. Does crisis relocation provide the country with a credible component to our nuclear deterrence. Do the leaders and citizens have confidence in the nation's ability to protect the civilian population. Have the leaders been completely forthright in preparing the population for the possibility of a nuclear war. These and related issues are discussed in this essay.

  17. Future of strategic nuclear deterrence. Study project

    SciTech Connect

    Floris, J.

    1992-04-10

    The evolving role of our Strategic Nuclear Forces and the deterrent requirement of that force in a changing and volatile world are two of the most contentious issues facing this country's leadership. The debate surrounding these forces has been brought about by many diverse factors that include the dissolution of the Soviet Union and the resultant end of the Cold War, bilateral arms control agreements and unilateral reductions which have reduced the number and operational status of nuclear forces, and a perceived reduction in the threat facing the U.S. and its allies. Additionally, the success of U.S. technology as seen in the effects of modern conventional munitions in the Gulf War and the proliferation of ballistic missile and nuclear weapons technology into Third World countries have further compounded the complexity of the issue. The concomitant changes in the focus and structure of U.S. and allied military forces have further fueled the debate. As the National Security Strategy and supporting National Military Strategy are evolving to meet new threats, it is essential to provide an analysis of the continued deterrent role of our Strategic Nuclear Force in this changing world.

  18. FAILURE OF NUCLEAR DETERRENCE IN THE CUBAN MISSILE CRISIS

    DTIC Science & Technology

    2017-04-06

    not used during the crisis lends itself towards the convenience of a nuclear deterrence success , but a closer look at the actual events and covert...make the case for how possession of nuclear weapons alone does not always lead to deterrent success by examining the Cuban Missile Crisis. Kennedy’s...perfect record of success , the implications on US national strategic policy, based primarily on deterrence, are profound. The decisive lesson from this

  19. Extended Deterrence, Nuclear Proliferation, and START III

    SciTech Connect

    Speed, R.D.

    2000-06-20

    Early in the Cold War, the United States adopted a policy of ''extended nuclear deterrence'' to protect its allies by threatening a nuclear strike against any state that attacks these allies. This threat can (in principle) be used to try to deter an enemy attack using conventional weapons or one using nuclear, chemical, or biological weapons. The credibility of a nuclear threat has long been subject to debate and is dependent on many complex geopolitical factors, not the least of which is the military capabilities of the opposing sides. The ending of the Cold War has led to a significant decrease in the number of strategic nuclear weapons deployed by the United States and Russia. START II, which was recently ratified by the Russian Duma, will (if implemented) reduce the number deployed strategic nuclear weapons on each side to 3500, compared to a level of over 11,000 at the end of the Cold War in 1991. The tentative limit established by Presidents Clinton and Yeltsin for START III would reduce the strategic force level to 2000-2500. However, the Russians (along with a number of arms control advocates) now argue that the level should be reduced even further--to 1500 warheads or less. The conventional view is that ''deep cuts'' in nuclear weapons are necessary to discourage nuclear proliferation. Thus, as part of the bargain to get the non-nuclear states to agree to the renewal of the Nuclear Non-Proliferation Treaty, the United States pledged to work towards greater reductions in strategic forces. Without movement in the direction of deep cuts, it is thought by many analysts that some countries may decide to build their own nuclear weapons. Indeed, this was part of the rationale India used to justify its own nuclear weapons program. However, there is also some concern that deep cuts (to 1500 or lower) in the U.S. strategic nuclear arsenal could have the opposite effect. The fear is that such cuts might undermine extended deterrence and cause a crisis in confidence

  20. The nuclear debate: Deterrence and the lapse of faith

    SciTech Connect

    Tucker, R.W.

    1985-01-01

    This essay examines the growth of skepticism about the present system of nuclear deterrence. Tucker resists predicting the ultimate outcome, but he views the nuclear debate of this decade as an important ''lapse of faith'' in deterrence and he doubts there will ever be a full restoration of confidence.

  1. Department of Energy: An Organizational Look at Americas Nuclear Deterrent

    DTIC Science & Technology

    2016-09-01

    study performs a detailed literature review to identify and understand major 5 organizational cultural challenges. The literature review provides the...DEPARTMENT OF ENERGY: AN ORGANIZATIONAL LOOK AT AMERICA’S NUCLEAR DETERRENT GRADUATE RESEARCH PAPER David O. Pabst, Maj, USAF...DEPARTMENT OF ENERGY: AN ORGANIZATIONAL LOOK AT AMERICA’S NUCLEAR DETERRENT GRADUATE RESEARCH PAPER Presented to the Faculty

  2. The Deterrence of Nuclear Terrorism through an Attribution Capability

    DTIC Science & Technology

    2008-06-01

    using the tools and methods of nuclear forensics can address that challenge. The prevention of nuclear terrorism is a multi-front battle. One of...of a nuclear explosion. The current state of a national nuclear forensics capability is lacking. There is a need for a more robust database of...Nuclear Forensics , Nuclear Terrorism, Nuclear Attribution, Deterrence, Terrorism 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT

  3. Nuclear policy impacts at the national laboratories: maintaining the deterrence

    SciTech Connect

    Beck, James Bradley

    2010-08-24

    In this presentation, the author will discuss recent nuclear policy impacts, including the 2010 Nuclear Posture Review, and the impacts they have on maintaining the nuclear deterrent. Specifically, he will highlight some of the remaining questions and challenges that remain to the nation and to the national laboratories. (auth)

  4. Dealing with a Nuclear Iran: Applying Historical Lessons in Deterrence

    DTIC Science & Technology

    2012-02-15

    Israel is widely considered to have acquired nuclear weapons in the late 1960’ s . Although never acknowledged, the “overall consensus is that Israel...Harvard University Press, 1960), 3-20. 4 Ibid, 6. 5 Ibid, 187. 6 Frank C. Zagare and D. Marc Kilgour, Perfect Deterrence (Cambridge, UK...11 December 2011). Zagare , Frank C., and D. Marc Kilgour. Perfect Deterrence. Cambridge, UK: Cambridge University Press, 2000.

  5. What Happens to Deterrence as Nuclear Weapons Decrease Toward Zero?

    NASA Astrophysics Data System (ADS)

    Drell, Sidney

    2011-04-01

    Steps reducing reliance on deployed nuclear weapons en route to zero will be discussed. They include broadly enhancing cooperation and transparency agreements beyond the provisions for verifying limits on deployed strategic nuclear warheads and delivery systems in the New START treaty. Two questions that will be addressed are: What conditions would have to be established in order to maintain strategic stability among nations as nuclear weapons recede in importance? What would nuclear deterrence be like in a world without nuclear weapons?

  6. Distributional properties of stochastic shortest paths for smuggled nuclear material

    SciTech Connect

    Cuellar, Leticia; Pan, Feng; Roach, Fred; Saeger, Kevin J

    2011-01-05

    The shortest path problem on a network with fixed weights is a well studied problem with applications to many diverse areas such as transportation and telecommunications. We are particularly interested in the scenario where a nuclear material smuggler tries to succesfully reach herlhis target by identifying the most likely path to the target. The identification of the path relies on reliabilities (weights) associated with each link and node in a multi-modal transportation network. In order to account for the adversary's uncertainty and to perform sensitivity analysis we introduce random reliabilities. We perform some controlled experiments on the grid and present the distributional properties of the resulting stochastic shortest paths.

  7. Nuclear Deterrence in a Regional Context

    DTIC Science & Technology

    1994-01-01

    with these questions. The first report’ presents a general re- formulation of deterrence geared toward potential regional adver - saries. The second... adver - saries are willing to take substantial risks because they frequently enter crises out of a desire to avert some loss, e.g., a loss of territory...the specific motivations of the adver - sary, the interests and reputation that affect the resolve of each con- testant (these may change as the

  8. Nuclear Deterrence in the Age of Nonproliferation

    SciTech Connect

    Richardson, J

    2009-01-21

    The fallacy of zero nuclear weapons, even as a virtual goal, is discussed. Because the complete abolition of nuclear weapons is not verifiable, nuclear weapons will always play a role in the calculus of assure, dissuade, deter and defeat (ADDD). However, the relative contribution of nuclear weapons to international security has diminished. To reconstitute the Cold War nuclear capability, with respect to both the nuclear weapons capability and their associated delivery systems, is fiscally daunting and not warranted due to competing budgetary pressures and their relative contribution to international security and nonproliferation. A proposed pathway to a sustainable nuclear weapons capability end-state is suggested which provides enough ADDD; a Dyad composed of fewer delivery and weapon systems, with trickle production at the National Laboratories and private sector to maintain capability and guard against technological surprise.

  9. Challenging Minimum Deterrence: Articulating the Contemporary Relevance of Nuclear Weapons

    DTIC Science & Technology

    2016-07-13

    the Cold War, the enduring relevance of nuclear weapons has been the subject of immense debate with policy analysts proposing several alter-native...proponents offer the historical argument that “both sides were, in fact, deterred fairly early on during the Cold War” and that the massive buildup of...the United States, beginning with a short account of why America did not implement minimum deterrence during the Cold War. In the late 1950s

  10. Nuclear deterrence in the Arab-Israeli conflict. A case study in Egyptian-Israeli relations

    SciTech Connect

    Shikaki, K.I.

    1986-01-01

    In order to achieve security and stability, and maximize the chances for resolving the Arab-Israeli conflict, should Egypt and Israel adopt declared nuclear deterrence doctrines. Or would such a move be ineffective, dangerous, or even disastrous. The nuclearization of the Middle East is not necessary: military threats to the survival of the states in the region do not justify the introduction of nuclear weapons. Nuclearization is not desirable: deterrence theory's assumptions and implications exhibit intellectual weakness and its explanatory power is unsatisfactory; nuclear deterrence may reduce the frequency of war, but it pays little attention to the consequences of war; and in comparison to defense, nuclear deterrence may lack credibility. Presently, Israel has nuclear capability and delivery systems sufficient to provide security to its vital areas through deterrence of or defense against Arab attacks. The Arabs do not, however, believe that such security extends to the Arab territories occupied by Israel during the June 1967 war. To supply security, nuclear deterrence must be effective, stable, and credible. In a multinuclear environment, the Egyptians and Israelis are likely to meet the requirement for an effective deterrence: the possession of a nuclear capability sufficient to inflict an enormous amount of death and destruction. If the Arabs and Israelis sought and adopted strategies of deterrence, they might be able to meet the requirement for a stable deterrence: the acquisition of second strike capabilities.

  11. Nuclear Proliferation and Deterrence: A Policy Conundrum

    DTIC Science & Technology

    1993-01-01

    we are certainly in the position to make their use a costly proposition. NOTES 1. Ronald Reagan, An American Life, p. 548, as quoted in Patrick ... Glynn . Closing Pandora’s Box (New York: New Republic Books, 1992), p. 347. 2. Frederick R. Strain, Confronting Nuclear Addiction: The Challenge (~f

  12. Nuclear Deterrence in the 21st Century

    DTIC Science & Technology

    2008-03-25

    Freedman, Makers of Modern Strategy from Machiavelli to the Nuclear Age (Princeton: Princeton University Press, 1986), 735. 4 Carl von Clausewitz, On...26 Scott D. Sagan , "How to Keep the Bomb from Iran," Foreign Affairs 85, (September/October 2006): 45 27 Matthew Bunn, "Bombs We Can Stop

  13. In defiance of nuclear deterrence: anti-nuclear New Zealand after two decades.

    PubMed

    Reitzig, Andreas

    2006-01-01

    In 1984, nuclear-armed and nuclear-powered vessels were banned from New Zealand to express the country's rejection of the nuclear deterrence concept. This led to a disagreement with the United States. Today, the ban on nuclear-powered ships is the only element of the nuclear-free legislation that still strains US-New Zealand relations. This article presents the reasons for the ban on nuclear-powered ships, which include scientific safety concerns, a symbolic rejection of the nuclear deterrence posture, and patriotic factors such as a nuclear-free national identity. The military and economic consequences of the ban are also examined. Since the ban on nuclear-powered vessels appears to be neither widely known abroad nor commonly recognised as a supportive disarmament measure outside New Zealand, it is concluded that whatever the future of this ban will be, New Zealand's anti-nuclear image will remain known internationally through the ban on nuclear arms.

  14. Stockpile Stewardship: How we Ensure the Nuclear Deterrent without Testing

    SciTech Connect

    2014-09-04

    In the 1990s, the U.S. nuclear weapons program shifted emphasis from developing new designs to dismantling thousands of existing weapons and maintaining a much smaller enduring stockpile. The United States ceased underground nuclear testing, and the Department of Energy created the Stockpile Stewardship Program to maintain the safety, security, and reliability of the U.S. nuclear deterrent without full-scale testing. This video gives a behind the scenes look at a set of unique capabilities at Lawrence Livermore that are indispensable to the Stockpile Stewardship Program: high performance computing, the Superblock category II nuclear facility, the JASPER a two stage gas gun, the High Explosive Applications Facility (HEAF), the National Ignition Facility (NIF), and the Site 300 contained firing facility.

  15. Stockpile Stewardship: How we Ensure the Nuclear Deterrent without Testing

    ScienceCinema

    None

    2016-07-12

    In the 1990s, the U.S. nuclear weapons program shifted emphasis from developing new designs to dismantling thousands of existing weapons and maintaining a much smaller enduring stockpile. The United States ceased underground nuclear testing, and the Department of Energy created the Stockpile Stewardship Program to maintain the safety, security, and reliability of the U.S. nuclear deterrent without full-scale testing. This video gives a behind the scenes look at a set of unique capabilities at Lawrence Livermore that are indispensable to the Stockpile Stewardship Program: high performance computing, the Superblock category II nuclear facility, the JASPER a two stage gas gun, the High Explosive Applications Facility (HEAF), the National Ignition Facility (NIF), and the Site 300 contained firing facility.

  16. An Uncertain Deterrence: Bernard Brodie, Indian Nuclear Strategy, and the Problems of Stability

    DTIC Science & Technology

    1997-01-01

    NATIONAL DEFENSE UNNERSm NATIONAL WAR COLLEGE An Uncertain Deterrence : Bernard Brodie, Indian Nuclear Strategy, and the Problem of Stability...COVERED 00-00-1997 to 00-00-1997 4. TITLE AND SUBTITLE An Uncertain Deterrence: Bernard Brodie, Indian Nuclear Strategy, and the Problems of...themselves anconsciously reject tie concept of deterrence based on retalirrtron’. The above statement was excerpted from Bernard Brodie’s 1959 sruc?y

  17. U.S. second line of defense: preventing nuclear smuggling across Russia's borders

    SciTech Connect

    Ball, D. Y.

    1998-11-16

    Preventing the theft of weapons-usable highly enriched uranium and plutonium in Russia is one of the central security concerns facing the US today. The dissolution of the highly centralized USSR and the resulting societal crisis has endangered Russia's ability to protect its more than 200 metric tons of plutonium and 1000 tons of highly enriched uranium (roughly 8 kg Pu or 25 kg HEU is sufficient to make a bomb). Producing this fissile material is the most difficult and expensive part of nuclear weapons production and the US must make every effort to ensure that fissile material (and nuclear-related technologies) does not reach the hands of terrorist groups, rogue states or other potential proliferators. In response to this concern, the US has undertaken a number of initiatives in partnership with Russia and other FSU states to prevent the theft of fissile material. The Material Protection, Control and Accounting Program (MPC&A) was begun in 1993 to prevent the theft of nuclear materials from Russian civilian complexes, that is facilities not under control of the Ministry of Defense, which is largely responsible for possession and oversight of nuclear weapons. The MPC&A program is considered the first line of defense against theft of nuclear material because its goal is to prevent theft of material at production and storage facilities. This year the Department of Energy (DOE) initiated a new program called the Second Line of Defense (SLD), the goal of which is to assist Russia in preventing the smuggling of nuclear material and weapons at its borders, either by land, sea or air. The SLD program represents an important phase in the overall effort to ensure the security of nuclear material and weapons in Russia. However, as the US engages Russian customs officials in this important project, Americans should keep in mind that providing equipment--even indigenous equipment--is insufficient by itself; material aid must be accompanied by rigorous inspection and

  18. Nuclear Deterrence in the 21st Century: The Role of Science and Engineering

    SciTech Connect

    Martz, Joseph C; Ventura, Jonathan S

    2008-01-01

    Twenty-first century security challenges are multi-polar and asymmetric. A few nations have substantial nuclear arsenals and active nuclear weapons programs that still threaten vital US national security directly or by supporting proliferation. Maintaining a credible US nuclear deterrent and containing further proliferation will continue to be critical to US national security. Overlaid against this security backdrop, the rising worldwide population and its effects on global climate, food, and energy resources are greatly complicating the degree and number of security challenges before policy makers.This new paradigm requires new ways to assure allies that the United States remains a trusted security partner and to deter potential adversaries from aggressive actions that threaten global stability. Every U.S. President since Truman has affirmed the role of nuclear weapons as a supreme deterrent and protector of last resort of U.S. national security interests. Recently, President Bush called for a nuclear deterrent consistent with the 'lowest number of nuclear weapons' that still protects U.S. interests. How can this be achieved? And how can we continue on a path of nuclear reductions while retaining the security benefits of nuclear deterrence? Science and engineering have a key role to play in a potential new paradigm for nuclear deterrence, a concept known as 'capability-based deterrence.'

  19. Strategic nuclear deterrence: Yesterday, today, and tomorrow. Individual study project

    SciTech Connect

    Crawford, S.L.

    1991-03-15

    On 16 July 1945, the first atom bomb was successfully exploded over Trinity, New Mexico, and raised the question: What should we do with it. Once the conclusion to use the weapon had been reached, only one employment decision was necessary: Should it be dropped on a city or on a military target. Limitations on the bomb's power and accuracy negated its use against ships in Tokyo Bay, while Army bases had air raid shelters. On the other hand, a drop on any city would have an impressive effect. The practice of destroying cities was well established by August, 1945, and policy makers saw no moral difference using the atom bomb. So Hiroshima and Nagasaki were struck. Over time, the development and debates over nuclear strategy have become infinitely more complex. This study describes the evolution of United States nuclear deterrence strategy; discusses why the author believes it was successful during the Cold War period; assesses its viability against the post-Cold War threat; and, finally, offers a new paradigm for the utilization of the strategic nuclear balance. Although other factors are considered, the environment for this study encompasses primarily the relationship between the United States and the Soviet Union.

  20. Modeling most likely pathways for smuggling radioactive and special nuclear materials on a worldwide multimodal transportation network

    SciTech Connect

    Saeger, Kevin J; Cuellar, Leticia

    2010-01-01

    Nuclear weapons proliferation is an existing and growing worldwide problem. To help with devising strategies and supporting decisions to interdict the transport of nuclear material, we developed the Pathway Analysis, Threat Response and Interdiction Options Tool (PATRIOT) that provides an analytical approach for evaluating the probability that an adversary smuggling radioactive or special nuclear material will be detected during transit. We incorporate a global, multi-modal transportation network, explicit representation of designed and serendipitous detection opportunities, and multiple threat devices, material types, and shielding levels. This paper presents the general structure of PATRIOT, and focuses on the theoretical framework used to model the reliabilities of all network components that are used to predict the most likely pathways to the target.

  1. Modeling most likely pathways for smuggling radioactive and special nuclear materials on a worldwide multi-modal transportation network

    SciTech Connect

    Saeger, Kevin J; Cuellar, Leticia

    2010-10-28

    Nuclear weapons proliferation is an existing and growing worldwide problem. To help with devising strategies and supporting decisions to interdict the transport of nuclear material, we developed the Pathway Analysis, Threat Response and Interdiction Options Tool (PATRIOT) that provides an analytical approach for evaluating the probability that an adversary smuggling radioactive or special nuclear material will be detected during transit. We incorporate a global, multi-modal transportation network, explicit representation of designed and serendipitous detection opportunities, and multiple threat devices, material types, and shielding levels. This paper presents the general structure of PATRIOT, all focuses on the theoretical framework used to model the reliabilities of all network components that are used to predict the most likely pathways to the target.

  2. Locating Sensors for Detecting Source-to-Target Patterns of Special Nuclear Material Smuggling: A Spatial Information Theoretic Approach

    PubMed Central

    Przybyla, Jay; Taylor, Jeffrey; Zhou, Xuesong

    2010-01-01

    In this paper, a spatial information-theoretic model is proposed to locate sensors for detecting source-to-target patterns of special nuclear material (SNM) smuggling. In order to ship the nuclear materials from a source location with SNM production to a target city, the smugglers must employ global and domestic logistics systems. This paper focuses on locating a limited set of fixed and mobile radiation sensors in a transportation network, with the intent to maximize the expected information gain and minimize the estimation error for the subsequent nuclear material detection stage. A Kalman filtering-based framework is adapted to assist the decision-maker in quantifying the network-wide information gain and SNM flow estimation accuracy. PMID:22163641

  3. Efforts of Uzbekistan to prevent nuclear terrorism and smuggling of radioactive and nuclear materials.

    PubMed

    Petrenko, V D; Karimov, Yu N; Podkovirin, A I; Shipilov, N N; Yuldashev, B S; Fazylov, M I

    2005-01-01

    Uzbekistan is located on the cross-roads from the north--Russia, Western Europe--to the south--Afghanistan, Iran, Iraq and others. The appearance of terrorist organizations urged some Asian countries to make the nuclear weapons, the making the task of stopping the transportation of nuclear materials and technologies from the north (from countries possessing nuclear weapon) to the south (to countries desiring to have weapons and its components) a reality. To resolve this problem, on the main transportation routes, "Yantar" stationary radiation monitors of Russian production were installed, and development and production of monitors of our own make was started. This paper covers these works as well as those on preventing possible terrorist attacks on nuclear objects of Uzbekistan.

  4. Report of the Defense Science Board Task Force on Nuclear Deterrence Skills

    DTIC Science & Technology

    2008-09-01

    neutron, x- ray and gamma radiation; collateral damage and other fallout; as well as nuclear weapons or materials being smuggled out of legitimate...been allowed to wither technologically, as there have been no upgrades since initial production two decades ago. (The more recent nuclear-capable...allies in support of DOD and the services has withered away. Historically, weapon effects damage assessments of such attacks were conducted as part of

  5. Deterrence of Nuclear Terrorism via Post-Detonation Attribution: Is the United States on Target?

    DTIC Science & Technology

    2009-12-01

    once the material is in hand, and the likelihood that a “rogue” state might hand a nuclear weapon to a terrorist group, among others.24 Brian Jenkins ...Adelphi Papers 45, no. 378 (2005): 7. 24 Ibid., 8–10. 25 Brian Michael Jenkins , Will Terrorists Go Nuclear? (Amherst, NY: Prometheus Books, 2008...Richard G. Lugar, http://lugar.senate.gov/nunnlugar/. 125 Paul K. Davis and Brian M. Jenkins , Deterrence and Influence in Counterterrorism: A Component

  6. China’s Evolving Nuclear Deterrent: Major Drivers and Issues for the United States

    DTIC Science & Technology

    2017-01-01

    retaliatory capability, since HVGs would likely be better at penetrat- 54 “China’s Missile Interception Test Enhances Strategic Deterrence,” People’s...of this, Chinese strategists suggest the PLA will continue to pursue a portfolio of qualitative and quantitative enhancements to its nuclear...stability. The enhancement of Chinese nuclear capabilities, together with a shifting conventional balance, is likely to affect regional perceptions

  7. Perseverance of Power: The Relevancy of Nuclear Deterrence in the Future

    DTIC Science & Technology

    2013-06-01

    3 Patrick Morgan, "The Practice of Deterrence," in International Practices, ed. Emanuel Adler and Vincent Pouliot (Cambridge New York: Cambridge...Michael Dobbs, One Minute to Midnight : Kennedy, Khrushchev, and Castro on the Brink of Nuclear War, 1st ed. (New York: Alfred A. Knopf, 2008), 216...Monica, CA: RAND, 2012. Dobbs, Michael. One Minute to Midnight : Kennedy, Khrushchev, and Castro on the Brink of Nuclear War. 1st ed. New York: Alfred A

  8. Examination of the role of nuclear deterrence in the 21st century: a systems analysis approach

    SciTech Connect

    Martz, Joseph C; Stevens, Patrice A; Branstetter, Linda; Hoover, Edward; O' Brien, Kevin; Slavin, Adam; Caswell, David

    2010-01-01

    Until very recently, an evaluation of US policy regarding deterrence and the role of its nuclear weapons arsenal as a deterrent has been largely absent in the public debate. With President's Obama embrace of a goal of a future world without nuclear weapons, issues of nuclear policy and deterrence have just recently risen to the forefront of policy discussions. The traditional role of US nuclear weapons-to deter the use of nuclear weapons by other states-endures, but is no longer unique nor even predominant. In an increasingly multi-polar world, the US now faces growing risks of nuclear weapons proliferation; the spread of weapons of mass destruction generally to non-state, substate and transnational actors; cyber, space, economic, environmental and resource threats along with the application of numerous other forms of 'soft power' in ways that are inimical to national security and to global stability. What concept of deterrence should the US seek to maintain in the 21st Century? That question remains fluid and central to the current debate. Recently there has been a renewed focusing of attention on the role of US nuclear weapons and a national discussion about what the underlying policy should be. In this environment, both the United States and Russia have committed to drastic reductions in their nuclear arsenals, while still maintaining forces sufficient to ensure unacceptable consequence in response to acts of aggression. Further, the declared nuclear powers have maintained that a limited nuclear arsenal continues to provide insurance against uncertain developments in a changing world. In this environment of US and Russian stockpile reductions, all declared nuclear states have reiterated the central role which nuclear weapons continue to provide for their supreme national security interests. Given this new environment and the challenges of the next several decades, how might the United States structure its policy and forces with regard to nuclear weapons? Many

  9. CYBER DETERRENCE

    DTIC Science & Technology

    2016-02-11

    Achievement Medal, and various unit and service awards. iv Abstract This essay will present a current review of writings on the viability of Cyber...between cyber deterrence and nuclear deterrence writing , “The threat of assured mutual self-destruction of cyberspace assets and approaches that...weighty interests.”23 Press described the best way to make threats credible writing , “Wielding enough power to carry out the threats successfully at

  10. Nuclear deterrence and disarmament after the Cold War

    SciTech Connect

    Lehman, R.F. II

    1995-03-01

    During the Cold War, nuclear arms control measures were shaped significantly by nuclear doctrine. Consequently, the negotiation of arms control agreements often became a battleground for different nuclear strategies. The Cold War between the United States and the Soviet Union has been declared over. Today, both nuclear weapons policies and arms control objectives are again being reviewed. This document discusses points of this review.

  11. Boom or Bust: Britain’s Nuclear Deterrent Beyond 2025

    DTIC Science & Technology

    2012-04-26

    States nuclear arsenal dwarfs the UK’s inventory of 160 warheads. Also the U.S. operates multiple delivery systems vice the UK’s sole submarine launched...technician, Mordechail V anunu, disclosed the nature of his work at the Dimona nuclear plant in 1986 to the London Times Newspaper.22 During the...Syria. Today the Arab Spring nations do not have, or necessarily covet, nuclear weapons; however, with legitimate nuclear electric power plants within

  12. Preparing for the 2009 Nuclear Posture Review: Post-Cold War Nuclear Deterrence and the 2001 NPR Debate

    DTIC Science & Technology

    2008-12-01

    of relying upon the minimalist idea of maintaining strategic deterrence only to prevent nuclear attack.[87] Joseph Pilat agrees and tries to make...Record Straight,” The Washington Quarterly 28, no. 3 (Summer 2005): 136. 87. Payne (2005), Op. Cit., 140. 88. Pilat , Op. Cit., 43. 89. Payne (2005...152. 91. Payne (2005), Op. Cit., 142. 92. Ibid., 146. 93. Joseph F. Pilat , “The New Triad,” in Wirtz and Larson, eds., Nuclear Transformation

  13. The Future of US Nuclear Deterrence and the Impact of the Global Zero Movement

    DTIC Science & Technology

    2013-02-10

    www.northropgrumman.com/analysis-center/briefings/assets/triad-brief-to- afa -121009.pdf. 46. Cartwright et al., Global Zero U.S. Nuclear Policy Commission... AFA Air & Space Conference National Harbor, Maryland, 18 September 2012), 3, http://www.af.mil/shared/media/document/AFD-121002-064.pdf. 59...Century Deterrence.” AFA Air & Space Conference--National Harbor, Maryland, 18 September 2012. http://www.af.mil/shared/media/document/AFD-121002

  14. Cooperation Among Nations: Understanding the Counter Nuclear Smuggling Network In Europe

    DTIC Science & Technology

    2016-06-01

    per response , including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and...starts by examining prominent theories of international relations to understand cooperation within the network. Afterward, social network analysis (SNA...CBRN) facilities. 14. SUBJECT TERMS weapons of mass destruction, counterproliferation, nonproliferation, social network analysis, nuclear

  15. Deterrence versus Preemption: Assessing U.S. Nuclear Policy

    SciTech Connect

    Schwartz, Stephen

    2003-03-19

    Since coming into office in 2001, the Bush administration has enacted a series of controversial policies designed to create a more robust and more usable nuclear arsenal. From requiring new nuclear strike capabilities (including against non-nuclear countries), to threatening preemptive attacks, to investing billions of dollars in rebuilding the nuclear weapons production complex, the administration is systematically strengthening the role nuclear weapons play in defending the United States and its interests around the world. This presentation examines those policies and the thinking that underlies them. It questions the effectiveness of the administration's approach and explores some of the unintended consequences vis-a-vis U.S. policy toward North Korea, Iraq, Pakistan, and others. Finally, it takes a detailed look at current efforts to develop a new low-yield earth-penetrating nuclear weapon to destroy hardened underground facilities, assessing the feasibility of such a device and the potential effects of its use.

  16. Nuclear Deterrence in Cyber-ia: Challenges and Controversies

    DTIC Science & Technology

    2016-01-01

    formation or “cyber” warfare is here although it is not the driver of every conflict. It exists in the foreground of any attacks against the enemy’s brain...related settings for nuclear and cyber relationships. Third, it analyzes how the combination of nuclear and cyber attacks might at least hypothet- ically...enemy assets without the need for kinetic attack or of minimizing physical destruction.3 Nuclear weapons, though, are the very epitome of “mass

  17. Nuclear Deterrence: Strong Policy is Needed for Effective Defense

    DTIC Science & Technology

    2011-03-24

    hypersonic boost glide vehicles to penetrate ballistic missile defense systems (p. 10-12). Finally, Russian nuclear scientists have discussed their...weapons such as missiles with multiple independently retargeted reentry vehicles (MIRVs) and mobile ICBMs.96 The NPR does advocate this position,97...have backed up this doctrine by developing and deploying advanced new strategic delivery vehicles and nuclear weapons, affirmed by statements from

  18. Minimum Nuclear Deterrence Postures in South Asia: An Overview

    DTIC Science & Technology

    2001-10-01

    the context of the publication in India of the "NSAB Draft Report ... on Indian Nuclear Doctrine," is Agha Shahi, Zulfiqar Ali Khan and Abdul Sattar...Minister of Pakistan, and Air Marshall Zulfiqar Ali Khan formerly was Pakistan’s Air Force Commander in Chief. 50 President Pervez Musharraf’s Oct. 19...pp. 67-87. Shahi, Agha, Air Marshall (retd.) Zulfiqar Ali Khan and Abdul Sattar, "Securing Nuclear Peace," The News International, October 5, 1999

  19. Method of increasing the deterrent to proliferation of nuclear fuels

    SciTech Connect

    Rampolla, D.S.

    1982-08-17

    A process is claimed of recycling protactinium-231 to enhance the utilization of radioactively hot uranium-232 in nuclear fuel for the purpose of making both fresh and spent fuel more resistant to proliferation. The uranium-232 may be obtained by the irradiation of protactinium-231 which is normally found in the spent fuel rods of a thorium base nuclear reactor. The production of protactinium-231 and uranium-232 would be made possible by the use of the thorium uranium-233 fuel cycle in power reactors.

  20. Method of increasing the deterrent to proliferation of nuclear fuels

    DOEpatents

    Rampolla, Donald S.

    1982-01-01

    A process of recycling protactinium-231 to enhance the utilization of radioactively hot uranium-232 in nuclear fuel for the purpose of making both fresh and spent fuel more resistant to proliferation. The uranium-232 may be obtained by the irradiation of protactinium-231 which is normally found in the spent fuel rods of a thorium base nuclear reactor. The production of protactinium-231 and uranium-232 would be made possible by the use of the thorium uranium-233 fuel cycle in power reactors.

  1. U. S. /NATO sea-based non-strategic nuclear deterrence: Paradox or pitfall. Master's thesis

    SciTech Connect

    Stanton, L.S.

    1991-09-01

    The present study examines the evolution of nuclear strategy with particular emphasis on the capacity of U.S./NATO sea-based non-strategic nuclear forces. The current trend in NATO towards a certain denuclearization of the Central European states might well place an increased reliance on the sea-based theater nuclear weapons to counter Soviet theater nuclear forces in the Western Soviet Union. The present work analyzes the policy background of the NATO nuclear strategy from a European perspective in light of recent problems as a necessary precondition to an understanding of the more concrete issues of hardware. Although the U.S. Navy's nuclear-capable Tomahawk land attack cruise missile (TLAM/N) remains a potent and flexible nuclear strike asset, it is best suited for heavily defended high value fixed targets. Emphasis on offensive mobility in a future conflict will make carrier-based aircraft a more decisive platform from which to prosecute and destroy high value mobile targets. However, an analysis of the U.S. Navy's non-strategic nuclear forces reveals substantial deficiencies when compared with those of the Soviet Union. A declining U.S. Navy nuclear stockpile of air-deliverable strike weapons in combination with the lack of a long-range nuclear-capable stealth aircraft weakens the credibility of the aircraft carrier battle group as a nuclear deterrent force.

  2. DISARMAMENT AND DETERRENCE,

    DTIC Science & Technology

    POLITICAL SCIENCE, *DISARMAMENT, *DETERRENCE, COLD WAR, USSR, USSR, COMMUNISM, NUCLEAR WARFARE, FOREIGN POLICY, GOVERNMENT(FOREIGN), ECONOMICS, LIMITED WARFARE, ARMS CONTROL, WESTERN EUROPE, UNITED STATES.

  3. DTIC review. Volume 1, Number 1: Nuclear proliferation and deterrence in a changing political world

    SciTech Connect

    Cupp, C.M.; Lee, C.; Foster, H.; Greene, E.; Levine, P.

    1995-08-01

    This collection of selected documents from the Defense Technical Information Center (DTIC) addresses the formidable issue of protecting the United States and its people from potential nuclear destruction. With the dissolution of the former Soviet Union and, concomitantly, the end of the Cold War, new strategies for nonproliferation and deterrence must be devised and implemented. Potential threats from countries not previously seen as a danger, the escalation of regional conflicts and the proliferation of weapons of mass destruction are but a few of the considerations to be addressed. The authors of the following papers propose various plans and tactics to ensure United States national security and maintain world peace.

  4. Los Alamos National Laboratory Human and Intellectual Capital for Sustaining Nuclear Deterrence

    SciTech Connect

    McAlpine, Bradley

    2015-04-01

    This paper provides an overview of the current human and intellectual capital at Los Alamos National Laboratory, through specific research into the statistics and demographics as well as numerous personal interviews at all levels of personnel. Based on this information, a series of recommendations are provided to assist Los Alamos National Laboratory in ensuring the future of the human and intellectual capital for the nuclear deterrence mission. While the current human and intellectual capital is strong it stands on the precipice and action must be taken to ensure Los Alamos National Laboratory maintains leadership in developing and sustaining national nuclear capabilities. These recommendations may be applicable to other areas of the nuclear enterprise, including the Air Force, after further research and study.

  5. Democracy and deterrence

    SciTech Connect

    Bobbitt, P.

    1988-01-01

    This book offers a different characterization of nuclear deterrence. Those models of nuclear deterrence arose from the strategic possibilities presented by air power while this book rejects the thesis, implicit in both ideologies, that modern nuclear strategy must be a perpetuation of the strategic bombing program that dominated the Second World War. The description of nuclear strategy is connected to the familiar distinction between central and extended deterrence. It is notorious that the debate about nuclear strategy has become detached from the precise political objectives that various strategies are supposed to serve. Any real contribution to analysis must renew this connection and thereby expose the strategic commitments and assumptions made. The author describes nuclear strategy as driven by developments in vulnerability which led to crises in extended deterrence although the relationship of central deterrence remained stable.

  6. Network Science for Deterrence: Sheathing the Sword of the Terrorism/Nuclear Horseman

    NASA Astrophysics Data System (ADS)

    Carley, Kathleen

    2010-03-01

    After 9/11, network analysis became popular as a way to connect and disconnect the dots. It was heralded as the new science with intrinsic value for understanding and breaking up terrorist groups, insurgencies and hostile foreign governments. The limit of the initially forwarded approach was that it focused on only the social network -- who talked to whom. However ,the networks of war, terror or nuclear or cyber, are complex networks composed of people, organizations, resources, and capabilities connected in a geo-temporal web that constrains and enables activities that are ``hidden'' in the web of everyday life. Identifying these networks requires extraction and fusion of information from cyber-mediated realms resulting in a network map of the hostile groups and their relations to the populations in which they are embedded. These data are at best a sample, albeit a very large sample, replete with missing and incomplete data. Geo-temporal considerations in addition to information loss and error called into question the value of traditional network approaches. In this talk, a new approaches and associated technologies that integrate scientific advances in machine learning, network statistics, and the social and organizational science with traditional graph theoretic approaches to social networks are presented. Then, examples, of how these technologies can be used as part of a deterrence strategy are described. Examples related to terrorism and groups such as al-Qaida and Hamas, cyber and nuclear deterrence are described. By taking this meta-network approach, embracing the complexity and simultaneously examining not just one network, but the connections among networks, it is possible to identify emergent leaders, locate changes in activities, and forecast the potential impact of various interventions. Key challenges, such as data-streaming and deception, that need to be addressed scientifically are referenced.

  7. A U.S. Minimum Nuclear Deterrence Strategy: By Design or Default It’s about the Policy Options

    DTIC Science & Technology

    2012-06-01

    proposed source for spending relief has been further reductions to the U.S. nuclear weapons arsenal. While the arsenal is progressing in its drawdown...returning to the status quo).2 Figure 1: Relationship between Compellence, Deterrence, and Coercion Source : Author’s Original Work To understand... source documents, many in English, thus making for easier research and comparison. When conditions permitted, additional case study materials from

  8. The Credibility of America’s Extended Nuclear Deterrent: The Case of the Republic of Turkey

    DTIC Science & Technology

    2009-04-01

    nation-states in an open global economic system.”30 Other researchers found similar results. Researcher Vesna Danilovic used a similar mathematical...and Deterrence in the 21st Century.” 36 Notes 22 Vesna Danilovic, “The Sources of Threat Credibility in Extended Deterrence,” The Journal of...Brookings Institute Press, 2004. Cooley, Alexander, Base Politics. New York, NY: Cornell University Press, 2008. Danilovic, Vesna . “The Sources of

  9. An Analysis of the Morality of Intention in Nuclear Deterrence, with Special Reference to Final Retaliation

    DTIC Science & Technology

    1990-01-01

    effects is virtually the same, while the moral assessment of means differs greatly, although it is usually tied to the assessment of the goal, since...have the desired effect, implying that his belief may have no foundation in reality . But belie i.e, perception, is central to deterrence effectiveness...Perception constitutes reality in the relevant political arena. If both parties in a mutual deterrence situation befieve that forming the intention

  10. Rogue States and Deterrence Strategy

    DTIC Science & Technology

    2009-04-02

    would need to dealt with swiftly, harshly and stand as an example to any other state contemplating such activities.33 Deterrence Theory : United States...Response to Rogue State Proliferation There is a difference between nuclear deterrence theory and nuclear deterrence strategy. Patrick Morgan who serves...deter, while the theory concerns the underlying principles on which any strategy is to rest.”34 For the purposes of this paper, the 1994 Department of

  11. Morbidity rates on Vanguard Class submarines during nuclear deterrent patrol: a retrospective review over 13 years.

    PubMed

    O'Shea, M K; Scutt, M J

    2009-01-01

    The submarines responsible for the United Kingdom's nuclear deterrent have carried a junior doctor as their medical officer since the program's inception. The Vanguard Class of submarine carries approximately 150 men and deploys for about 3 months at a time. One of the central tenets of submarine operations is to remain undetected and as such the submarine will only surface in an emergency, which may include the evacuation of casualties. The prime reason for carriage of a medical officer is to mitigate against the need to evacuate personnel for medical reasons. We examined the medical section of the patrol reports submitted upon completion of each patrol over a 13 year period to determine both the rates of medical and dental attendance onboard and also the occurrence of potential medical threats to patrol integrity. The most common reasons for attendance were dermatological and musculoskeletal, consistent with previous studies of this population and working environment. There were few dental cases due to the high rates of dental fitness in the pre-sailing crews. Patrol threatening cases occurred at a rate of approximately 1 per 3 patrols, with acute appendicitis being the most common presentation. This progressed to evacuation at a rate of 1 per 15 patrols, with the successful onboard management in 79% of cases. The junior doctor onboard has limited monitoring equipment and formulary, no diagnostic equipment, basic surgical equipment and no opportunity to seek senior advice, and is therefore reliant on clinical judgement. Despite the limitations placed on the doctor on board these submarines they have proven to be effective in reducing the rate of medical evacuation.

  12. Deterrence Theory in the Contemporary Operating Environment

    DTIC Science & Technology

    2015-06-12

    Soviet Union. Because of the danger associated with nuclear warfare, the calculations for engaging in conventional warfare changed dramatically... extinction made deterrence incredibly important. Out of necessity, deterrence became a distinctive way of pursuing national interests, national security

  13. A Poor Man's Nuclear Deterrent: Assessing the Value of Radiological Weapons for State Actors

    NASA Astrophysics Data System (ADS)

    Donohue, Nathan

    The threat of weapons of mass destruction is an issue which remains at the forefront on national security. Nuclear, chemical, and biological weapons are all considered very dangerous by both state and non-state actors. Radiological weapons exist in that same category yet are not held in the same regard; the reason that is given is that these types of weapons are not the weapons of mass destruction that the other three are. Instead, radiological weapons are better considered weapons of mass disruption. Accordingly, in the academic and policy literature there has been very little perceived value associated with such weapons for use by state actors. However the historical focus on the military efficacy of radiological weapons has obscured the obvious truth that they may pose significant value for state actors. What this research shows is that the explosion of a radiological weapon could disrupt a target area in ways which could cripple the economy of an adversary state and promote widespread fear concerning exposure to radiation. Any such attack would not only necessitate large scale evacuation, but cleanup, decontamination, demolition, territory exclusion, and relocation. Moreover, the effects of such an attack would be unlikely to remain an isolated event as evacuated and displaced citizens spread across the nation carrying both fear and residual radiation. All of these factors would only be compounded by a state actor's ability to not only develop such weapons, but to manufacture them in such a composition that contemporary examples of such weapons grossly underestimate their impact. Accordingly, radiological weapons could hold great value for any state actor wishing to pursue their development and to threaten their use. Moreover, "while RDDs may not be well suited as "military weapons" in the classic sense, the use of RDDs could be powerfully coercive."1 In that sense, state actors could even acquire radiological weapons for their deterrent value. 1James L. Ford

  14. Intelligence briefing on smuggling of nuclear material and the role of international crime organizations, and on the proliferation of cruise and ballistic missiles. Hearing before the Committee on Armed Services, United States Senate, One Hundred Fourth Congress, First Session, January 31, 1995

    SciTech Connect

    1995-12-31

    The hearing addresses nuclear smuggling and the role of international crime organizations in the proliferation of cruise and ballistic missiles. The demise of the Soviet Union has weakened the control in Russia over nuclear materials. Statements of government officials are included along with documents submitted for the record.

  15. The DTIC Review. Volume 1, Number 1: Nuclear Proliferation and Deterrence in a Changing Political World

    DTIC Science & Technology

    1995-08-01

    warning. In intrastate situations, the deterrer’s task is more complex, not only because there may be many actors that require deterring, but also...situations may be more widespread than interstate conflict; and the United States may be self -deterred from committing ground forces to deter any but...force to the city of Kuwait sixty miles from the Iraq border in a few hours. Then Britain would have faced the far more difficult task of throwing the

  16. An Extended Deterrence Regime to Counter Iranian Nuclear Weapons: Issues and Options

    DTIC Science & Technology

    2009-09-01

    widespread violence would result, and any attempt to occupy Iran to impose regime change would be costly and perilous. At best, preventive war against...vulnerable to local Iranian aggression, bullying , and coercion. Depending on the deterrence strategy chosen, peacetime deployment of modest U.S. military...of instruments would need to include military power, diplomacy, economic tools, homeland security, information assets, cyber networks, security

  17. Nuclear Deterrence. Applications of Elementary Probability to International Relations. Modules and Monographs in Undergraduate Mathematics and Its Applications Project. UMAP Unit 327.

    ERIC Educational Resources Information Center

    Smith, Harvey A.

    This module is designed to apply mathematical models to nuclear deterrent problems, and to aid users in developing enlightened skepticism about the use of linear models in stability analyses and long-term predictions. An attempt is made at avoiding overwhelming complexities through concentration on land-based missile forces. It is noted that after…

  18. A theory of deterrence

    SciTech Connect

    Erickson, S.A. Jr.

    1991-03-20

    The purpose of this monograph is to start a theory of deterrence which has the capability of quantitatively answering the question of what is required to deter a nation or alliance from certain acts. Despite the existence of voluminous writing on deterrence, from the beginning of the nuclear age and even before, none of it attempts a theoretical discussion of how to calculate what it takes to deter a country from committing some acts which are objectionable to another country. Many theories of deterrence have already been created. They have exclusively been of two separate forms -- those of the social scientists, which deal with political questions, and how the concept of mass destruction psychological deters the initiation of war; and those of the mathematicians, who model the quantities of one country`s arsenal of strategic systems needed to destroy a certain portion of another country`s. Only the latter is quantitative, but they lack an essential element added to answer the question ``How much is enough?`` In order to use the techniques of operations research on the questions of what type and amount of weapons are adequate for deterrence, the definitions of quantities occurring in the calculations need to be made in quantifiable way. Numbers of weapons have been the only quantified parameter in previous deterrence calculations. Yet weapons alone do not deter. The threat of destruction and damage does. How is that threatenable damage to be measured, and as through defensive system construction, counterforce capability improvement, arms control, or other means, it becomes less when is the threshold for deterrence met and crossed? The calculation of this damage, and the implication of that damage to decision-makers capable of making a war initiation decision, is a complicated process, and it is what constitutes a theory of deterrence. 36 refs.

  19. Fuzzy Deterrence

    DTIC Science & Technology

    2010-05-01

    cognitive map. Three examples illustrate fuzzy cognitive maps‘ potential for understanding a non -state actor‘s decision-making calculus and...of the Cold War, the United States has wrestled with how rational deterrence applies to non -state actors in today’s complex security environment...Fuzzy logic’s themes of flexibility, adaptability, and ambiguity lay the foundation for applying fuzzy logic to non -state actor deterrence. Because

  20. Criminal Networks, Smuggling, and Weapons of Mass Destruction

    DTIC Science & Technology

    2010-03-01

    strategies. Analysis of actual cases is essential to understanding the threat. • Nuclear smuggling travels the same routes as drugs and other illicit...Guerra Pereferica y el Islam Revolucionario: Origenes., Reglas y Etica de la Guerra Asimetrica (Peripheral Warfare and Revolutionary Islam: Origins

  1. Combating Nuclear Smuggling: DHS Has Made Some Progress but Not Yet Completed a Strategic Plan for Its Global Nuclear Detection Efforts or Closed Identified Gaps

    DTIC Science & Technology

    2010-06-30

    polyvinyl toluene (PVT) portal monitors in many locations that the Customs and Border Protection (CBP), an agency within DHS, currently uses to screen...According to DHS officials, the department now scans nearly all containerized cargo entering the U.S. seaports for nuclear and radiologica materials...to protect critical port infrastructure from terrorism, particularly attacks using explosives and non-conventional threats that could cause major

  2. China’s Force Modernization and the Changing Concept of Nuclear Deterrence

    DTIC Science & Technology

    2010-04-21

    Taiwan and Japan . Potential contradictions emerge from these declared nuclear principles. First, all of China’s nuclear principles are highly...nuclear-armed medium range ballistic missiles against U.S. targets in non-nuClear states such as Japan . A 2006 Pentagon report indicates that China...military forces and installations. The targeting of U.S. forces in the region is problematic for the NSA concept: cities in Japan and Guam provide

  3. Miscalculated Ambiguity: The Effects of US Nuclear Declaratory Policy on Deterrence and Nonproliferation

    DTIC Science & Technology

    2010-06-01

    Proliferation of Nuclear Weapons, April 22, 1970." www.iaea.org/Publications/Documents/Infcircs/Others/ infcirc140.pdf (accessed February 18, 2011). 37 Carl ...Use. (Santa Monica, Calif.: RAND, 1995) 7. 5 Sagan , Scott. "The Case for No First Use." Survival 51, no. 3 (2009): 163-182. 6 The Stanley Foundation...America’s Nuclear Posture. (Cambridge, MA: Union of Concerned Scientists Global Security Program, 2010) 1. 60 Sagan , Scott. "The Case for No First

  4. U.S. Nuclear Deterrence Policy: Do We Have it Right?

    DTIC Science & Technology

    2008-03-28

    the NPR. Low yield and bunker buster nuclear weapons have been introduced in our strategy as a means to combat terrorism. There are also new...weapons target list. Low yield and bunker buster weapons that are proposed in our strategy meet that definition. Low yield weapons may be less...applies to nuclear bunker buster weapons; a weapon that explodes under the ground with a lower atomic yield. This concept has obvious merits, the

  5. EXTENDING THE UNITED STATES NUCLEAR DETERRENCE UMBRELLA TO THE MIDDLE EAST

    DTIC Science & Technology

    2016-05-01

    Furthermore, this paper dissects the cases where US assurance was deemed insufficient or incompatible, e.g., with France and New Zealand, respectively...Among NATO members, only the US, United Kingdom (UK), and France are nuclear- capable nations. The UK and France provide independent nuclear forces...occasionally given way to shifts in national policy, changes to the strategic landscape, or re- prioritized interests. France , New Zealand, and Iran

  6. Taking a Quantum Leap in Cyber Deterrence

    DTIC Science & Technology

    2010-02-17

    frame an adversary‘s rationale and decision calculus. 82 Understanding a group‘s rationale helps frame a strategy for deterrence. Emanuel Adler ...to leverage against America. 8586 Adler adds that when deterrence culture in this context is driven by religious and ethnic- nationalist beliefs...Path to the Quantum Computer. New York: Alfred A. Knopf, 2003. Kapur, S. Paul. "Deterring Nuclear Terrorists." In Complex Deterrence: Strategy in

  7. Dissuasion, Deterrence, and Prevention: The 2010 QDR (and the Forthcoming Nuclear Posture Review)

    DTIC Science & Technology

    2010-03-10

    National Strategic Studies of The National Defense University 10-11 March 2010 By MICHAEL O’HANLON Papers presented at...while retaining a caveat about possible future “ superbug ” pathogens that could require a nuclear counter Missile defenses would seek to create

  8. Increasing Uncertainty: The Dangers of Relying on Conventional Forces for Nuclear Deterrence

    DTIC Science & Technology

    2016-03-14

    Barack Obama In his now-famous Prague speech in 2009 shortly after taking office, President Obama laid out his vision for a world without nuclear...weapons.1 Although he had no timeline for reaching this goal, noting that it might not even occur in his lifetime, part of the pathway to that objective...defined and codified his vision for the security of the United States and its allies.2 Five years later, some of the implications of how this

  9. The Israeli Nuclear Alert of 1973: Deterrence and Signaling in Crisis

    DTIC Science & Technology

    2013-04-01

    limiting war, see Shlomo Aronson, Conflict and Bargaining in the Middle East (Baltimore: The Johns Hopkins University Press, 1978), 178-9; Shlomo Aronson...Ismail Fahmy, Negotiating for Peace in the Middle East (Baltimore: The Johns Hopkins University Press, 1983), 24-7. Indeed, Evron points out that...attaché. Yair Evron offered a similar report in Israel’s Nuclear Dilemma, 72. 50. See, for instance, Walter Boyne , The Two O’Clock War: The 1973 Yom

  10. Price sensitivity and smoking smuggled cigarettes.

    PubMed

    Lee, Jie-Min; Chen, Sheng-Hung; Chen, Hsin-Fan; Jeng, Huei-Yann Joann

    2009-01-01

    This study analysed the socio-economic factors that influence a smoker's decision to consume smuggled cigarettes when faced with the rising costs of legal cigarettes. We hope our findings will help public health authorities create policies that simultaneously discourage consumption of smuggled cigarettes and lower overall smoking levels. We conducted a national telephone survey from April to June 2004. We then applied Multiple Logistic Regression to the collected data to answer the following questions: do socio-economically disadvantaged smokers differ significantly in their characteristics? If so, which characteristics are most influential in the decision to purchase smuggled cigarettes? Smokers with a personal monthly income of less than New Taiwan dollar (NT$) 10,000 are 24% more likely to smoke smuggled cigarettes than are smokers who earn NT$10,000 or more. Smokers with the least amount of education are 21% more likely to smoke smuggled cigarettes than those with higher levels of education. Smokers with the most experience purchasing smuggled cigarettes are 31% more likely to do so than those with less experience. Finally, smokers who have a personal monthly income of less than NT$10,000 and the least amount of education are 54% more likely to smoke smuggled cigarettes than those with just one--or none--of these characteristics. Low-income, poorly-educated smokers are most likely to purchase smuggled cigarettes. To alter such behaviour, government must understand the motivations and opinions of this population and create marketing messages targeted specifically to their needs.

  11. 19 CFR 122.167 - Aviation smuggling.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Aviation smuggling. 122.167 Section 122.167 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Penalties § 122.167 Aviation smuggling. (a) Civil penalties. Any...

  12. 19 CFR 122.167 - Aviation smuggling.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Aviation smuggling. 122.167 Section 122.167 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Penalties § 122.167 Aviation smuggling. (a) Civil penalties. Any...

  13. 19 CFR 122.167 - Aviation smuggling.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Aviation smuggling. 122.167 Section 122.167 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Penalties § 122.167 Aviation smuggling. (a) Civil penalties. Any...

  14. 19 CFR 122.167 - Aviation smuggling.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Aviation smuggling. 122.167 Section 122.167 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Penalties § 122.167 Aviation smuggling. (a) Civil penalties. Any...

  15. 19 CFR 122.167 - Aviation smuggling.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Aviation smuggling. 122.167 Section 122.167 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Penalties § 122.167 Aviation smuggling. (a) Civil penalties. Any...

  16. Combating Nuclear Smuggling: Corruption, Maintenance, and Coordination Problems Challenge U.S. Efforts to Provide Radiation Detection Equipment to Other Countries

    DTIC Science & Technology

    2006-03-01

    Fund NNSA National Nuclear Security Administration RIID radioactive isotope identification device SLD-Core Second Line of Defense “Core” program WMD...these cases involved material that could be used to produce either a nuclear weapon or a device that uses conventional explosives with radioactive ...of their ability to shield or encapsulate illegally shipped materials within legal shipments of radioactive materials. Some of the reported cases

  17. Nuclear rights - nuclear wrongs

    SciTech Connect

    Paul, E.F.; Miller, F.D.; Paul, J.; Ahrens, J.

    1986-01-01

    This book contains 11 selections. The titles are: Three Ways to Kill Innocent Bystanders: Some Conundrums Concerning the Morality of War; The International Defense of Liberty; Two Concepts of Deterrence; Nuclear Deterrence and Arms Control; Ethical Issues for the 1980s; The Moral Status of Nuclear Deterrent Threats; Optimal Deterrence; Morality and Paradoxical Deterrence; Immoral Risks: A Deontological Critique of Nuclear Deterrence; No War Without Dictatorship, No Peace Without Democracy: Foreign Policy as Domestic Politics; Marxism-Leninism and its Strategic Implications for the United States; Tocqueveille War.

  18. Deterrence at the Operational Level of War

    DTIC Science & Technology

    2011-01-01

    by limited use of nuclear weapons. The Behavioral Model of Deterrence Will Predominate Cold War deterrence was built on the rational actor model...of the other, would be so risky that no one—regardless of cultural or behavioral attributes or institutional decision-making processes—would ever con...the Soviet Union developed mutual understanding of the limits of escalation and the “redlines” of crisis behavior and military action, though, as a

  19. Workshop Proceedings for USAF Institute for National Security Studies: Combatting Fissile Materials Smuggling Workshop #5, Held in Dublin, California, 3-4 February 1998.

    DTIC Science & Technology

    1999-02-01

    medical isotopes which, although extremely toxic , cannot be used to create a nuclear detonation in a bomb. 21 Combatting Fissile Materials Smuggling...other toxic substances into U.S. markets. Now, our programs to stop nuclear smuggling in the NIS are better conceived and more professionally managed...5 3-4 February 1998 - the commercial strategy and nuclear cooperation, - the brain drain, - the necessity to maintain the appearance of global

  20. Cyber: A Flexible Deterrent Option

    DTIC Science & Technology

    2013-02-14

    24 AF will be able to deliver cyber capabilities in support of the JFCs requirements to deter or counter the threat . To set the stage I will... threat of massive 3 retaliation by initiating a nuclear attack.”3 Younger’s assertion implies that deterrence is effective when dealing with...eminent threat from the Soviet Union entering the war. Yet Japan would counter with its own version—Japan was ready to consider a cease-fire to end the

  1. Application of Just War principles to nuclear war and deterrence in three contemporary theorists: Michael Walzer, Paul Ramsey, and William V. O'Brien

    SciTech Connect

    Sichol, M.W.

    1984-01-01

    The purpose of this study is to show that the Just War tradition remains applicable in the nuclear age; three contemporary just war theorists have been selected to show that this is the case: Michael Walzer, political theorist; Paul Ramsey, theologian, and William V. O'Brien, professor of international law. Each is also influenced by his Jewish, Protestant and Roman catholic tradition respectively. The focus is on the principles of proportionality and discrimination, showing how the three theorists define, validate, and apply these principles to the conduct of war as compared to the concepts of the classic Just War theorists and to those expressed in the 1983 US Catholic Bishops' Statement. This Statement reflects the influence of the three secular theorists and also of contemporary moral theory. Just War principles are applied to the uses of nuclear weapons in war-fighting and deterrence and to actual public policy. Just War principles provide policy makers with a moral basis to move beyond national egoism by directing them to be concerned about the needs of the person and about the interdependence among states principles whose validity has often been assumed but whose application has never been so necessary.

  2. Deterrents to Accountability.

    ERIC Educational Resources Information Center

    Hencley, Stephen P.

    This speech assesses potential deterrents to the implementation of accountability in education. The author divides these deterrents into (1) philosophical-ideological; humanist-behaviorist conflicts, individuality versus "techno-urban fascism," and accountability systems tied to the achievement of cognitive objectives at the lower end of Bloom's…

  3. Factors affecting Taiwanese smokers' identification of smuggled cigarettes.

    PubMed

    Hsieh, Chi-Jung; Cheng, Chun-Hao; Lee, Jie-Min

    2015-05-01

    To analyze whether the perception that smuggled cigarettes are a greater health risk than legal cigarettes affects Taiwanese smokers' intention to distinguish smuggled cigarettes from legal cigarettes. The study used the Recursive Bivariate Probit Model to analyze data from a survey conducted in 2013 of 450 smokers of smuggled cigarettes. The study found that when smokers believe they are more likely to get lung cancer from consuming smuggled cigarettes than they are from consuming legal cigarettes, the probability of the intention to identify smuggled cigarettes increased by 42.46%. The government should strengthen educational policies and programs that teach consumers about the health risks of smoking in general and the even greater health risks of smoking smuggled cigarettes in particular.

  4. Deterrence and Engagement: U.S. and North Korean Interactions over Nuclear Weapons since the End of the Cold War

    DTIC Science & Technology

    2008-12-01

    73 As Scott Sagan says: Strong states do what they can: they can pursue a form of internal balancing by adopting the costly, but self-reliant, policy...Renewed ed. Scott Sagan and Kenneth Waltz (New York: W.W. Norton & Company, 2003). 72 In 1956, the United States abandoned French interests because...China, Britain, France and the Enduring Legacy of the Nuclear Revolution (Stanford: Stanford University Press, 2000), ch. 2. 74 Scott Sagan , “Why Do

  5. Deterrence and the impact of strategic defense

    SciTech Connect

    Lunghofer, D.M.

    1992-06-01

    This paper examines the role of strategic defense in a deterrence strategy. Deterrence theory, strategic defense, the 1972 ABM Treaty, the national military strategy and Global Protection Against Limited Strikes are reviewed. It is asserted that the roles of nuclear forces and strategic defense are complimentary and stabilizing. The options to counter the threat of future proliferation of weapons of mass destruction and the threat of accidental or unauthorized launch of ballistic missiles are examined with the conclusion that a comprehensive defense is necessary.

  6. Human smuggling in Austria: a comparative analysis of data on smuggled migrants from former Yugoslavia and the Russian Federation.

    PubMed

    Peterka-Benton, Daniela

    2011-01-01

    This article provides a summary of the author’s research on human smuggling in Austria comparing migrants from Former Yugoslavia and the Russian Federation. The project’s primary intent was to collect more detailed information on migrants seeking asylum in Austria and their use of smuggling services to leave their home countries, including detailed information on demographics, force or threat of force by smugglers, routes and methods of transportation, costs of smuggling, payment methods, and deeper perceptual questions regarding the flight. Another central premise of the article discusses how current distinctions between human smuggling and human trafficking are arbitrary in many regards.

  7. Beyond Armageddon: Deterrence with less. Master's thesis

    SciTech Connect

    Kolbas, P.J.

    1991-06-01

    This thesis examines the implications for nuclear deterrence between the United States and the Soviet Union brought about by the dramatic changes in the strategic environment during the 1980s. Specifically, it examines the potential for a new criteria of deterrence at significantly lower levels of strategic weapons. The analysis indicates that a targeting strategy which emphasizes economic and industrial facilities will deter the Soviet Union. This targeting strategy allows for a reduction to 1500 strategic weapons while maintaining the robustness of nuclear deterrence between the United States and the Soviet Union. Using as its criteria arms race stability, breakout stability, crisis stability, verification, predictability, consequences of war, and the security of friends and allies, this thesis concludes that a force structure comprised of the Trident D-5 Submarine-launched ballistic missile and the B-2 bomber best ensures deterrence both against the Soviet Union and any other nuclear power regardless of changes in their political or ideological orientation. To provide maximum flexibility while negotiating the agreement and to hedge against a breakdown in U.S/Soviet relations prior to implementation, the thesis recommends a modernization program for U.S. strategic forces including funding for the restructured Strategic Defense Initiative which is now named Global Protection Against Limited Strikes.

  8. Fissile material smuggling: German politics, hype and reality

    SciTech Connect

    Mueller, H.

    1994-12-01

    The spy novel nightmare scenarios of nuclear smuggling have become reality, and much of the recent news has focused on Germany. But these events must be put in perspective, and a number of apparent {open_quotes}facts{close_quotes} must be examined more carefully. For example, while authorities in Germany have seized weapons-usable material in various incidents that have captured international attention, none of this material is from nuclear weapons or weapons production facilities. Moreover, despite the fact that the number of criminal cases has risen, the quantity of {open_quotes}loose{close_quotes} weapons-usable material is still not significant. Nor are there any indications so far that powerful criminal organizations or buyers from nuclear-ambitious {open_quotes}rogue{close_quotes} states are involved. Rather, the incidents so far involve individuals or small groups of criminals who found that their {open_quotes}buyers{close_quotes} were, more often than not, German security agents working {open_quotes}sting{close_quotes} operations to trap the smugglers and black marketeers or journalists working on a {open_quotes}big story.{close_quotes}

  9. Turning off the tap: the real solution to cigarette smuggling.

    PubMed

    Joossens, L; Raw, M

    2003-03-01

    The tobacco industry has argued that tobacco smuggling is caused by market forces, i.e., by the price differences between countries, which create an incentive to smuggle cigarettes from 'cheaper' to 'more expensive' countries, and so urged governments to solve the problem by reducing taxes to remove this differential, which will also, they say, restore revenue. Although such market forces have some effect, smuggling is in fact more prevalent in 'cheaper' countries, and reducing tax is not the solution. Where taxes have been reduced tobacco consumption has risen and revenue has fallen, with disastrous consequences for public health. The key to understanding cigarette smuggling is understanding the role of the tobacco industry. At the heart of cigarette smuggling is large scale fraud: container loads of cigarettes are exported, legally and duty unpaid, to countries where they have no market, and where they disappear into the contraband market. They are often smuggled back into the country of origin, where they are sold at a third to half price. It is therefore profitable because duty has been illegally evaded. The key to controlling cigarette smuggling is not lowering taxes, it is controlling the tobacco manufacturing industry and its exporting practices.

  10. Rationality, Culture and Deterrence

    DTIC Science & Technology

    2013-09-01

    Postgraduate School Center on Contemporary Conflict is the research wing of the Department of National Security Affairs ( NSA ) and specializes in the...and neuroscience . None of these approaches, either alone or in combination, offers a perfect framework for predicting the outcomes of deterrence...constructivism, approaches based on domestic and bureaucratic politics, and behavioral approaches drawn from findings in psychology and neuroscience

  11. The Archaeology of Smuggling and the Falmouth King's Pipe

    NASA Astrophysics Data System (ADS)

    Willis, Sam

    2009-06-01

    This article demonstrates the potential of an historical archaeology of smuggling and the value of an interdisciplinary approach to the study of smuggling and its prevention. By exploring the previously unstudied history of the King’s Pipe in Falmouth, a large chimney used for the destruction of tobacco, a rare survivor of many that once existed in England’s port cities, it demonstrates that archaeology could transform our understanding of smuggling and its prevention, and more broadly the history of crime and punishment in eighteenth century England.

  12. The behaviour of purchasing smuggled cigarettes in Taiwan

    PubMed Central

    Tsai, Y; Sung, H; Yang, C; Shih, S

    2003-01-01

    Objective: Since market liberalisation in 1987, the Taiwan Tobacco and Wine Monopoly Bureau (TTWMB) annual statistics indicate that both the demand for imported cigarettes as well as the number of seized smuggled packs have increased with an average revenue loss of NT$4942 million over the past 15 years. The NT$10 average increase in cigarette prices after Taiwan entered the World Trade Organization (WTO) and the implementation of the Tobacco and Alcohol Tax Law in 2002 are forcing policy makers to examine smuggling even more closely. This study evaluates factors that affect an individual smoker's decision to purchase smuggled cigarettes, particularly when faced with higher prices. Design: 437 male smokers of imported cigarettes were drawn from a national interview survey on cigarette consumption, which the Division of Health Policy Research at the National Health Research Institutes conducted during the year 2000. Multiple logistic regression models were used to analyse the behaviour of purchasing smuggled cigarettes with respect to demographic factors, economic factors, smoking behaviour, and other variables. Results: Cigarette price was the driving factor most closely linked to the purchase of smuggled cigarettes—a 1% increase in cigarette price raised the likelihood of purchasing smuggled cigarettes at least 2.60 times (95% confidence interval (CI) 1.08 to 6.26). Smokers who spent more than NT$1000/month on cigarettes were twice as likely to purchase smuggled cigarettes as those who spent less than NT$1000 (odds ratio (OR) 2.34, 95% CI 1.48 to 3.70). Betel nut chewers were more likely to purchase smuggled cigarettes (OR 1.80, 95% CI 1.09 to 2.90). Smokers who opposed cigarette taxation policy were 1.69 times more likely to buy smuggled cigarettes. Personal income was not significantly associated with smuggled cigarettes purchases. Conclusions: This study evaluates what causes smokers to purchase smuggled cigarettes. We have determined that cigarette price is

  13. From cigarette smuggling to illicit tobacco trade.

    PubMed

    Joossens, Luk; Raw, Martin

    2012-03-01

    Tax policy is considered the most effective strategy to reduce tobacco consumption and prevalence. Tax avoidance and tax evasion therefore undermine the effectiveness of tax policies and result in less revenue for governments, cheaper prices for smokers and increased tobacco use. Tobacco smuggling and illicit tobacco trade have probably always existed, since tobacco's introduction as a valuable product from the New World, but the nature of the trade has changed. This article clarifies definitions, reviews the key issues related to illicit trade, describes the different ways taxes are circumvented and looks at the size of the problem, its changing nature and its causes. The difficulties of data collection and research are discussed. Finally, we look at the policy options to combat illicit trade and the negotiations for a WHO Framework Convention on Tobacco Control (FCTC) protocol on illicit tobacco trade. Twenty years ago the main type of illicit trade was large-scale cigarette smuggling of well known cigarette brands. A change occurred as some major international tobacco companies in Europe and the Americas reviewed their export practices due to tax regulations, investigations and lawsuits by the authorities. Other types of illicit trade emerged such as illegal manufacturing, including counterfeiting and the emergence of new cigarette brands, produced in a rather open manner at well known locations, which are only or mainly intended for the illegal market of another country. The global scope and multifaceted nature of the illicit tobacco trade requires a coordinated international response, so a strong protocol to the FCTC is essential. The illicit tobacco trade is a global problem which needs a global solution.

  14. Tacit Knowledge Involvement in the Production of Nuclear Weapons: A Critical Component of a Credible US Nuclear Deterrent in the 21st Century

    DTIC Science & Technology

    2013-02-14

    form of the National Ignition Facility ( NIF ) at LLNL, the Dual-Axis Hydrodynamic Radiographic Test (DAHRT) Facility at LANL and the Z Machine at...not work, this knowledge adds little to sustaining capacity to design or build a nuclear weapon. Interestingly while the NIF and ASCI have...the novelty of the NIF wears off that the SSMP will not be stimulating. Further, it is hard to entice young scientists to remain at the laboratory

  15. Just war theory in the nuclear age

    SciTech Connect

    Jones, J.D.; Griesbach, M.F.

    1985-01-01

    This book presents papers on nuclear deterrence. Topics considered include the morality of war, the normative alternatives to war, national defense in the nuclear age, the environment of nuclear deterrence (empirical factors and moral judgments), morality and nuclear weaponry, the morality of nuclear deterrence and national defense in a changing strategic environment, alternatives to nuclear deterrence, and strengthening broadcasting capabilities into the USSR (e.g., Radio Liberty and Voice of America).

  16. Deterrence: potential for failure. Student report

    SciTech Connect

    Scott, R.E.

    1988-04-01

    Having been exposed to the threat of nuclear annihilation all their lives, many of the post-war generation have adopted fatalistic attitudes about survival in a nuclear war. The premise that the world stands defenseless against these ultimate weapons is often accepted at face value. This same generation is now beginning to take the reins of power and must face the nuclear dilemma head-on and answer the question, Can the strategy that has served the nation so well during this era of assured destruction continue to protect the nation's security interests in the foreseeable future. The problem with deterrence is it's all or nothing nature. Deterrence is designed only to maintain peace. Should the strategy fail, it offers no guidance for the prosecution of war. This paper attempts to highlight the fragility of deterrence by identifying certain real-world factors that could cause the strategy to crumble. Perhaps the one factor having the most potential to bring about such a failure is the never-ending advance of science and technology - the same technology that made a possible defense against such weapons. Strategists and leaders must recognize the danger of continuing to rely on a strategy that is by no means foolproof. New alternatives for credible strategies must be considered today if the USA is to insure its security in the future.

  17. The dynamics of deterrence

    PubMed Central

    Kleiman, Mark; Kilmer, Beau

    2009-01-01

    Because punishment is scarce, costly, and painful, optimal enforcement strategies will minimize the amount of actual punishment required to effectuate deterrence. If potential offenders are sufficiently deterrable, increasing the conditional probability of punishment (given violation) can reduce the amount of punishment actually inflicted, by “tipping” a situation from its high-violation equilibrium to its low-violation equilibrium. Compared to random or “equal opportunity” enforcement, dynamically concentrated sanctions can reduce the punishment level necessary to tip the system, especially if preceded by warnings. Game theory and some simple and robust Monte Carlo simulations demonstrate these results, which, in addition to their potential for reducing crime and incarceration, may have implications for both management and regulation. PMID:19706505

  18. Conventional Strategic Deterrence

    SciTech Connect

    Latter, A.L.; Martinelli, E.A.; Speed, R.D.

    1992-08-01

    The Bush Administration argues that the US, as the world's only remaining superpower, must be prepared to intervene militarily in regional conflicts. However, the traditional American way of fighting-relying on ground forces with heavy equipment, supported by naval and air forces--could prove too expensive, both monetarily and in terms of expected American casualties, to garner the support of the American public or Congress. This paper argues that the revolution in conventional weaponry demonstrated in the Persian Gulf War opens up the possibility of a new strategy--called Conventional Strategic Deterrence--that could reduce both financial costs and casualties (if it were necessary to implement the strategy) while still being a strong and credible deterrent to regional conflict.

  19. ''Whither Deterrence?'' A Brief Synopsis May, 2002

    SciTech Connect

    Poppe, C; Vergino, E; Barker, R; Brown, P; Gilmartin, T J; Nach, M; Sloss, L

    2002-05-29

    To most audiences, deterrence has been interconnected with nuclear weapons whose purpose had been to deter a Soviet attack. But, the Soviet Union has been gone for almost a decade. President George W. Bush has stated that Russia is not an enemy of the US and the numbers of nuclear weapons can be dramatically reduced. It is important to note that deterrence has always transcended nuclear weapons. The US' first line of deterrence has been its formidable conventional warfare capability, designed to prevent conflict and win wars if necessary. The role of nuclear weapons has been to deter the,use of nuclear weapons and other weapons of mass destruction against U.S. interests during the conduct of conventional warfare and to ensure our ability to inflict massive destruction on any who would use nuclear weapons, or other weapons of mass destruction, against us. With regard to the Soviet Union, the threat of the use of nuclear weapons was a critical component of our deterrent to prevent massive Soviet conventional attack against our allies in Europe. However, the events of September 11, 2001 make clear that we have not convinced all who seek to harm us that we will be able to respond in a manner to make them wish they had not even tried. The September 11 attacks, as well as other past conflicts, do not mean that deterrence has failed-it remains effective against the threats for which it was designed. We have known there are other threats for which we did not have a credible deterrent. The challenge is to sustain deterrence against the classic threats as they evolve in technical sophistication while remaining alert to the need to evaluate continuously our ability to deter previously unforeseen challenges. How then should we be looking at deterrence as we consider fifteen or so years in the future, say to about 2015? What will be the role of nuclear weapons and other instruments of mass destruction in the future? What should the US be doing to prepare for the future? In this

  20. Alcohol Consumption and Harm among Adolescents in Sweden: Is Smuggled Alcohol More Harmful?

    ERIC Educational Resources Information Center

    Svensson, Johan

    2012-01-01

    As a consequence of Sweden joining the European Union, privately imported alcohol is increasingly sold within illegal contexts (i.e., smuggled alcohol). One implication of the smuggled alcohol is that alcohol becomes more available to underage drinkers. In the Swedish debate, smuggled alcohol has been formulated as a youth problem. The aim of this…

  1. Alcohol Consumption and Harm among Adolescents in Sweden: Is Smuggled Alcohol More Harmful?

    ERIC Educational Resources Information Center

    Svensson, Johan

    2012-01-01

    As a consequence of Sweden joining the European Union, privately imported alcohol is increasingly sold within illegal contexts (i.e., smuggled alcohol). One implication of the smuggled alcohol is that alcohol becomes more available to underage drinkers. In the Swedish debate, smuggled alcohol has been formulated as a youth problem. The aim of this…

  2. The deterrent forces of the Commonwealth of Independent States

    SciTech Connect

    Kortunov, S.

    1992-12-31

    The rapid changes that are occurring in Europe and in the world at large create qualitatively new military and political realities and will force nuclear powers to make major adjustments in their foreign policy and military-technological thinking. The new situation will certainly lead to changes in both the nuclear doctrines of those countries and their approaches to nuclear forces - both strategic and tactical - as will be needed to ensure national security. This applies fully to the Commonwealth of Independent States (the former USSR), whose nuclear doctrine, like that of the North Atlantic Treaty Organization (NATO), is now being overhauled. It is well known that the former Soviet Union in its public declarations, including those made at the highest political level, has been strongly critical of the doctrine of deterrence. An unbiased historical analysis of the postwar period also demonstrates that military competition between the Soviet Union and the United States in the nuclear field followed the action-reaction logic, the constraining factors being primarily financial and technological rather than moral. Parity was initially interpreted as numerical equality in strategic nuclear arms and later as rough equality in operational nuclear capabilities. Another confirmation that the Soviet Union had based its policy precisely on the doctrine of deterrence is the Antiballistic Missile (ABM) Treaty, which limits the antiballistic missile systems of the two sides to purely symbolic numbers of ABMs and effectively exposes the former Soviet Union and the United States to a retaliatory strike. Nuclear deterrence is a modus vivendi of the world we live in, and it will stay that way until nations devise a fundamentally new system of maintaining international security. The problem is that the nuclear powers have more than enough nuclear weapons to make deterrence work effectively.

  3. Using detection and deterrence to reduce insider risk

    SciTech Connect

    Eggers, R F; Carlson, R L; Udell, C J

    1988-06-01

    This paper addresses a new concept of interaction between adversary detection and deterrence. It provides an initial evaluation of the effects of these variables on the risk of theft of special nuclear material by an insider adversary and can be extended to the sabotage threat. A steady-state risk equation is used. Exercises with this equation show that deterrence, resulting from the prospect of detection, has a greater ability to reduce the risk than the detection exercise itself. This is true for all cases except those in which the probability of detection is 1. Cases were developed for three different types of adversaries that can be distinguished from one another by the level of detection they are willing to tolerate before they are deterred from attempting a theft. By considering the effects of detection, deterrence, and adversary type, the ground work is laid for designing cost-effective insider threat-protection systems. 2 refs., 6 figs.

  4. Thinking Globally about U.S. Extended Deterrence

    SciTech Connect

    Roberts, Brad; Santoro, David; Volpe, Tristan; Warden, John

    2016-01-20

    In contrast to the Cold War bilateral global competition between the United States and the Soviet Union, the modern nuclear age features a more complex, multiplayer arena on the regional scale. With the exception of the U.S. and Russia, most major powers retain relatively small nuclear arsenals or technical hedge capabilities. The U.S., with strong interests and security partnerships in Europe, Northeast Asia, and the Middle East, must navigate through long-standing rivalries and active conflicts while attempting to divine the intentions of less experienced nuclear decision makers in charge of weak domestic institutions. As a result, analysts and policymakers must think globally about U.S. extended deterrence. How have the requirements of extended deterrence and assurance changed? Are there important threads that connect each region? What should the U.S. do differently? To explore these questions, Lawrence Livermore National Laboratory’s Center for Global Security Research, in partnership with the Carnegie Endowment for International Peace and the Pacific Forum CSIS, held a workshop on “Thinking Globally about U.S. Extended Deterrence” in Washington, DC on November 2, 2015. The workshop brought together approximately 40 U.S. and foreign deterrence specialists and government officials, all attending in their private capacities. The participants joined a day of not-for-attribution discussions on the changing deterrence and assurance requirements, the threads that connect the regions, and U.S. strategy to deal with emerging challenges. The following is a summary of key takeaways.

  5. Conflict with China: Prospects, Consequences, and Strategies for Deterrence

    DTIC Science & Technology

    2011-01-01

    Burma / Myanmar . Above and beyond the dangers posed by a clash between the world’s two most populous countries, the presence of nuclear weapons on...Reconnaissance CBRNE Chemical, Biological, Radiological, Nuclear , High-Yield Explosives DMZ Demilitarized Zone DPRK Democratic People’s Republic of Korea EEZ...most concern to the United States. 2 Conflict with China: Prospects, Consequences, and Strategies for Deterrence Occasions for Conflict North Korea

  6. Prioritizing like nuclear smugglers

    SciTech Connect

    Erickson, S A

    1999-07-01

    An individual or group attempting to smuggle nuclear material out of a country has a choice of what border crossing to use and how to do it. If it is possible to think like a smuggler and determine what preferences one would have, then we could protect those smuggler-preferred border crossings first. Thinking like a smuggler requires that one understand a host of things: who is likely to smuggle and what might they have obtained, where they might have gotten it, and where they would like to deliver or sell it, how they will attempt to pass customs, how they might travel on both sides of the border, and what influences they might have on customs officials. After collecting data on criminology, geography, and much else, it is necessary to paste the data together into scenarios to ensure that self-consistent smuggling plans are created. These lead to counter-smuggling opportunities. Smuggling by amateurs turns out to be of a different class than professional smuggling, and needs to be countered differently. This work also assists in formulating key policy questions useful to guide counter-smuggling efforts. This methodology was developed for DOE/NN-43 for assistance with prioritization within the Second Line of Defense program.

  7. Progress in combating cigarette smuggling: controlling the supply chain

    PubMed Central

    Joossens, L; Raw, M

    2008-01-01

    Background: The illicit tobacco trade results in huge losses of revenue to governments, estimated at $US40–50 billion in 2006, and in increased consumption and thus health problems because it makes tobacco available more cheaply. On 20 October 2008 the second meeting of the International Negotiating Body (INB2) on the illicit trade protocol of WHO’s Framework Convention on Tobacco Control (FCTC) will discuss measures to tackle the illicit trade in tobacco products. Methods: This paper presents the experience over the last decade of three countries, Italy, Spain and the United Kingdom, which shows that tobacco smuggling can be successfully tackled. Conclusion: The evidence strongly suggests that the key to controlling smuggling is controlling the supply chain, and that the supply chain is controlled to a great extent by the tobacco industry. PMID:18784154

  8. Strategic Deterrence in Cyberspace: Practical Application

    DTIC Science & Technology

    2009-06-01

    Triad as models for organizing deterrence operations. The DO JOC focuses on tailoring deterrence operations based on the actor; but deterrence...5  Thesis Organization ...What is the future of United States cyberspace efforts? How will the government be organized to manage the risks and vulnerabilities created by

  9. Nuclear Forensics: Report of the AAAS/APS Working Group

    NASA Astrophysics Data System (ADS)

    Tannenbaum, Benn

    2008-04-01

    This report was produced by a Working Group of the American Physical Society's Program on Public Affairs in conjunction with the American Association for the Advancement of Science Center for Science, Technology and Security Policy. The primary purpose of this report is to provide the Congress, U.S. government agencies and other institutions involved in nuclear forensics with a clear unclassified statement of the state of the art of nuclear forensics; an assessment of its potential for preventing and identifying unattributed nuclear attacks; and identification of the policies, resources and human talent to fulfill that potential. In the course of its work, the Working Group observed that nuclear forensics was an essential part of the overall nuclear attribution process, which aims at identifying the origin of unidentified nuclear weapon material and, in the event, an unidentified nuclear explosion. A credible nuclear attribution capability and in particular nuclear forensics capability could deter essential participants in the chain of actors needed to smuggle nuclear weapon material or carry out a nuclear terrorist act and could also encourage states to better secure such materials and weapons. The Working Group also noted that nuclear forensics result would take some time to obtain and that neither internal coordination, nor international arrangements, nor the state of qualified personnel and needed equipment were currently enough to minimize the time needed to reach reliable results in an emergency such as would be caused by a nuclear detonation or the intercept of a weapon-size quantity of material. The Working Group assesses international cooperation to be crucial for forensics to work, since the material would likely come from inadequately documented foreign sources. In addition, international participation, if properly managed, could enhance the credibility of the deterrent effect of attribution. Finally the Working Group notes that the U.S. forensics

  10. Analysis of Deterrence (Briefing charts)

    DTIC Science & Technology

    2011-01-01

    Analysis of Deterrence    CDR ( s ) Harrison Schramm Naval Postgraduate School    Report Documentation Page Form ApprovedOMB No. 0704-0188 Public...4. TITLE AND SUBTITLE Analysis of Deterrence 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR( S ) 5d. PROJECT NUMBER 5e...TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) Naval Postgraduate School,Monterey,CA,93943 8. PERFORMING

  11. An Analysis of Mathematical Models to Improve Counter-Drug Smuggling Operations

    DTIC Science & Technology

    2014-09-01

    drugs smuggled directly into the United States (National Drug Intelligence Center, 2011). They typically smuggle cocaine, heroin , and marijuana into...and heroin to Mexican and Caribbean traffickers for distribution in the United States. Dominican TCOs in the United States have long-standing...National Drug Intelligence Center, 2011). The Dominican TCOs obtain cocaine and heroin from TCOs in Colombia and smuggle the drugs into the United

  12. Paradoxical increase in cigarette smuggling after the market opening in Taiwan

    PubMed Central

    Wen, C P; Peterson, R A; Cheng, T Y D; Tsai, S P; Eriksen, M P; Chen, T

    2006-01-01

    Objectives To assess the magnitude of cigarette smuggling after the market opened in Taiwan. Methods Review of tobacco industry documents for references to smuggling activities related to Taiwan and government statistics on seizure of smuggled cigarettes. Results The market opening in 1987 led to an increase in smuggling. Contraband cigarettes became as available as legal ones, with only a small fraction (8%) being seized. Being specifically excluded from the market‐opening, Japan entered the Taiwan market by setting up a Swiss plant as a legal cover for smuggling 10–20 times its legal quota of exports to Taiwan. Smuggling in Taiwan contributed to increased consumption of foreign brands, particularly by the young. Taiwan, not a member of the World Health Organization, was excluded from the East Asian 16‐member “Project Crocodile”, a regional anti‐smuggling collaborative effort to implement the Framework Convention on Tobacco Control. Conclusions Taiwan showed a sharp increase in smuggling after market liberalisation. Being excluded from the international community, Taiwan faces an uphill battle to fight smuggling alone. If Taiwan remained as its weakest link, global efforts to reduce tobacco use will be undermined, particularly for countries in the East Asian region. PMID:16728745

  13. Endogenous and costly institutional deterrence

    Treesearch

    David C. Kingsley; Thomas C. Brown

    2014-01-01

    Modern economies rely on central-authority institutions to regulate individual behaviour. Despite the importance of such institutions little is known about their formation within groups. In a public good experiment, groups selected the level of deterrence implemented by the institution, knowing that the administrative costs of the institution rose with the level of...

  14. The nuclear freeze controversy

    SciTech Connect

    Payne, K.B.; Gray, C.S.

    1984-01-01

    This book presents papers on nuclear arms control. Topics considered include the background and rationale behind the nuclear freeze proposal, nuclear deterrence, national defense, arms races, arms buildup, warfare, the moral aspects of nuclear deterrence, treaty verification, the federal budget, the economy, a historical perspective on Soviet policy toward the freeze, the other side of the Soviet peace offensive, and making sense of the nuclear freeze debate.

  15. Deterrence Adrift Mapping Conflict and Escalation in South Asia

    DTIC Science & Technology

    2016-06-21

    armed neighbors. A common assump- tion in academic and policy circles is that any modern-day Indo– Pakistani conflict would remain limited and localized...as nuclear deterrence would dissuade either side from seeking a Carthagin- ian peace. Accordingly, India’s limited war doctrine, Cold Start, has...attracted a great deal of interest and scrutiny among South Asia analysts. Cold Start envisions a shallow but high-intensity ground offensive into

  16. Conventional Military Deterrence - Its Rise to Dominance and Its Future

    DTIC Science & Technology

    2007-11-02

    149; Timothy Garden, Can Deterrence Last: Peace Through a Nuclear Strategy (London: Buchan & Enright, 1984), Chapter One, pg. 1; and Gerald Steinberg...Strategy," U.S. Army War College Guide to Strategy, eds. Joseph R. Cerami and James F. Holcomb, Jr. (Carlisle Barracks, PA.: Strategic Studies...a New Direction, (Kentucky: The University of Kentucky Press, 2001), 17-18. 16 Jentleson, 246. 17 James Robinson, "Technology, Change and the

  17. [Expansion of the tobacco industry and smuggling: challenges for public health in developing countries].

    PubMed

    Enrique Armendares, Pedro; Reynales Shigematsu, Luz Myriam

    2006-01-01

    The international tobacco industry, in its constant quest for new markets, has expanded aggressively to middle- and low-income nations. At the same time there has been a marked increase in tobacco smuggling, especially of cigarettes. Smuggling produces serious fiscal losses to governments the world over, erodes tobacco control policies and is an incentive to international organized crime. In addition, smuggling results in increased demand for and consumption of tobacco, which in turn benefits the tobacco companies. Moreover, there is evidence indicating that the international tobacco industry has instigated cigarette smuggling and has participated directly in these activities, while at the same time carrying out costly lobbying campaigns to pressure governments against tax increases and to promote their own interests. Academic studies and empirical evidence show that tobacco control can be promoted through high tax rates without causing significant increases in smuggling. To achieve this tobacco smuggling must be attacked through the use of strategies including multilateral controls and actions such as those included in the Framework Convention on Tobacco Control, which establishes the basis for combating smuggling through an international, global approach. It is also necessary to increase the penalties for smuggling and to make the tobacco industry, including producers and distributors, responsible for the final destination of their exports.

  18. Binary thinking in a complex world: the failure of NATO deterrence since 1994 and implications for the NATO readiness action plan.

    DTIC Science & Technology

    2017-05-25

    relied on its nuclear-armed members to provide its nuclear deterrent, and its expansionist Partnership for Peace program to enhance its conventional...1991, NATO relied on its nuclear-armed members to provide its nuclear deterrent, and its expansionist Partnership for Peace program to enhance its...official_texts_25468.htm. 43 NATO, NATO-Russia Relations: A New Quality - Declaration by Heads of State and Government of NATO Member States and the Russian

  19. The Limits of Cyberspace Deterrence

    DTIC Science & Technology

    2014-01-01

    and economic —across all phases of military operations.4 However, most of the thought and analysis in deterrence has revolved around the use of...number of transistors on a microprocessor has increased from 2,300 to over 2.5 billion. Storage devices are 200,000 times the size of the first...had identified the importance of and vulner- ability present in American systems when he issued an executive order in 1996 on critical infrastructure

  20. Deterrence in Professional Military Education

    DTIC Science & Technology

    2015-08-01

    guide operational planning; moreover, complex escalation scenarios in- creasingly are the focus of tabletops and war games in the strategic forces...that can deliver advantages not only in power pro - jection but in all aspects of strategic warfare. Professional military education (PME), however...but it is not clear how well such disparate activities address deterrence. A good model for working-level pro - fessionals is the Strategic Policy

  1. The International Politics of Peace Education: The Conflict between Deterrence and Disarmament.

    ERIC Educational Resources Information Center

    Willers, Jack Conrad

    The main impetus for peace education is the arms race, which places peace education in the conflict between conservatives advocating increased nuclear deterrence and liberals supporting nuclear disarmament. In the United States, education for peace is still in its infancy. Other developed nations, such as the Scandinavian countries and to a lesser…

  2. Add Deterrence to the Strategy Against ISIS

    DTIC Science & Technology

    2017-03-31

    Strategy , (Carlisle, PA: Strategic Studies Institute, 2006), 5. 16 Three Deterrence Approaches The three approaches to deterrence further...desired ends. 19 CHAPTER 4: ISRAEL’S DETERRENCE STRATEGY Historically, Israel offers perhaps the only case study where different approaches...Khalidi, “Special Document File: Original English Translation of the 2015 Gadi Eisenkot IDF Strategy ,” Journal of Palestine Studies Vol. 45 No. 2

  3. Case studies in international tobacco surveillance: cigarette smuggling in Brazil

    PubMed Central

    Shafey, O; Cokkinides, V; Cavalcante, T; Teixeira, M; Vianna, C; Thun, M

    2002-01-01

    Objective: This article is the first in a series of international case studies developed by the American Cancer Society to illustrate use of publicly available surveillance data for regional tobacco control. Design: A descriptive analysis of Brazil and Paraguay cigarette production and trade data from official sources. Methods: Per capita cigarette consumption for Brazil and its neighbour was calculated from 1970 to 1998 using data on production, imports, and exports from NATIONS, the National Tobacco Information Online System. Results: A 63% decrease was observed in the estimate of per capita consumption of cigarettes in Brazil between 1986 and 1998 (from 1913 cigarettes per person in 1986 to 714 cigarettes per person in 1998) and a 16-fold increase in Paraguay was observed during the same period (from 678 cigarettes per person in 1986 to 10 929 cigarettes per person in 1998). Following Brazil's 1999 passage of a 150% cigarette export tax, cigarette exports fell 89% and Brazil's estimated per capita consumption rose to 1990 levels (based on preliminary data). Per capita consumption in Paraguay also fell to 1990 levels. Conclusions: These trends coincide with local evidence that large volumes of cigarettes manufactured in Brazil for export to Paraguay are smuggled back and consumed as tax-free contraband in Brazil. It is hoped that this case study will draw wider public attention to the problems that smuggling presents for tobacco control, help identify other countries confronting similar issues, and stimulate effective interventions. PMID:12198271

  4. Trafficking of nuclear materials from the former Soviet Union news abstracts

    SciTech Connect

    Erickson, S A; Lawson, T M

    1999-08-31

    This report was generated to provide a background for understanding the type and variety of smuggling incidents that have been reported. As discussed in the Site Prioritization report, smuggling cases provide insight into the activities of what has been called ''amateur smuggling'', that is, smugglers who do not belong to a professional smuggling gang. In many instances, the law enforcement officials giving the press release are not familiar with nuclear materials, and give incorrect identification. The other portions of the information, such as number of individuals involved, places, and modes of operation are likely to be more correct.

  5. Establishing "abuse-deterrence equivalence" for generic abuse-deterrent opioid formulations: A proposed development framework.

    PubMed

    Setnik, Beatrice; Cone, Edward J

    2016-01-01

    Abuse-deterrent formulations are one strategy for mitigating the epidemic of prescription opioid abuse. Regulatory guidance documents describe the requirements for developing abuse-deterrent formulations of novel drugs and formulations; however, they do not address "abuse-deterrence equivalence" for generic formulations. As generics may be produced with different excipients and formulations compared to reference drugs, differences in their properties may impact their abuse-deterrent features. Currently, it is unclear what specific studies are needed to support generic abuse-deterrence claims. This commentary outlines several recommendations on the in vitro and in vivo testing required, including the conditions for conducting a human abuse potential study.

  6. Deterrence with China: Avoiding Nuclear Miscalculation

    DTIC Science & Technology

    2014-01-01

    Center, April 2013). 56 Joe Biden, “Remarks to the Press by Vice President Joe Biden and Prime Minister Shinzo Abe of Japan,” December 2, 2013...available at <www.whitehouse.gov/the-press- office/2013/12/03/remarks-press-vice- president-joe-biden-and-prime-minister- shinzo - abe -jap>. ...Politics and Strategy 54, no. 5 (Octo- ber–November 2012), 149–182, available at <www.tandfonline.com/doi/ abs /10.1080/00 396338.2012.728351#preview

  7. Conventional Deterrence in the Second Nuclear Age

    DTIC Science & Technology

    2009-10-01

    suggesting the terminology of opportunity versus necessity. 41. Daniel Kahneman and Amos Tversky , “Prospect Theory: An Analysis of Decision under Risk...Econo- metrica, 47 (March 1979), 263-91. Kahneman alone was the recipient of the Nobel Prize because Tversky died in 1996, and the Nobel Institute

  8. Civil Defense: A Deterrent to Nuclear War.

    DTIC Science & Technology

    1982-04-19

    revere., eide It necessary and Idntif by block number) A Survey of Historical Efforts in Support of Civil Difense in U.S. A Look at USSR Efforts to...9 During the next few years government appropriation levels actually decreased to the lowest level since 1960.10 Lack of support for civil defense...first-strike capability. There is no question about it." 1 3 Even with good support for civil defense from the top-of-the- administration, appropriation

  9. Affect intensity and processing fluency of deterrents.

    PubMed

    Holman, Andrei

    2013-01-01

    The theory of emotional intensity (Brehm, 1999) suggests that the intensity of affective states depends on the magnitude of their current deterrents. Our study investigated the role that fluency--the subjective experience of ease of information processing--plays in the emotional intensity modulations as reactions to deterrents. Following an induction phase of good mood, we manipulated both the magnitude of deterrents (using sets of photographs with pre-tested potential to instigate an emotion incompatible with the pre-existent affective state--pity) and their processing fluency (normal vs. enhanced through subliminal priming). Current affective state and perception of deterrents were then measured. In the normal processing conditions, the results revealed the cubic effect predicted by the emotional intensity theory, with the initial affective state being replaced by the one appropriate to the deterrent only in participants exposed to the high magnitude deterrence. In the enhanced fluency conditions the emotional intensity pattern was drastically altered; also, the replacement of the initial affective state occurred at a lower level of deterrence magnitude (moderate instead of high), suggesting the strengthening of deterrence emotional impact by enhanced fluency.

  10. New British deterrent: strategic planning and domestic political implications. Master's thesis

    SciTech Connect

    Cummings, K.P.

    1982-10-01

    The British Government announced its intention in July 1980 to modernize its strategic nuclear deterrent with the deployment of the Trident I (C4) submarine-launched ballistic missile. The MIRVed Trident missile will have significantly increased capabilities of range, payload and target numbers. It also represents an enormous expense for the British to bear and high political and military opportunity-costs for capabilities which may not be vital to an effective and credible national strategic deterrent. The political difficulties likely to be encountered in bringing the Trident program to fruition may portend the loss of all British strategic capability, while resulting conventional weapons reductions may even contribute to lowering the threshold of agression in Western Europe and increasing the liklihood of the threatening circumstances a nuclear deterrent is designed to avoid. Alternative strategic options, such as Polaris or Poseidon SLMBs or cruise missiles, should be explored to achieve the strategic stability and guarantee which the British seek.

  11. Deterrence in the 1980s. Crisis and dilemma

    SciTech Connect

    Byers, R.B.

    1985-01-01

    This book considers the deterrence debate of the western world's defense policy and examines the effectiveness of deterrence as a strategy, both at present and in the future. It discusses the concept of deterrence and explores the ways in which the doctrine is converted into strategies by the superpowers. The book also addresses advances in technologies, the effects of these on deterrence, and the role of the superpowers' allies in the deterrence debate.

  12. Policy and Purpose: The Economy of Deterrence

    DTIC Science & Technology

    2009-01-01

    Schwartz.indd 11 2/2/09 2:29:38 PM Policy and Purpose The Economy of Deterrence Norton A. Schwartz, General, USAF Timothy R. Kirk, Lieutenant...00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Policy and Purpose. The Economy of Deterrence 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM...article concludes with an assessment of the economy of deterrence policy within the theory framework as we examine the implications for US Air

  13. Conventional Deterrence and the Falkland Islands Conflict

    DTIC Science & Technology

    2010-03-01

    same task, just by a different means. Lawrence Freedman described deterrence as being “concerned with deliberate attempts to manipulate the behavior of...seriously if it does.”11 One of the most commonly accepted methods for manipulating an opponent’s behavior is to affect his “cost/ benefit calculation of...versus positive influence of inducements to affect behavior ; 7) inattention to deterrent capabilities at all levels of conflict.22 The issues of

  14. Change in tobacco excise policy in Bulgaria: the role of tobacco industry lobbying and smuggling.

    PubMed

    Skafida, Valeria; Silver, Karin E; Rechel, Boika P D; Gilmore, Anna B

    2014-05-01

    To examine how transnational tobacco companies (TTCs) tried to penetrate the Bulgarian cigarette market and influence tobacco excise tax policy after the fall of communism and during Bulgaria's accession to the European Union (EU). Analysis of internal tobacco industry documents supplemented by analysis of press coverage, tobacco industry journals, market reports and key informant interviews. TTCs have been involved in cigarette smuggling to and through Bulgaria since at least 1975 and used smuggling as a market-entry strategy. National tobacco company Bulgartabac appears to have been involved in smuggling its own cigarettes from and reimporting them to Bulgaria. Since Bulgaria's accession to the EU opened the market to the TTCs, TTCs have exaggerated the scale of the illicit trade to successfully convince politicians and public health experts that tax increases lead to cigarette smuggling. Yet, sources point to TTCs' continued complicity in cigarette smuggling to and through Bulgaria between 2000 and 2010. TTCs aimed to influence the Bulgarian tobacco excise tax regime, import duties and pricing mechanism, but appear to have been less successful than in other former communist countries in part due to the co-existence of a state-owned tobacco company. Undisclosed meetings between the tobacco industry and government ministers and officials are ongoing despite Bulgaria being a party to the Framework Convention on Tobacco Control (FCTC). The TTCs continued involvement in smuggling suggests that deals in 2004, 2007 and 2010 which the European Commission has reached with TTCs to address cigarette smuggling are inadequate. The TTCs' continued access to policymakers suggests that the FCTC is not being properly implemented. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  15. Little Boy to Star Wars the evolution of American deterrence. Research report

    SciTech Connect

    Havey, M.E.

    1986-05-01

    The historical and sociological development of the American deterrent posture in the nuclear age is traced since the its dawn at Alamagordo, New Mexico, 16 July 1945, and the use of the Little Boy over Hiroshima three weeks later. A description of Western man's involvement in and reaction to pre-1945 catastrophic circumstances is followed by a comparative examination of the post-1945 changes in national policy in regard to the use and dangers of total war. Using Bernard Brodie as a theoretical deterrent baseline, the author analyzes the ethical and military shifts in U.S. declaratory (versus actual) nuclear policy, through Paul Nitze's statements of future policy in light of strategic defense. The author concludes that extremely effective--not necessarily perfect--defenses can be based dramatically on the beneficial effects of arms control. But at the same time, such a condition must inevitably result in a de facto reversion of U.S. nuclear policy to that of a small, non-counterforce force de frappe deterrent - similar in effect to that of the present French posture. The implications of this upon U.S.-Soviet force balance, the historical trends of the American Way of War, and the present deterrent mindset of the officer corps is left as a grave concern.

  16. Differential Deterrence: Studying Heterogeneity and Changes in Perceptual Deterrence among Serious Youthful Offenders

    ERIC Educational Resources Information Center

    Loughran, Thomas A.; Piquero, Alex R.; Fagan, Jeffrey; Mulvey, Edward P.

    2012-01-01

    Perceptual deterrence has been an enduring focus of interest in criminology. Although recent research has generated important new insights about how risks, costs, and rewards of offending are perceived and internalized, there remain two specific limitations to advancing theories of deterrence: (a) the lack of panel data to show whether issues of…

  17. Differential Deterrence: Studying Heterogeneity and Changes in Perceptual Deterrence among Serious Youthful Offenders

    ERIC Educational Resources Information Center

    Loughran, Thomas A.; Piquero, Alex R.; Fagan, Jeffrey; Mulvey, Edward P.

    2012-01-01

    Perceptual deterrence has been an enduring focus of interest in criminology. Although recent research has generated important new insights about how risks, costs, and rewards of offending are perceived and internalized, there remain two specific limitations to advancing theories of deterrence: (a) the lack of panel data to show whether issues of…

  18. Strategic Defense Initiative: implications for US deterrence policy

    SciTech Connect

    MacDougall, A.S.

    1987-01-01

    While ballistic missile defenses (formerly called ABMs) were believed foreclosed from the nuclear balance as a result of the ABM Treaty, the SDI program has brought ballistic missile defenses back into the strategic equation. It is possible to suggest that missile defenses may make a significant contribution to US national security. Given this proposition, the dissertation follows the analysis as outlined: (1) The original ABM debate of the late 1960s is reviewed with respect to the arguments of proponents and opponents of the ABM. This debate led the US to accept the dominance of offensive nuclear forces in the nuclear balance. (2) While the US had foresworn working on ballistic-missile defenses during the 1970s, the strategic nuclear balance and foundations of deterrence have changed. (3) US strategic nuclear policy has evolved since the late 1960s to incorporate three major policy schools: assured destruction, countervailing, and nuclear war-fighting. Ballistic missile defenses fit with these policies in quite different ways. (4) US strategic offensive nuclear forces may be altered significantly by the deployment of a missile defense. (5) A US missile defense could effectively break up the ABM Treaty and spell an end to the arms control process. On the other hand, the SDI also may serve as an impetus to a new arms control treaty which incorporates reductions in offensive nuclear forces.

  19. “Key to the Future”: British American Tobacco and Cigarette Smuggling in China

    PubMed Central

    Lee, Kelley; Collin, Jeff

    2006-01-01

    Background Cigarette smuggling is a major public health issue, stimulating increased tobacco consumption and undermining tobacco control measures. China is the ultimate prize among tobacco's emerging markets, and is also believed to have the world's largest cigarette smuggling problem. Previous work has demonstrated the complicity of British American Tobacco (BAT) in this illicit trade within Asia and the former Soviet Union. Methods and Findings This paper analyses internal documents of BAT available on site from the Guildford Depository and online from the BAT Document Archive. Documents dating from the early 1900s to 2003 were searched and indexed on a specially designed project database to enable the construction of an historical narrative. Document analysis incorporated several validation techniques within a hermeneutic process. This paper describes the huge scale of this illicit trade in China, amounting to billions of (United States) dollars in sales, and the key supply routes by which it has been conducted. It examines BAT's efforts to optimise earnings by restructuring operations, and controlling the supply chain and pricing of smuggled cigarettes. Conclusions Our research shows that smuggling has been strategically critical to BAT's ongoing efforts to penetrate the Chinese market, and to its overall goal to become the leading company within an increasingly global industry. These findings support the need for concerted efforts to strengthen global collaboration to combat cigarette smuggling. PMID:16834455

  20. "Key to the future": British American tobacco and cigarette smuggling in China.

    PubMed

    Lee, Kelley; Collin, Jeff

    2006-07-01

    Cigarette smuggling is a major public health issue, stimulating increased tobacco consumption and undermining tobacco control measures. China is the ultimate prize among tobacco's emerging markets, and is also believed to have the world's largest cigarette smuggling problem. Previous work has demonstrated the complicity of British American Tobacco (BAT) in this illicit trade within Asia and the former Soviet Union. This paper analyses internal documents of BAT available on site from the Guildford Depository and online from the BAT Document Archive. Documents dating from the early 1900s to 2003 were searched and indexed on a specially designed project database to enable the construction of an historical narrative. Document analysis incorporated several validation techniques within a hermeneutic process. This paper describes the huge scale of this illicit trade in China, amounting to billions of (United States) dollars in sales, and the key supply routes by which it has been conducted. It examines BAT's efforts to optimise earnings by restructuring operations, and controlling the supply chain and pricing of smuggled cigarettes. Our research shows that smuggling has been strategically critical to BAT's ongoing efforts to penetrate the Chinese market, and to its overall goal to become the leading company within an increasingly global industry. These findings support the need for concerted efforts to strengthen global collaboration to combat cigarette smuggling.

  1. The nuclear dilemma and the just war tradition

    SciTech Connect

    O'Brien, W.V.; Langan, J.

    1986-01-01

    This book presents papers on the ethical aspects of nuclear weapons. Topics considered include the concept of a ''just'' war, national defense, political aspects, religion and politics, the failure of deterrence, conventional warfare, nuclear deterrence and democratic politics, the future of the nuclear debate, non-proliferation policy, arms control, national security, and government policies.

  2. Complicity in contraband: British American Tobacco and cigarette smuggling in Asia.

    PubMed

    Collin, J; Legresley, E; MacKenzie, R; Lawrence, S; Lee, K

    2004-12-01

    To examine the complicity of British American Tobacco (BAT) in cigarette smuggling in Asia, and to assess the centrality of illicit trade to regional corporate strategy. Analysis of previously confidential documents from BAT's Guildford depository. An iterative strategy combined searches based on geography, organisational structure, and key personnel, while corporate euphemisms for contraband were identified by triangulation. BAT documents demonstrate the strategic importance of smuggling across global, regional, national, and local levels. Particularly important in Asia, contraband enabled access to closed markets, created pressure for market opening, and was highly profitable. Documents demonstrate BAT's detailed oversight of illicit trade, seeking to reconcile the conflicting demands of control and deniability. BAT documents demonstrate that smuggling has been driven by corporate objectives, indicate national measures by which the problem can be addressed, and highlight the importance of a coordinated global response via WHO's Framework Convention on Tobacco Control.

  3. Complicity in contraband: British American Tobacco and cigarette smuggling in Asia

    PubMed Central

    Collin, J; LeGresley, E; MacKenzie, R; Lawrence, S; Lee, K

    2004-01-01

    Objectives: To examine the complicity of British American Tobacco (BAT) in cigarette smuggling in Asia, and to assess the centrality of illicit trade to regional corporate strategy. Methods: Analysis of previously confidential documents from BAT's Guildford depository. An iterative strategy combined searches based on geography, organisational structure, and key personnel, while corporate euphemisms for contraband were identified by triangulation. Results: BAT documents demonstrate the strategic importance of smuggling across global, regional, national, and local levels. Particularly important in Asia, contraband enabled access to closed markets, created pressure for market opening, and was highly profitable. Documents demonstrate BAT's detailed oversight of illicit trade, seeking to reconcile the conflicting demands of control and deniability. Conclusions: BAT documents demonstrate that smuggling has been driven by corporate objectives, indicate national measures by which the problem can be addressed, and highlight the importance of a coordinated global response via WHO's Framework Convention on Tobacco Control. PMID:15564212

  4. Nuclear Weapons and Coercive Escalation in Regional Conflicts: Lessons from North Korea and Pakistan

    DTIC Science & Technology

    2014-11-01

    15 Victor A. Utgoff and Michael O. Wheeler. On Deterring and Defeating Attempts to Exploit a Nuclear Theory of Victory. Insitute for Defense...On Deterring and Defeating Attempts to Exploit a Nuclear Theory of Victory, 2013, 23. Joshua Rovner. “After Proliferation: Deterrence Theory and...After Proliferation: Deterrence Theory and Emerging Nuclear Powers,” 2012, 18. 25 Geller, “ Nuclear Weapons, Deterrence and Crisis Escalation,” 1990

  5. Synopsis of the international workshop on illicit trafficking of nuclear material

    SciTech Connect

    Niemeyer, S.

    1997-03-01

    In this paper a synopsis is presented of the second ITWG (Nuclear Smuggling International Technical Working Group) meeting that was held in Obninsk, Russia, on December 2-4, 1996, at the Institute of Physics and Power Engineering.

  6. Are We Doing Enough to Prevent a Nuclear Terrorist Attack?

    DTIC Science & Technology

    2013-03-01

    they don’t know about what has been smuggled without detection or is in storage and available for smuggling to a terrorist group. If the success...HEU and plutonium to make several hundreds of nuclear weapons by moving them to a new facility for a long-term storage ; and Sweden returned several...natural and manmade sources of radiation, such as cat litter, bananas , or granite that may trigger the detector. Once a radioactive source is located

  7. Fundamental deterrence and START III

    SciTech Connect

    Johnson, K.D.

    1998-12-31

    The public`s brief respite from the specter of nuclear holocaust abruptly ended in May 1998 when India, 24 years after its only successful nuclear weapon test, detonated five more just sixty miles from its border with Pakistan. Pakistan quickly declared itself a nuclear power and threatened tests of its own. Various capitals issued condemnations and an assortment of largely symbolic political and economic sanctions. India then proclaimed a moratorium on further testing and announced its willingness to accede to the Comprehensive Test Ban Treaty as a declared nuclear power. Inevitably, India`s tests will prompt Pakistan and China to accelerate their own nuclear programs, to the detriment of regional stability in South Asia.

  8. Nuclear Fuel Cycle & Vulnerabilities

    SciTech Connect

    Boyer, Brian D.

    2012-06-18

    The objective of safeguards is the timely detection of diversion of significant quantities of nuclear material from peaceful nuclear activities to the manufacture of nuclear weapons or of other nuclear explosive devices or for purposes unknown, and deterrence of such diversion by the risk of early detection. The safeguards system should be designed to provide credible assurances that there has been no diversion of declared nuclear material and no undeclared nuclear material and activities.

  9. Smuggled Literacies: The Social and Educational Value of Hidden Literacies of Urban African Americans.

    ERIC Educational Resources Information Center

    Cushman, M. Ellen

    Researchers and teachers often are not privy to the literacy events smuggled into the private lives of urban African-Americans. Yet, these hidden literacies, such as journal writing and reading personal business letters, often reveal deft rhetorical skills as well as intellectual grappling with the social complexities of power, race, and class.…

  10. Estimating price elasticities when there is smuggling: the sensitivity of smoking to price in Canada.

    PubMed

    Gruber, Jonathan; Sen, Anindya; Stabile, Mark

    2003-09-01

    A central parameter for evaluating tax policies is the price elasticity of demand for cigarettes. But in many countries this parameter is difficult to estimate reliably due to widespread smuggling, which significantly biases estimates using legal sales data. An excellent example is Canada, where widespread smuggling in the early 1990s, in response to large tax increases, biases upwards the response of legal cigarette sales to price. We surmount this problem through two approaches: excluding the provinces and years where smuggling was greatest; and using household level expenditure data on smoking. These two approaches yield a tightly estimated elasticity in the range of -0.45 to -0.47. We also show that the sensitivity of smoking to price is much larger among lower income Canadians. In the context of recent behavioral models of smoking, whereby higher taxes reduce unwanted smoking among price sensitive populations, this finding suggests that cigarette taxes may not be as regressive as previously suggested. Finally, we show that price increases on cigarettes do not increase, and may actually decrease, consumption of alcohol; as a result, smuggling of cigarettes may have raised consumption of alcohol as well.

  11. Effects of acoustic deterrents on foraging bats

    Treesearch

    Joshua B. Johnson; W. Mark Ford; Jane L. Rodrigue; John W. Edwards

    2012-01-01

    Significant bat mortality events associated with wind energy expansion, particularly in the Appalachians, have highlighted the need for development of possible mitigation practices to reduce or prevent strike mortality. Other than increasing turbine cut-in speed, acoustic deterrents probably hold the greatest promise for reducing bat mortality. However, acoustic...

  12. Perceived deterrence and outcomes in drug court.

    PubMed

    Marlowe, Douglas B; Festinger, David S; Foltz, Carol; Lee, Patricia A; Patapis, Nicholas S

    2005-01-01

    According to perceived-deterrence theory, the likelihood that an offender will engage in drug use or illegal activity is influenced by the perceived certainty of being detected for infractions or recognized for accomplishments, the perceived certainty of receiving sanctions for infractions or rewards for accomplishments, and the anticipated magnitude of the sanctions and rewards. This study evaluated drug court participants' perceived deterrence at monthly intervals during their enrollment in drug court. Exploratory cluster analysis (N=255) on the longitudinal scores yielded five subtypes of drug offenders characterized either by consistently elevated perceived-deterrence scores, consistently moderate scores, consistently low scores, increasing scores, or decreasing scores. The best outcomes were associated with consistently elevated scores, whereas the worst outcomes were associated with scores that declined over time as the participants became accustomed to the program. The clusters also differed in predicted directions on demographic variables. The correlational design does not permit inferences of causality; however, the results lend credence to perceived deterrence as a potential explanatory mechanism for the effects of drug courts.

  13. Nuclear Weapons and Science Education.

    ERIC Educational Resources Information Center

    Wellington, J. J.

    1984-01-01

    Provides suggestions on how science teachers can, and should, deal with the nuclear weapons debate in a balanced and critical way. Includes a table outlining points for and against deterrence and disarmament. (JN)

  14. Nuclear Weapons and Science Education.

    ERIC Educational Resources Information Center

    Wellington, J. J.

    1984-01-01

    Provides suggestions on how science teachers can, and should, deal with the nuclear weapons debate in a balanced and critical way. Includes a table outlining points for and against deterrence and disarmament. (JN)

  15. Deterrence and Influence: The Navy’s Role in Preventing War. Revision 1

    DTIC Science & Technology

    2009-03-01

    of nu- clear doctrine during this period, see David A. Rosenberg , "The Origins of Overkill: Nuclear Weapons and American Strategy, 1945-1960...important role: deterrence is used to help prevent escala - tion, and compellence is used to persuade the adversary to terminate the conflict and...This is also useful in Phase 2, as efforts to employ compellence and signal escala - tion dominance (which, as discussed earlier, is an important

  16. Extended Deterrence: Taking Stock of Current Policy and Updating the Research and PME Agendas

    DTIC Science & Technology

    2014-08-01

    In June 2014 the kidnapping and killing of Israeli teenage boys sparked a war between Israel and Hamas that continues to rage. There is also an...for extended nuclear deterrence? Missile Defense. Missile defense technology is spreading. Both US allies and adversaries will likely have missile...defense capabilities in the coming years. We must begin thinking about the positive and negative impacts the spread of this technology will have on

  17. Conventional Expeditionary Forces: A 21st Century Triad for Strategic Deterrence

    DTIC Science & Technology

    2009-05-27

    distribution is unlimited 13. NUMBER JFSC 25789 REPORT NUMBER( S ) Strategic deterrence has historically used the threat of a nuclear response to...regional partners. ii Acknowledgements To my Lord and Saviour in whom I put my faith, I give thanks for your countless blessings and...challenges. I know all things happen for a reason. To my Bride, Rosa, thank you for your love and support not only during this year, but throughout

  18. Thinking About Preventing Nuclear War.

    ERIC Educational Resources Information Center

    Ground Zero, Washington, DC.

    Potential paths to nuclear war and the available means of prevention of nuclear war are discussed. Presented is a detailed description of six nuclear war scenarios, and brief examples of types of potential deterrents to nuclear war (firebreaks) which are relevant for each. To be effective, the right combination of firebreaks must be used, the…

  19. Thinking About Preventing Nuclear War.

    ERIC Educational Resources Information Center

    Ground Zero, Washington, DC.

    Potential paths to nuclear war and the available means of prevention of nuclear war are discussed. Presented is a detailed description of six nuclear war scenarios, and brief examples of types of potential deterrents to nuclear war (firebreaks) which are relevant for each. To be effective, the right combination of firebreaks must be used, the…

  20. Introduction to Special Edition (of the Journal of Nuclear Materials Management) on Reducing the Threat from Radioactive Materials

    SciTech Connect

    Mladineo, Stephen V.

    2007-03-01

    Introductory article for special edition of the JOURNAL OF NUCLEAR MATERIALS MANAGEMENT outlining the Institute of Nuclear Materials Management Nonproliferation and Arms Control Technical Division. In particular the International Nuclear and Radiological Security Standing Committee and its initial focus covering four topical areas--Radiological Threat Reduction, Nuclear Smuggling and Illicit Trafficking, Countering Nuclear Terrorism, and Radioligical Terrorism Consequence Management.

  1. Mechanisms of Feeding Deterrence by Ziziphins.

    DTIC Science & Technology

    2014-09-26

    AD-A157 469 MECHRNISMS OF FEEDING DETERRENCE BY ZIZIPHINS(U) / CORNELL UNIV ITHACA NY 8 P HRLPERN 30 NAY 65 SIID 7- BHP -CU-RRO RRO-i8882.2-LS DRAA2...OOWNGRADING SCHEDULE unlimited. 4. PERFORMING ORGANIZATION REPORT NUMBERiS) 5. MONITORING ORGANIZATION REPORT NUMBERtS) 7- BHP -CU-ARO IJ,’tt . -4S 6a. NAME OF

  2. Deterrence Effects of Operation Frontier Shield

    DTIC Science & Technology

    1999-03-01

    Hispaniola H-9 Ill— 1. The upper curve shows the deterrence due to the probability of personal apprehension, while the lower curve shows the...interdiction rates for four ranges of apprehension force were identified: Lethal apprehension rate - less than 1 percent Personal apprehension rate...percent Personal apprehension rate - greater than 20 percent, Apprehension rate of associates - greater than 30 percent, and Vehicle and drug loss

  3. 2015 Cross-Domain Deterrence Seminar Bibliography

    SciTech Connect

    Juarez, Anthony

    2016-02-04

    In November 2015, the Center for Global Security Research, NSO, and Global Security program jointly sponsored a seminar investigating questions related to cross-domain deterrence at Lawrence Livermore National Laboratory. At the seminar, experts were asked to moderate discussion based on the four topics below. For each of these topics, we have compiled a short list of literature that will help analysts develop a baseline understanding of the issue.

  4. Armed Deterrence: Countering Soft Target Attacks

    DTIC Science & Technology

    2016-02-06

    for Reserve Officer Training Corps (ROTC) detachments because it provides a visual “deterrent” against soft target attacks. Further, if perceptual...deterrence should fail, an “open carry” firearms policy is most often the only viable means to stop (deny) an active shooter in order to safeguard...problem by first examining current terrorist trends and active shooters events, to include their motivations. The paper then exposes the hazards affecting

  5. Beyond Armageddon: Deterrence with Less

    DTIC Science & Technology

    1991-06-01

    it is the desired choice. Finally, it is necessary to consider the potential r ’rects the other three major nuclear powers may have on crisis...Effectiveness, vol. 3, The Second World War, ed. Allan R . Millet and Williamson Murray (Boston: Allen & Unwin, 1988), pp. 19, 32-34, Kenneth J. Hagan...This People’s Navy (New York: The Free Press, 1991), pp. 327, 328; Robert W . Love, Jr., "Fighting a Global War, 1941-1945," in In Peace and War

  6. Here to Help: Third Party Deterrence Against Insurgent Groups

    DTIC Science & Technology

    2015-05-22

    https://www.hsaj.org/articles/152. 11 Alexander L. George and Richard Smoke, Deterrence in American Foreign Policy, Theory and Practice (New York...Huth and Bruce Russett from 1885 to 1983, every third party deterring entity as well as every aggressor entity were states.28 The ally or partner was...26Mearsheimer, Conventional Deterrence, 14. 27 Lebovic, 4. 28 Paul Huth and Bruce Russett, “Deterrence Failure

  7. Validation of a BOTDR-based system for the detection of smuggling tunnels

    NASA Astrophysics Data System (ADS)

    Elkayam, Itai; Klar, Assaf; Linker, Raphael; Marshall, Alec M.

    2010-04-01

    Cross-border smuggling tunnels enable unmonitored movement of people, drugs and weapons and pose a very serious threat to homeland security. Recently, Klar and Linker (2009) [SPIE paper No. 731603] presented an analytical study of the feasibility of a Brillouin Optical Time Domain Reflectometry (BOTDR) based system for the detection of small sized smuggling tunnels. The current study extends this work by validating the analytical models against real strain measurements in soil obtained from small scale experiments in a geotechnical centrifuge. The soil strains were obtained using an image analysis method that tracked the displacement of discrete patches of soil through a sequence of digital images of the soil around the tunnel during the centrifuge test. The results of the present study are in agreement with those of a previous study which was based on synthetic signals generated using empirical and analytical models from the literature.

  8. [The scale of border trade, tax-free import and tobacco smuggling to Norway].

    PubMed

    Lund, Karl Erik

    2004-01-08

    There are no studies of the relative significance in Norway of registered sales, tax-free import, border trade or smuggling of tobacco. The estimated registered sales of tobacco are based on data from the Norwegian customs and excise authorities. The border trade and tax-free import estimates were based on nation-wide, representative surveys of daily smokers aged 16-74 carried out by Statistics Norway for the years 1990-1993 and 1997-2001. There are no detailed data on the scale of smuggling other than confiscation statistics compiled by the customs and excise authorities. It is assumed that confiscations amount to about a tenth of the total amount smuggled into the country. The unregistered consumption of cigarettes and tobacco has been on the rise since the early 1990s; in the years 1997-2001 it accounted for about a quarter of total consumption. Broken down, the figures are as follows: 11% was purchased in Sweden, 5% in Denmark, 9% in other foreign countries; 1% was smuggled into the country. The rise in unregistered tobacco consumption is putting further pressure on the high Norwegian taxes on tobacco. But if taxes were cut, domestic demand would rise, and hence have little or even negative impact on revenue flowing to the government from the legal tobacco market and probably little impact on the levels of imported tobacco through tax-free arrangements or cross-border trade. Hence, although the price gap between Norway and neighbouring countries narrows, we must assume that the motivation to acquire tobacco will remain unaffected while Norwegians continue to travel to Sweden to stock up on inexpensive meat produce.

  9. Interdicting Maritime Migrant Smuggling -- Applying Some Concepts of Operational Art to Coast Guard Operations

    DTIC Science & Technology

    2008-04-23

    SUPPLEMENTARY NOTES A paper submitted to the Naval War College faculty in partial satisfaction of the requirements of the Joint Military Operations...ABSTRACT The issue of illegal human trafficking, smuggling, and migration in the maritime domain presents a challenge to the organizations charged with...LIEUTENANT COMMANDER, U.S. COAST GUARD A paper submitted to the faculty of the Naval War College in partial satisfaction of the requirements of Joint

  10. NNSA Administrator Looks to Future of Nuclear Security at STRATCOM Symposium

    ScienceCinema

    Thomas D'Agostino

    2016-07-12

    Administrator Thomas P. DAgostino of the National Nuclear Security Administration (NNSA) discusses the future of the Nuclear Security Enterprise and its strategic deterrence mission in light of President Obamas unprecedented nuclear security agenda.

  11. NNSA Administrator Looks to Future of Nuclear Security at STRATCOM Symposium

    SciTech Connect

    Thomas D'Agostino

    2009-08-05

    Administrator Thomas P. DAgostino of the National Nuclear Security Administration (NNSA) discusses the future of the Nuclear Security Enterprise and its strategic deterrence mission in light of President Obamas unprecedented nuclear security agenda.

  12. Remixing the ‘Appropriate Mix’: Reassessing NATO’s Deterrence and Defense Posture in the Face of New Threats

    SciTech Connect

    Juarez, Anthony

    2016-05-31

    The North Atlantic Treaty Organization (NATO) and the countries of Europe face a renewed challenge from the east vis-à-vis the Putin regime in Moscow. In the face of these new challenges, NATO must reconsider its deterrence and defense posture in order to deter conflict in Europe. Unfortunately, Russian attempts to rewrite the rules of the post-Cold War international order by force have been coupled with nuclear saber rattling and overt nuclear threats. Russia’s nuclear threats, in addition to provocative changes to Russia’s nuclear posture in its Military Doctrine, are methods to make up for Russia’s conventional military inferiority relative to NATO and the United States. Some have described Moscow’s actions as laying the groundwork for a nuclear coercion strategy. While the decrease in the nuclear arsenals of Russia and the United States has reduced the likelihood of nuclear annihilation to an all-time low since the height of the Cold War, Russia’s nuclear coercion strategy is increasing the probability of nuclear employment in Europe. The probability of nuclear use is compounded by Russia’s tremendous local military advantage around its periphery in spite of U.S. global military primacy. This military advantage increases the incentive to use military force if Russian decision-makers conclude that a quick military victory is possible, or if Russian leaders miscalculate based on an incorrect assessment of military force balance or resolve of their adversary. The integration of Lithuania, Latvia, and Estonia (referred to as the Baltics in this paper) into the NATO alliance in 2004 makes Russia’s military advantage in its periphery increasingly relevant. Each NATO state is required to assist any NATO state that comes under attack per Article V of the North Atlantic Treaty. The Baltic states’ proximity to Russia, their weak indigenous militaries, their former status as Soviet Republics, large population of ethnic Russians, and Russian President

  13. Defining Deterrence in Cyberspace Working Toward a Framework to Integrate Cyber Deterrence

    DTIC Science & Technology

    2011-04-01

    The goal of deterrence is not to deter the use of a particular weapon. Rather, a nation deters undesirable behavior. Cyber warfare can produce three...associated limitations will not produce a strategically decisive result. Cyber warfare must be used in conjunction with other instruments of power to

  14. Soviet theater nuclear capabilities: the European nuclear balance in transition

    SciTech Connect

    Kennedy, R.

    1983-08-31

    This memorandum examined the changing strategic and theater nuclear environment; Soviet theater nuclear force improvements and doctrine; the implications of Soviet theater nuclear buildup for deterrence and the defense of Europe; and NATO's response. The author concludes that the changing balance of theater capabilities has resulted in a devaluation of deterrence, a decline in Western self-confidence, and an increase in NATO's vulnerabilities. The author also contends that if the Soviet Union is unwilling to negotiate a significant reduction intermediate-range nuclear forces that now pose a serious threat to the West, the NATO deployment of Pershing II and cruise missiles will not only help to restore balance to the NATO/Warsaw Pact nuclear equation, but will also enhance deterrence, reduce NATO's vulnerabilities, and thus, will contribute to crisis stability in Europe.

  15. Sources of Deterrence: The Perceived Costs of Assault Versus Arrest.

    ERIC Educational Resources Information Center

    Hawkins, Richard; Williams, Kirk R.

    Recent panel studies of deterrence have reported little evidence that perceptions of legal sanctions promote deterrence. Yet those studies have consistently found that extralegal sanctions "inhibit" criminal involvement. Conclusions drawn from this line of research remain speculative, however, because they are guided by an unnecessarily…

  16. 75 FR 61631 - Marine Mammal Protection Act; Deterrence Guidelines

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... bear deterrence. Under the Administrative Procedure Act (APA) (5 U.S.C. 551 et seq.), ``the whole or a... public notice-and-comment procedure of the APA in adopting these deterrence guidelines. The Service will... American Tribal Governments (59 FR 22951), E.O. 13175, and the Department of the Interior's manual at...

  17. Developmental, Familial, and Peer Deterrents to Adoption Placement.

    ERIC Educational Resources Information Center

    Weir, Kyle N.

    2000-01-01

    Examines the developmental, familial, and peer deterrents that form barriers to adoption placement, based on interviews with 17 teen mothers in a residential facility. Analyzes responses based on an Eriksonian developmental model, and notes the role of family "cutoffs" and "re-admissions" and peer pressure as deterrents to…

  18. Developmental, Familial, and Peer Deterrents to Adoption Placement.

    ERIC Educational Resources Information Center

    Weir, Kyle N.

    2000-01-01

    Examines the developmental, familial, and peer deterrents that form barriers to adoption placement, based on interviews with 17 teen mothers in a residential facility. Analyzes responses based on an Eriksonian developmental model, and notes the role of family "cutoffs" and "re-admissions" and peer pressure as deterrents to…

  19. Model Action Plan for Nuclear Forensics and Nuclear Attribution

    SciTech Connect

    Dudder, G B; Niemeyer, S; Smith, D K; Kristo, M J

    2004-03-01

    Nuclear forensics and nuclear attribution have become increasingly important tools in the fight against illegal trafficking in nuclear and radiological materials. This technical report documents the field of nuclear forensics and nuclear attribution in a comprehensive manner, summarizing tools and procedures that have heretofore been described independently in the scientific literature. This report also provides national policy-makers, decision-makers, and technical managers with guidance for responding to incidents involving the interdiction of nuclear and radiological materials. However, due to the significant capital costs of the equipment and the specialized expertise of the personnel, work in the field of nuclear forensics has been restricted so far to a handful of national and international laboratories. In fact, there are a limited number of specialists who have experience working with interdicted nuclear materials and affiliated evidence. Most of the laboratories that have the requisite equipment, personnel, and experience to perform nuclear forensic analysis are participants in the Nuclear Smuggling International Technical Working Group or ITWG (see Section 1.8). Consequently, there is a need to disseminate information on an appropriate response to incidents of nuclear smuggling, including a comprehensive approach to gathering evidence that meets appropriate legal standards and to developing insights into the source and routes of nuclear and radiological contraband. Appendix A presents a ''Menu of Options'' for other Member States to request assistance from the ITWG Nuclear Forensics Laboratories (INFL) on nuclear forensic cases.

  20. Document fraud deterrent strategies: four case studies

    NASA Astrophysics Data System (ADS)

    Mercer, John W.

    1998-04-01

    This paper discusses the approaches taken to deter fraud committed against four documents: the machine-readable passport; the machine-readable visa; the Consular Report of Birth Abroad; and the Border Crossing Card. General approaches are discussed first, with an emphasis on the reasons for the document, the conditions of its use and the information systems required for it to function. A cost model of counterfeit deterrence is introduced. Specific approaches to each of the four documents are then discussed, in light of the issuance circumstances and criteria, the intent of the issuing authority, the applicable international standards and the level of protection and fraud resistance appropriate for the document.

  1. Deterrence and the Celerity of the Death Penalty: A Neglected Question in Deterrence Research. Discussion Paper No. 532-78.

    ERIC Educational Resources Information Center

    Bailey, William C.

    This paper focuses on the deterrent effect of the celerity of the death penalty on homicide rates. The deterrent effect of both the certainty and the celerity of the death penalty on homicide rates is examined cross-sectionally for States. Multiple measures of execution and homicide are considered, along with various sociodemographic variables, in…

  2. Deterrence and the Celerity of the Death Penalty: A Neglected Question in Deterrence Research. Discussion Paper No. 532-78.

    ERIC Educational Resources Information Center

    Bailey, William C.

    This paper focuses on the deterrent effect of the celerity of the death penalty on homicide rates. The deterrent effect of both the certainty and the celerity of the death penalty on homicide rates is examined cross-sectionally for States. Multiple measures of execution and homicide are considered, along with various sociodemographic variables, in…

  3. Acoustical deterrence of Silver Carp (Hypophthalmichthys molitrix)

    USGS Publications Warehouse

    Brooke J. Vetter,; Cupp, Aaron R.; Fredricks, Kim T.; Gaikowski, Mark P.; Allen F. Mensinger,

    2015-01-01

    The invasive Silver Carp (Hypophthalmichthys molitrix) dominate large regions of the Mississippi River drainage and continue to expand their range northward threatening the Laurentian Great Lakes. This study found that complex broadband sound (0–10 kHz) is effective in altering the behavior of Silver Carp with implications for deterrent barriers or potential control measures (e.g., herding fish into nets). The phonotaxic response of Silver Carp was investigated using controlled experiments in outdoor concrete ponds (10 × 4.9 × 1.2 m). Pure tones (500–2000 Hz) and complex sound (underwater field recordings of outboard motors) were broadcast using underwater speakers. Silver Carp always reacted to the complex sounds by exhibiting negative phonotaxis to the sound source and by alternating speaker location, Silver Carp could be directed consistently, up to 37 consecutive times, to opposite ends of the large outdoor pond. However, fish habituated quickly to pure tones, reacting to only approximately 5 % of these presentations and never showed more than two consecutive responses. Previous studies have demonstrated the success of sound barriers in preventing Silver Carp movement using pure tones and this research suggests that a complex sound stimulus would be an even more effective deterrent.

  4. China`s new {open_quotes}old thinking{close_quotes}: The concept of limited deterrence

    SciTech Connect

    Johnston, A.I.

    1995-12-31

    In the last five to ten years, Chinese military strategists have developed a concept of limited deterrence that is now used to describe what China`s nuclear forces ought to be able to do. Limited deterrence rests on a limited war-fighting capability aimed at communicating China`s ability to inflict costly damage on the adversary at every rung on the escalation ladder and thus denying the adversary victory in a nuclear war. It is this capability, Chinese strategists argue, that will deter such a war in the first place. Limited deterrence therefore requires the development of a greater number of tactical, theater, and strategic nuclear weapons that are accurate enough to hit counterforce targets, are mobile, can be used in the earliest stages of a nuclear crisis, and in a world of THAAD are capable of penetrating ballistic missile defense systems. These forces would thus require effective space-based early warning, and some configuration of BMD capabilities. Given that China does not now have such capabilities, the straight-line prediction would be that over the next decade or so, we should expect to see a discernible effort to shift the forces away from a minimum strike-back assured destruction posture, which China now has, toward limited war-fighting. This may or may not entail a dramatic short-run increase in the absolute numbers of warheads and delivery systems: the pace will depend in part on whether the United States proceeds with TMD deployment. The speed of change in China`s nuclear capabilities will also depend in part on whether the implementation of START II leads to a steep relative increase in the size of the Chinese arsenal and reduces the relative number of counterforce targets. The primary constraints on any such efforts are exogenous, namely, budgetary and arms control constraints. It is an open question whether endogenous constraints-a shift in doctrine toward minimum deterrence-might be encouraged. 120 refs.

  5. The Threat of Convergence of Terror Groups with Transnational Criminal Organizations in Order to Utilize Existing Smuggling Routes and Techniques to Aid in the Covert Entry of Operatives into the United States

    DTIC Science & Technology

    2015-06-12

    Peroxide, a powerful explosive, marksmanship instruction for the Kalashnikov rifle, sending and receiving encrypted messages electronically , and...drug cartels, to Lebanese cigarette smuggling rackets, and so forth. Drugs still move across the border extensively. Smuggling networks for human...

  6. MAD with aliens? Interstellar deterrence and its implications

    NASA Astrophysics Data System (ADS)

    Korhonen, Janne M.

    2013-05-01

    The possibility that extraterrestrial intelligences (ETIs) could be hostile to humanity has been raised as a reason to avoid even trying to contact ETIs. However, there is a distinct shortage of analytical discussion about the risks of an attack, perhaps because of an implicit premise that we cannot analyze the decision making of an alien civilization. This paper argues that we can draw some inferences from the history of the Cold War and nuclear deterrence in order to show that at least some attack scenarios are likely to be exaggerated. In particular, it would seem to be unlikely that the humanity would be attacked simply because it might, sometime in the future, present a threat to the ETI. Even if communication proves to be difficult, rational decision-makers should avoid unprovoked attacks, because their success would be very difficult to assure. In general, it seems believable that interstellar conflicts between civilizations would remain rare. The findings advise caution for proposed interstellar missions, however, as starfaring capability itself might be seen as a threat. On the other hand, attempting to contact ETIs seems to be a relatively low-risk strategy: paranoid ETIs must also consider the possibility that the messages are a deception designed to lure out hostile civilizations and preemptively destroy them.

  7. Documentation of a Model Action Plan to Deter Illicit Nuclear Trafficking

    SciTech Connect

    Smith, D; Kristo, M; Niemeyer, S; Dudder, G

    2006-07-28

    Theft, illegal possession, smuggling, or attempted unauthorized sale of nuclear and radiological materials remains a worldwide problem. The Nuclear Smuggling International Technical Working Group (ITWG) has adopted a model action plan to guide investigation of these cases through a systematic approach to nuclear forensics. The model action plan was recently documented and provides recommendations concerning incident response, collection of evidence in conformance with required legal standards, laboratory sampling and distribution of samples, radioactive materials analysis, including categorization and characterization of samples, forensics analysis of conventional evidence, and case development including interpretation of forensic signatures.

  8. Documentation of a model action plan to deter illicit nuclear trafficking

    SciTech Connect

    Smith, D. K.; Kristo, M. J.; Niemeyer, S.; Dudder, Gordon B.

    2008-05-04

    Theft, illegal possession, smuggling, or attempted unathorized sale of nuclear and radiological materials remains a worldwide problem. The Nuclear Smuggling International Technical Working Group (ITWG) has adopted a model action plan to guide investigation of these cases through a systematic approach to nuclear forensics. The model action plan was recently documented and provides recommendations concerning incident response, collection of evidence in conformance with required legal standards, laboratory sampling and distribution of samples, radioactive materials analysis, including categorization and characterization of samples, forensics analysis of conventional evidence, and case development including interpretation of forensic signatures.

  9. Application of micro-Raman spectroscopy for fight against terrorism and smuggling

    NASA Astrophysics Data System (ADS)

    Almaviva, Salvatore; Botti, Sabina; Palucci, Antonio; Puiu, Adriana; Schnürer, Frank; Schweikert, Wenka; Romolo, Francesco Saverio

    2014-04-01

    We report the results of Raman measurements on some common military explosives and explosives precursors deposited on clothing fabrics, both synthetic and natural, in concentration comparable to those obtained from a single fingerprint or mixed with similar harmless substances to detect illegal compounds for smuggling activities. Raman spectra were obtained using an integrated portable Raman system equipped with an optical microscope and a 785-nm laser in an analysis of <1 min. The spectral features of each illicit substance have been identified and distinguished from those belonging to the substrate fabric or from the interfering compound. Our results show that the application of Raman spectroscopy (RS) with a microscope-based portable apparatus can provide interpretable Raman spectra for a fast, in-situ analysis, directly from explosive particles of some μ, despite the contribution of the substrate, leaving the sample completely unaltered for further, more specific, and propedeutic laboratory analysis. We also show how the RS is suitable for detecting illegal compounds mixed with harmless substances for smuggling purposes or for counterfeiting activities.

  10. Smuggling as the “key to a combined market”: British American Tobacco in Lebanon

    PubMed Central

    Nakkash, R; Lee, K

    2008-01-01

    Objectives: To understand the strategy of British American Tobacco (BAT) and other transnational tobacco companies (TTCs) to gain access to the Lebanese market, which has remained relatively closed under monopoly ownership and political instability. Methods: Analysis of internal industry documents, local language secondary sources and industry publications. Results: TTCs have relied on legal and illegal channels to supply the Lebanese market since at least the 1970s. Available documents suggest smuggling has been an important component of BAT’s market entry strategy, transported in substantial quantities via middlemen for sale in Lebanon and neighbouring countries. TTCs took advantage of weak and unstable governance, resulting in uncertainty over the Regie’s legal status, and continued to supply the contraband trade despite appeals by the government to cease undermining its revenues. Since the end of the civil war in the early 1990s, continued uncertainty about the tobacco monopoly amid political instability has encouraged TTCs to seek a legal presence in the country, while continuing to achieve substantial sales through contraband. Conclusion: Evidence of the complicity of TTCs in cigarette smuggling extends to Lebanon and the Middle East where this trade has especially benefited from weak governance and chronic political instability. The regional nature of TTC strategy supports strong international cooperation under the Framework Convention on Tobacco Control to tackle the problem. PMID:18818226

  11. Overcrowded motor vehicle trauma from the smuggling of illegal immigrants in the desert of the Southwest.

    PubMed

    Lumpkin, Mary F; Judkins, Dan; Porter, John M; Latifi, Rifat; Williams, Mark D

    2004-12-01

    Overcrowded motor vehicle crashes caused by the very active criminal enterprise of smuggling illegal immigrants in the desert of the Southwest is a recent and under-recognized trauma etiology. A computerized database search from 1990 through 2003 of local newspaper reports of overcrowded motor vehicle crashes along the 281 miles of Arizona's border with Mexico was conducted. This area was covered by two level I trauma centers, but since July 2003 is now served only by the University Medical Center. Each of these crashes involved a single motor vehicle in poor mechanical shape packed with illegal immigrants. Speeding out of control on bad tires, high-speed rollovers result in ejection of most passengers. Since 1999, there have been 38 crashes involving 663 passengers (an average of 17 per vehicle) with an injury rate of 49 per cent and a mortality rate of 9 per cent. This relatively recent phenomenon (no reports from before 1998) of trauma resulting from human smuggling is lethal and demonstrates the smugglers' wanton disregard for human life, particularly when facing apprehension. Even a few innocent bystanders have been killed. These crashes overwhelm a region's trauma resources and must be recognized when planning the distribution of trauma resources to border states.

  12. TRPA1 mediates the noxious effects of natural sesquiterpene deterrents.

    PubMed

    Escalera, Jasmine; von Hehn, Christian A; Bessac, Bret F; Sivula, Michael; Jordt, Sven-Eric

    2008-08-29

    Plants, fungi, and animals generate a diverse array of deterrent natural products that induce avoidance behavior in biological adversaries. The largest known chemical family of deterrents are terpenes characterized by reactive alpha,beta-unsaturated dialdehyde moieties, including the drimane sesquiterpenes and other terpene species. Deterrent sesquiterpenes are potent activators of mammalian peripheral chemosensory neurons, causing pain and neurogenic inflammation. Despite their wide-spread synthesis and medicinal use as desensitizing analgesics, their molecular targets remain unknown. Here we show that isovelleral, a noxious fungal sesquiterpene, excites sensory neurons through activation of TPRA1, an ion channel involved in inflammatory pain signaling. TRPA1 is also activated by polygodial, a drimane sesquiterpene synthesized by plants and animals. TRPA1-deficient mice show greatly reduced nocifensive behavior in response to isovelleral, indicating that TRPA1 is the major receptor for deterrent sesquiterpenes in vivo. Isovelleral and polygodial represent the first fungal and animal small molecule agonists of nociceptive transient receptor potential channels.

  13. Quantitative evaluation of precipitation gauge bird deterrent mechanisms

    NASA Astrophysics Data System (ADS)

    Cobos, Doug; Taysom, Nathan

    2017-04-01

    "Contamination" from avian activity is a constant contributor to inaccurate measurements and often complete failure in precipitation gauges. Various bird deterrent schemes have been deployed both by rain gauge manufacturers and by individual research groups, but few data exist regarding the effectiveness of the deterrent mechanisms outside of the anecdotal claims that "none of them work well." We have recently re-purposed a commercial trail camera, commonly used to record images of game animals, to quantify the effectiveness of bird deterrent devices on our ATMOS 31 precipitation gauge. Our initial attempts using a 3-D printed ring and spike design actually made the precipitation gauge more attractive to birds, but subsequent iterations have substantially improved bird deterrent effectiveness.

  14. Improving Road Safety through Deterrence-Based Initiatives

    PubMed Central

    Davey, Jeremy D; Freeman, James E

    2011-01-01

    The efficacy of road safety countermeasures to deter motorists from engaging in illegal behaviours is extremely important when considering the personal and economic impact of road accidents on the community. In many countries, deterrence theory has remained a cornerstone of criminology and criminal justice policy, particularly within the field of road safety, as policy makers and enforcement agencies attempt to increase perceptions regarding the certainty, severity and swiftness of sanctions for those who engage in illegal motoring behaviours. Using the Australian experience (particularly the tremendous amount of research into drink driving), the current paper reviews the principles underpinning deterrence theory, the utilisation of the approach within some contemporary road safety initiatives (e.g., random breath testing) as well as highlighting some methods to enhance a deterrent effect. The paper also provides direction for future deterrence-based research, in particular, considering the powerful impact of non-legal sanctions, punishment avoidance as well as creating culturally embedded behavioural change. PMID:21509205

  15. Northeast Asia Nuclear Dilemmas

    DTIC Science & Technology

    2012-02-01

    deterrence.40 Rather, analysts suggest that China fears that Japanese proliferation would beget Taiwan to renew its long- aborted nuclear weapons... abortive effort to establish...Cabinet Being Reshuffled After Rape Gaffes.” Associated Press, January 8, 2012. http://news.yahoo.com/japan-cabinet-being-reshuffled- rape -gaffes

  16. Cracks in the New Jar: The Limits of Tailored Deterrence

    DTIC Science & Technology

    2011-03-17

    including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services , Directorate for Information Operations and...an action. Deterrence by denial is the threat of successfully defeating an adversary‟s action.4 Another distinction exists between general...influenced by effects-based operations concepts. „Denying benefits‟ and „imposing costs‟ are simply alternate names for deterrence by denial and

  17. Ballistic Missile Defense and Deterrence: Not Mutually Exclusive

    DTIC Science & Technology

    2010-05-12

    Defense History As the deterrence debate raged, the U.S. began developing anti-ballistic missile ( ABM ) systems in the 1960’s. Kahn’s followers...advocated a robust ABM system to protect the entire nation, while Schelling’s camp was opposed to ABM systems, claiming that they were destabilizing and...differing views on the impact of an ABM system on deterrence, as well as the very high costs associate with deploying the system. Developing an

  18. The British Nuclear Deterrent After the Cold War,

    DTIC Science & Technology

    1995-01-01

    collaborative project with France (the Air-Sol Longue Portee, or ASLP). - 37 - Such, then, was the position as Warsaw Pact and Soviet Union...security structure in Europe, while Brooke’s poem 񓞚"--"To turn, as swimmers into cleanness leaping Glad from a world grown old and cold and weary

  19. Extended Nuclear Deterrence for Europe Without Forward-based Weapons

    DTIC Science & Technology

    2012-02-15

    more than 20 years after the end of the Cold War, America still keeps an estimated 150-200 B -61 gravity bombs in host countries for potential delivery...posture today although only a small fraction of this once- comprehensive force mix is still deployed in the form of B -61 gravity bombs and DCA to deliver...relevancy in today’s strategic environment focusing on the current B -61 DCA inherent weaknesses, lack of allied investment and shrinking commitment

  20. Germany and the Future of Nuclear Deterrence in Europe

    DTIC Science & Technology

    1992-12-01

    European leaders can contemplate how to spend peace dividends . So goes the common view.’ The dissolution of the Soviet Union and the unification of...Coulisses de la politique dtrang~re sous la Ve Rdpublique (Paris: Hachette, 1986); quoted in Yost, Strategic Culture, 25. 76 been respected to date.󈧒 The...Lothar Ruihl, La politique militaire de la cinqui~me rdpublique (Paris: Foundation Nationale des Sciences Politiques , 190-191; quoted in David S. Yost

  1. A Primer on U.S. Strategic Nuclear Policy

    SciTech Connect

    KUNSMAN, DAVID M.; LAWSON, DOUGLAS B.

    2001-01-01

    This primer presents a succinct summary of the evolution of U.S. nuclear deterrence policy from the initial development of nuclear weapons until the present day. This is not a definitive history but an introduction to deterrence policy for those with limited background in this area. The concept of deterrence is discussed in several ways--in a general description of deterrence theory, in an historical review of nuclear policy evolution, in a discussion of the future of deterrence, in historical examples of deterrence successes and failures, and in a review of significant contributors to the study of nuclear policy. The intent is to present an authoritative, unclassified account. To accomplish this, to the extent possible, primary source documents were located and utilized if they were available and declassified. These included unclassified Presidential nuclear policy guidance from the Presidential libraries, official JCS histories and State Department Foreign Relations histories. The writings of noted nuclear strategists and historians were also valuable resources for this primer on U.S. strategic nuclear policy.

  2. Contraband Detection with Nuclear Resonance Fluorescence: Feasibility and Impact

    SciTech Connect

    Pruet, J; Lange, D

    2007-01-03

    In this report they show that cargo interrogation systems developed to thwart trafficking of illicit nuclear materials could also be powerful tools in the larger fight against contraband smuggling. In particular, in addition to detecting special nuclear materials, cargo scanning systems that exploit nuclear resonance fluorescence to detect specific isotopes can be used to help find: chemical weapons; some drugs as well as some chemicals regulated under the controlled substances act; precious metals; materials regulated under export control laws; and commonly trafficked fluorocarbons.

  3. Quantitative and qualitative estimates of cross-border tobacco shopping and tobacco smuggling in France.

    PubMed

    Lakhdar, C Ben

    2008-02-01

    In France, cigarette sales have fallen sharply, especially in border areas, since the price increases of 2003 and 2004. It was proposed that these falls were not due to people quitting smoking but rather to increased cross-border sales of tobacco and/or smuggling. This paper aims to test this proposition. Three approaches have been used. First, cigarette sales data from French sources for the period 1999-2006 were collected, and a simulation of the changes seen within these sales was carried out in order to estimate what the sales situation would have looked like without the presence of foreign tobacco. Second, the statements regarding tobacco consumed reported by the French population with registered tobacco sales were compared. Finally, in order to identify the countries of origin of foreign tobacco entering France, we collected a random sample of cigarette packs from a waste collection centre. According to the first method, cross-border shopping and smuggling of tobacco accounted for 8635 tones of tobacco in 2004, 9934 in 2005, and 9930 in 2006, ie, between 14% and 17% of total sales. The second method gave larger results: the difference between registered cigarette sales and cigarettes declared as being smoked was around 12,000 to 13,000 tones in 2005, equivalent to 20% of legal sales. The collection of cigarette packs at a waste collection centre showed that foreign cigarettes accounted for 18.6% of our sample in 2005 and 15.5% in 2006. France seems mainly to be a victim of cross-border purchasing of tobacco products, with the contraband market for tobacco remaining modest. in order to avoid cross-border purchases, an increased harmonization of national policies on the taxation of tobacco products needs to be envisaged by the European Union.

  4. Technologies for detection of nuclear materials

    SciTech Connect

    DeVolpi, A.

    1996-03-30

    Detection of smuggled nuclear materials at transit points requires monitoring unknown samples in large closed packages. This review contends that high-confidence nuclear-material detection requires induced fission as the primary mechanism, with passive radiation screening in a complementary role. With the right equipment, even small quantities of nuclear materials are detectable with a high probability at transit points. The equipment could also be linked synergistically with detectors of other contrabond. For screening postal mail and packages, passive monitors are probably more cost-effective. When a suspicious item is detected, a single active probe could then be used. Until active systems become mass produced, this two-stage screening/interrogation role for active/passive equipment is more economic for cargo at border crossings. For widespread monitoring of nuclear smuggling, it will probably be necessary to develop a system for simultaneously detecting most categories of contraband, including explosives and illicit drugs. With control of nuclear materials at known storage sites being the first line of defense, detection capabilities at international borders could establish a viable second line of defense against smuggling.

  5. The value of vengeance and the demand for deterrence.

    PubMed

    Crockett, Molly J; Özdemir, Yagiz; Fehr, Ernst

    2014-12-01

    Humans will incur costs to punish others who violate social norms. Theories of justice highlight 2 motives for punishment: a forward-looking deterrence of future norm violations and a backward-looking retributive desire to harm. Previous studies of costly punishment have not isolated how much people are willing to pay for retribution alone, because typically punishment both inflicts damage (satisfying the retributive motive) and communicates a norm violation (satisfying the deterrence motive). Here, we isolated retributive motives by examining how much people will invest in punishment when the punished individual will never learn about the punishment. Such "hidden" punishment cannot deter future norm violations but was nevertheless frequently used by both 2nd-party victims and 3rd-party observers of norm violations, indicating that retributive motives drive punishment decisions independently from deterrence goals. While self-reports of deterrence motives correlated with deterrence-related punishment behavior, self-reports of retributive motives did not correlate with retributive punishment behavior. Our findings reveal a preference for pure retribution that can lead to punishment without any social benefits.

  6. The Value of Vengeance and the Demand for Deterrence

    PubMed Central

    2014-01-01

    Humans will incur costs to punish others who violate social norms. Theories of justice highlight 2 motives for punishment: a forward-looking deterrence of future norm violations and a backward-looking retributive desire to harm. Previous studies of costly punishment have not isolated how much people are willing to pay for retribution alone, because typically punishment both inflicts damage (satisfying the retributive motive) and communicates a norm violation (satisfying the deterrence motive). Here, we isolated retributive motives by examining how much people will invest in punishment when the punished individual will never learn about the punishment. Such “hidden” punishment cannot deter future norm violations but was nevertheless frequently used by both 2nd-party victims and 3rd-party observers of norm violations, indicating that retributive motives drive punishment decisions independently from deterrence goals. While self-reports of deterrence motives correlated with deterrence-related punishment behavior, self-reports of retributive motives did not correlate with retributive punishment behavior. Our findings reveal a preference for pure retribution that can lead to punishment without any social benefits. PMID:25285429

  7. Safeguards Issues at Nuclear Reactors and Enrichment Plants

    SciTech Connect

    Boyer, Brian D

    2012-08-15

    The Agency's safeguards technical objective is the timely detection of diversion of significant quantities of nuclear material from peaceful nuclear activities to the manufacture of nuclear weapons or of other nuclear explosive devices or for purposes unknown, and deterrence of such diversion by the risk of early detection.

  8. Trends & Controversies: Sociocultural Predictive Analytics and Terrorism Deterrence

    SciTech Connect

    Sanfilippo, Antonio P.; McGrath, Liam R.

    2011-08-12

    The use of predictive analytics to model terrorist rhetoric is highly instrumental in developing a strategy to deter terrorism. Traditional (e.g. Cold-War) deterrence methods are ineffective with terrorist groups such as al Qaida. Terrorists typically regard the prospect of death or loss of property as acceptable consequences of their struggle. Deterrence by threat of punishment is therefore fruitless. On the other hand, isolating terrorists from the community that may sympathize with their cause can have a decisive deterring outcome. Without the moral backing of a supportive audience, terrorism cannot be successfully framed as a justifiable political strategy and recruiting is curtailed. Ultimately, terrorism deterrence is more effectively enforced by exerting influence to neutralize the communicative reach of terrorists.

  9. Extended Deterrence and Allied Assurance: Key Concepts and Current Challenges for U.S. Policy

    DTIC Science & Technology

    2013-09-01

    Deterrence and Assurance Strategies 135 NATO/ Europe 136 Extended Deterrence 136 Assurance 139 Key Issues for NATO Extended Deterrence and...regional stability and strongly influence the national security strategies of both allies and adversaries. From the Asia-Pacific to Europe , however...to defending free access to international waters , outer space, and cyber space. Current Issues, Challenges, and Regional Considerations These

  10. Changing nature of Chinese nuclear strategy

    SciTech Connect

    Markov, D.R.; Huill, A.W.

    1997-01-01

    Traditionally, analysts have believed that China was only interested in pursuing a minimalist, counter-value nuclear strategy that aimed at achieving strategic deterrence. This paper examines the possibility that Chinese nuclear strategy is changing in several ways: (1) it is moving to embrace a nuclear warfighting approach that encompasses tactical, theater, and strategic nuclear weapons, and (2) it is moving from a counter-value to a counter-force strategic nuclear posture.

  11. The long postwar and the politics of penicillin: early circulation and smuggling in Spain, 1944-1954.

    PubMed

    Santesmases, María Jesús

    2014-01-01

    In this paper I explore the early circulation of penicillin. I review the early distribution in Spain of a scarce product, reflect on the available sources about the illegal penicillin trade and discuss some cases of smuggling. I argue the early distribution of penicillin involved time and geography, a particular chronology of post Second World War geopolitics. Penicillin practices and experiences belong to this period, in a dictatorship that tolerated smuggling and illegal trade of other products, some, like penicillin, produced in neighbouring countries. As a commodity that crossed borders, penicillin, transiting between the law and hidden trade, between countries and social domains--between war fronts and from a war front to an urban site to be sold--reveals practices of the early years of prosperity in the 1950s. These transits were permanent tests of a society based on taxes and exchanges, law and bureaucracy, control, discipline and the creation of standards.

  12. The case for eliminating battlefield nuclear weapons

    SciTech Connect

    Sigal, L.V.

    1989-09-01

    The primary reasons for the elimination of NATO's BNW are two. First, BNW are superfluous for deterrence. Other weapons are better suited for that purpose. Second, and more important, any deployment of nuclear weapons in Western Europe necessarily involves three critical trade-offs: a trade-off between deterrence and reassurance in peacetime, a trade-off between deterrence and crisis stability in times of high political tension, and a trade-off between deterrence and controlled use in war. Whatever purpose BNW purportedly serve as deterrents come at a disproportionate cost to peacetime reassurance, crisis stability, and wartime control. The continued presence of BNW in Western Europe is hard to explain in rational terms; it is more readily explicable by organizational and political inertia. To see why continued inertia is dangerous, the author first examine briefly the military purposes that nuclear weapons allegedly serve for NATO - that is, what they are said to deter and how. Then, he examines the paradoxes in the logic of deterrence of conventional attack in Europe and, flowing from those paradoxes, the critical policy dilemmas posed by BNW. Next, and fundamental to the discussion, he raises the critical organizational and political predicaments that any coherent strategy for continued deployment of these weapons must overcome. Finally, he discusses the political ramifications of keeping these weapons in place.

  13. Nuclear Detection. Preliminary Observations on the Domestic Nuclear Detection Office’s Efforts to Develop a Global Nuclear Detection Architecture

    DTIC Science & Technology

    2008-07-16

    materials that could be used to produce a device that uses conventional explosives with radioactive material (known as a “dirty bomb”). Past confirmed...detectors (known as pagers), and radioactive isotope identifiers at U.S. ports of entry. All radiation detection devices have limitations in their...In a report on preventing nuclear smuggling, we found that a cargo container containing a radioactive source was not detected as it passed through

  14. Technical approaches to reducing the threat of nuclear terrorism

    NASA Astrophysics Data System (ADS)

    Priedhorsky, William C.

    2005-04-01

    The threat of a nuclear attack on the United States by terrorists using a smuggled weapon is now considered more likely than an attack by a nuclear-armed ballistic missle. Consequently it is important to understand what can be done to detect and intercept a nuclear weapon being smuggled into the United States. A significant quantity of smuggled nuclear material has been intercepted already, but science and technology have so far contributed little to its interception. The critical special nuclear materials, plutonium and highly enriched uranium, are only weakly radioactive and detection of their radioactivity is limited both by atmospheric attenuation and by competition with natural backgrounds. Although many schemes for long-range detection of radioactivity have been proposed, none so far appears feasible. Detection of nuclear radiation can be improved using new technologies and sensing systems, but it will still be possible only at relatively small distances. Consequently the best approach to containing dangerous nuclear materials is at their sources; containment within lengthy borders and large areas is extremely difficult.

  15. Boldness and predator deterrence: a critique of Godin & Davis.

    PubMed

    Milinski, M; Boltshauser, P

    1995-10-23

    Godin & Davis (1995) claimed to have provided experimental evidence for a predator pursuit deterrence function of predator inspection in the guppy. We doubt that they have shown that inspection behaviour per se deters attack because their evidence is actually correlational and thus inherently ambiguous; furthermore we think their methods are flawed.

  16. Applying Deterrence Strategy to Agents of Asymmetrical Threats

    DTIC Science & Technology

    2014-09-01

    Strategy, Disruptive Technology , Tailored Deterrence, Terrorist Psychology 15. NUMBER OF PAGES 151 16. PRICE CODE 17. SECURITY CLASSIFICATION...SYSTEMS ..................................... 104 C. MODERN TERRORISM AS DISRUPTIVE TECHNOLOGY ............ 106 D. STRATEGIZING BEYOND TECHNOLOGY ...the information might prove to be of greater use considering the consistency with the “ garbage out” portion of what makes the terrorist tick, in

  17. ISRAELI DETERRENCE AND THE 2ND LEBANON WAR

    DTIC Science & Technology

    2017-04-06

    It does not fit the challenges of a counterterrorism campaign.28 Wilner and Wagner argue for the ineffectiveness of deterrence focused on... Wagner and Alex Wilner. California: Stanford University Press, 2012. Lebovic, James H. Deterring International Terrorism and Rogue States: US

  18. Arthropod deterrents from Artemisia pallens (Davana oil) components

    USDA-ARS?s Scientific Manuscript database

    Davanone, a key sesquiterpene component of davana oil, has been synthesized in five convenient steps. Oxygenated sesquiterpenes have been linked to insect deterrent properties. Based on initial screening of davana oil, davanone and its hydroxy precursors have been generated and are being evaluated...

  19. 2015 Cross-Domain Deterrence Seminar Summary Report

    SciTech Connect

    Juarez, A.

    2016-01-11

    Lawrence Livermore National Laboratory (LLNL) hosted the 2nd Annual Cross-Domain Deterrence Seminar on November 17th, 2015 in Livermore, CA. The seminar was sponsored by LLNL’s Center for Global Security Research (CGSR), National Security Office (NSO), and Global Security program. This summary covers the seminar’s panels and subsequent discussions.

  20. The Effect of Suspension as a Deterrent to Student Misconduct

    ERIC Educational Resources Information Center

    Jackson, Angela Coleman

    2014-01-01

    The purpose of this study was to examine the effect of suspension as a deterrent to student misconduct. A mixed methods approach using both qualitative (interviews of administrators and teachers) and quantitative (discipline records of identified sixth graders) were utilized. In this case study approach, one-on-one semi-structured interviews were…

  1. 75 FR 21571 - Marine Mammal Protection Act; Deterrence Guidelines

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-26

    ... supervision. We are proposing these guidelines to reduce occurrences of bear-human interactions with only... deterrence have proven to reduce the possibility of bear-human interactions escalating into potentially... reduce the likelihood of bear-human interactions. Polar bears are generally found in the...

  2. Give Deterrence a Chance: A Strategy Against Al Qaeda

    DTIC Science & Technology

    2007-03-28

    Al Qaeda Terrorists have been described as sociopaths , narcissists, fanatics, extremists, zealots, true-believers, jihadists or demented criminals...If terrorists are sociopaths or other deviants (and it is probable that some are), then it is unlikely that deterrence with its reliance on rational

  3. Deterrents to Women's Participation in Continuing Professional Development

    ERIC Educational Resources Information Center

    Chuang, Szu-Fang

    2015-01-01

    This study was designed to explore and define key factors that deter women from participating in continuing professional development (CPD) in the workplace. Four dimensions of deterrents that are caused by women's social roles, gender inequality and gender dimensions are discussed: family and time constraints, cost and work constraints, lack of…

  4. Deterrents to Women's Participation in Continuing Professional Development

    ERIC Educational Resources Information Center

    Chuang, Szu-Fang

    2015-01-01

    This study was designed to explore and define key factors that deter women from participating in continuing professional development (CPD) in the workplace. Four dimensions of deterrents that are caused by women's social roles, gender inequality and gender dimensions are discussed: family and time constraints, cost and work constraints, lack of…

  5. E-Cigarettes Not a Smoking Deterrent for Kids

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_163191.html E-Cigarettes Not a Smoking Deterrent for Kids Study finds ' ... 23, 2017 (HealthDay News) -- There's no evidence that e-cigarettes are driving down teen smoking -- and, in fact, ...

  6. Evaluating and Quantifying the Specific Deterrent Effects of DNA Databases.

    PubMed

    Bhati, Avinash; Roman, Caterina G

    2014-02-01

    Today, the ability of deoxyribonucleic acid (DNA) evidence to place persons at crime scenes with near certainty is broadly accepted by criminal investigators, courts, policy makers, and the public. However, the public safety benefits of investments in DNA databases are largely unknown and research attempting to quantify these benefits is only gradually emerging. Given the inherent difficulty in randomly assigning offenders to treatment and comparison groups for the purpose of inferring specific deterrence and probative effects (PREs) of DNA databases, this study developed an alternate strategy for extracting these effects from transactional data. Reoffending patterns of a large cohort of offenders released from the Florida Department of Corrections custody between 1996 and 2004 were analyzed across a range of criminal offense categories. First, an identification strategy using multiple clock models was developed that linked the two simultaneous effects of DNA databases to different clocks measuring the same events. Then, a semiparametric approach was developed for estimating the models. The estimation models yielded mixed results. Small deterrent effects-2-3% reductions in recidivism risk attributable to deterrence-were found only for robbery and burglary. However, strong PREs-20-30% increase in recidivism risk attributable to PREs-were uncovered for most offense categories. The probative and deterrent effects of DNA databases can be elucidated through innovative semiparametric models. © The Author(s) 2014.

  7. Reactive Black 5 dye degradation using filters of smuggled cigarette modified with Fe(3).

    PubMed

    Glugoski, Letícia Polli; de Jesus Cubas, Paloma; Fujiwara, Sérgio Toshio

    2017-03-01

    This study presents an attempt to solve two serious environmental problems: the generation of toxic effluents and solid waste disposal. The work proposes recycling cigarette filters with the purpose of degrading reactive dyes, which are used in the textile industry. Filters of smuggled cigarettes were recycled through Fe(3+) immobilization on their surface. The material obtained was characterized through Fourier transform infrared spectroscopy (FTIR), atomic absorption spectroscopy (AAS), scanning electron microscopy-energy-dispersive spectroscopy (SEM-EDS), and ultraviolet-visible spectroscopy (UV-vis). The factorial design revealed that the most suitable conditions for the degradation of Reactive Black 5 dye were obtained by using 1 g of material at pH 3.0 in a 100 mg L(-1) hydrogen peroxide solution. The material showed excellent performance in the Reactive Black 5 dye degradation process; in 60 min, 99.09 % dye was removed. At pH 7.0, the dye degradation was 72.67 %, indicating that the material prepared can be used at pH values greater than 3.0 without the occurrence of hydrated Fe(3+) oxide precipitation. Furthermore, the material showed no loss of catalytic activity after three degradation studies.

  8. International cooperation in combating illicit trafficking of nuclear materials by technical means

    SciTech Connect

    Herbillon, J; Koch, L; Mason, G; Niemeyer, S; Nikiforov, N

    1999-04-01

    A consensus has been emerging during the past several years that illicit trafficking of nuclear materials is a problem that needs a more focused international response. One possible component of a program to combat illicit trafficking is nuclear forensics whereby intercepted nuclear materials are analyzed to provide clues for answering attribution questions. In this report we focus on international cooperation that is specifically addressing the development of nuclear forensics. First we will describe the role of the Nuclear Smuggling International Technical Working Group (ITWG) in developing nuclear forensics, and then we will present some specific examples of cooperative work by the Institute for Transuranium Elements of the European Commission with various European states. Recognizing the potential importance of a nuclear forensics capability, the P-8 countries in 1995 encouraged technical experts to evaluate the role of nuclear forensics in combating nuclear smuggling and possibly developing mechanisms for international cooperation. As a result, an International Conference on Nuclear Smuggling Forensic Analysis was held in November, 1995, at Lawrence Livermore National Laboratory to investigate technical cooperation on nuclear forensics. The International Conference provided a unique mix of scientists, law enforcement, and intelligence experts from 14 countries and organizations. All participants were invited to make presentations, and the format of the Conference was designed to encourage open discussion and broad participation.

  9. Quantification of the Deterrent Effect of Radiation Portal Monitors Using a Decision Theory Model

    SciTech Connect

    Heasler, Patrick G.; Wood, Thomas W.

    2005-04-28

    Operation of radiation portal monitors (RPMs) can be modeled as a two-person game, with the RPM operator attempting to detect any nuclear weapon passing through the portal, while the opponent tries to pass it through undetected. A key element in the defender's decision strategy is the detection algorithm he employs, while a key element of the opponent's strategy is the threat density he employs. This article constructs a game-theoretic formulation for RPM operation and calculates the ''best'' strategy for each player, called the Minimax strategy. This solution allows one to quantify the deterrent effect that the inspection system has on the opponent--that is, the reduction in threat density due to use of the system.

  10. Teaching on Science, Technology and the Nuclear Arms Race.

    ERIC Educational Resources Information Center

    Schroeer, Dietrich

    1983-01-01

    Describes a course focusing on science, technology, and the nuclear arms race. Two sample homework exercises and course topics are provided. Topics, with lists of questions that might be addressed, focus on nuclear weapons, alternatives to deterrence, and arms control. Approaches to teaching about the nuclear arms race are also provided. (JN)

  11. The role of nuclear weapons in the year 2000

    SciTech Connect

    Not Available

    1990-01-01

    This publication presents the proceedings for the workshop, The Role of Nuclear Weapons in the Year 2000, held on October 22--24, 1990. The workshop participants considered the changing nature of deterrence and of our strategic relationship with the Soviet Union, the impact of nuclear proliferation on regional conflicts, and ways that the nuclear forces might be restructured to reflect new political circumstances.

  12. Nuclear Strategy and World Order: The United States Imperative.

    ERIC Educational Resources Information Center

    Beres, Louis Rene

    The current U.S. nuclear strategy goes beyond the legitimate objective of survivable strategic forces to active preparation for nuclear war. The Reagan administration strategy rejects minimum deterrence and prepares for a nuclear war that might be protracted and controlled. The strategy reflects the understanding that a combination of counterforce…

  13. Teaching on Science, Technology and the Nuclear Arms Race.

    ERIC Educational Resources Information Center

    Schroeer, Dietrich

    1983-01-01

    Describes a course focusing on science, technology, and the nuclear arms race. Two sample homework exercises and course topics are provided. Topics, with lists of questions that might be addressed, focus on nuclear weapons, alternatives to deterrence, and arms control. Approaches to teaching about the nuclear arms race are also provided. (JN)

  14. Nuclear Strategy and World Order: The United States Imperative.

    ERIC Educational Resources Information Center

    Beres, Louis Rene

    The current U.S. nuclear strategy goes beyond the legitimate objective of survivable strategic forces to active preparation for nuclear war. The Reagan administration strategy rejects minimum deterrence and prepares for a nuclear war that might be protracted and controlled. The strategy reflects the understanding that a combination of counterforce…

  15. The Nuclear Posture Review (NPR) : are we safer?

    SciTech Connect

    Brune, Nancy E.

    2010-07-01

    Nuclear Posture Review (NPR) is designed to make world safer by reducing the role of U.S. nuclear weapons and reducing the salience of nuclear weapons. U.S. also seeks to maintain a credible nuclear deterrent and reinforce regional security architectures with missile defenses and other conventional military capabilities. But recent studies suggest that nuclear proliferation is a direct response to the perceived threat of U.S. conventional capabilities not U.S. nuclear stockpile. If this is true, then the intent of the NPR to reduce the role and numbers of nuclear weapons and strengthen conventional military capabilities may actually make the world less safe. First stated objective of NPR is to reduce the role and numbers of U.S. nuclear weapons, reduce the salience of nuclear weapons and move step by step toward eliminating them. Second stated objective is a reaffirmation of U.S. commitment to maintaining a strong deterrent which forms the basis of U.S. assurances to allies and partners. The pathway - made explicit throughout the NPR - for reducing the role and numbers of nuclear weapons while maintaining a credible nuclear deterrent and reinforcing regional security architectures is to give conventional forces and capabilities and missile defenses (e.g. non-nuclear elements) a greater share of the deterrence burden.

  16. Search for sanity: The politics of nuclear weapons and disarmament

    SciTech Connect

    Joseph, P.; Rosenblum, S.

    1984-01-01

    This book examines the political aspects of nuclear weapons and arms control. Topics considered include nuclear deterrence, military strategy, the military-industrial complex, the nuclear balance, first strike, nuclear errors and accidents, treaty verification, survival, the economic impact of military spending, Western European peace movements, peace movements in Eastern Europe, the cold war, nuclear diplomacy, moral aspects, the defense budget, national security, foreign policy, proliferation, and nuclear disarmament.

  17. Language and the nuclear arms debate: Nukespeak today

    SciTech Connect

    Not Available

    1985-01-01

    This book presents papers on the political, cultural and ethical aspects of nuclear weapons. Topics considered include language and ideology, the pragmatics of speeches against the peace movement in Britain, the rhetoric of national defense in the US, pro-nuclear arguments, nuclear deterrence, the media's coverage of anti-nuclear demonstrations, news reports, an analysis of the television film The Day After, nuclear disarmament, an analysis of anti-nuclear humor, psychological models, and sociological models.

  18. Oesophageal chemoreceptors of blue crabs, Callinectes sapidus, sense chemical deterrents and can block ingestion of food.

    PubMed

    Aggio, Juan F; Tieu, Ryan; Wei, Amy; Derby, Charles D

    2012-05-15

    Decapod crustaceans such as blue crabs possess a variety of chemoreceptors that control different stages of the feeding process. All these chemoreceptors are putative targets for feeding deterrents that cause animals to avoid or reject otherwise palatable food. As a first step towards characterizing the chemoreceptors that mediate the effect of deterrents, we used a behavioral approach to investigate their precise location. Data presented here demonstrate that chemoreceptors located on the antennules, pereiopods and mouthparts do not mediate the food-rejection effects of a variety of deterrents, both natural and artificial to crabs. Crabs always searched for deterrent-laced food and took it to their oral region. The deterrent effect was manifested as either rejection or extensive manipulation, but in both cases crabs bit the food. The biting behavior is relevant because the introduction of food into the oral cavity ensured that the deterrents gained access to the oesophageal taste receptors, and so we conclude that they are the ones mediating rejection. Additional support comes from the fact that a variety of deterrent compounds evoked oesophageal dilatation, which is mediated by oesophageal receptors and has been linked to food rejection. Further, there is a positive correlation between a compound's ability to elicit rejection and its ability to evoke oesophageal dilatation. The fact that deterrents do not act at a distance is in accordance with the limited solubility of most known feeding deterrents, and likely influences predator-prey interactions and their outcome: prey organisms will be attacked and bitten before deterrents become relevant.

  19. Changing Requirements of Assurance and Extended Deterrence

    DTIC Science & Technology

    2010-07-01

    Delano Roosevelt to Jimmy Carter. • As a matter of strategic culture in the Arab world, treaties are not given much credit, as the historical record...interests, shared memories and experiences, compatible values, appreciation of institutional processes, and the ever-changing vagaries of personality...it had twice in living memory . Most policy and military planners realized that the Kremlin’s acquisition of nuclear weapons was simply a matter of

  20. Nonproliferation, arms control and disarmament and extended deterrence in the new security environment

    SciTech Connect

    Pilat, Joseph F

    2009-01-01

    With the end of the Cold War, in a dramatically changed security environment, the advances in nonnuclear strategic capabilities along with reduced numbers and roles for nuclear forces has altered the calculus of deterrence and defense, at least for the United States. For many, this opened up a realistic possibility of a nuclear-free world. It soon became clear that the initial post-Cold War hopes were exaggerated. The world did change fundamentally, but it did not become more secure and stable. In place of the old Soviet threat, there has been growing concern about proliferation and terrorism involving nuclear and other weapons of mass destruction (WMD), regional conflicts, global instability and increasingly serious new and emerging threats, including cyber attacks and attacks on satellites. For the United States at least, in this emerging environment, the political rationales for nuclear weapons, from deterrence to reassurance to alliance management, are changing and less central than during the Cold War to the security of the United States, its friends and allies. Nuclear weapons remain important for the US, but for a far more limited set of roles and missions. As the Perry-Schlesinger Commission report reveals, there is a domestic US consensus on nuclear policy and posture at the highest level and for the near term, including the continued role of nuclear arms in deterring WMD use and in reassuring allies. Although the value of nuclear weapons has declined for the United States, the value of these weapons for Russia, China and so-called 'rogue' states is seen to be rising. The nuclear logic of NATO during Cold War - the need for nuclear weapons to counter vastly superior conventional capabilities of the Soviet Union and the Warsaw Pact - is today heard from Russians and even some proliferants. Moreover, these weapons present a way for rogues to achieve regional hegemony and possibly to deter interventions by the United States or others. While the vision of a

  1. Non-Strategic Nuclear Targeting in a Non-Nuclear Army

    DTIC Science & Technology

    1994-06-03

    The principal deficiencies are found to be inadequate nuclear training throughout the officer education system and an unsatisfactory vision for nuclear...training throughout the officer education system and an unsatisfactory vision for nuclear operations in principal doctrinal manuals, such as FM 100-5...effective and responsive targeting methodology. An effective nuclear targeting system Is surely a more credible deterrent than an ineffective system , and if

  2. Aedes aegypti (Diptera: Culicidae) Biting Deterrence: Structure-Activity Relationship of Saturated and Unsaturated Fatty Acids

    DTIC Science & Technology

    2012-11-01

    VECTOR CONTROL, PEST MANAGEMENT, RESISTANCE, REPELLENTS Aedes aegypti (Diptera: Culicidae) Biting Deterrence: Structure- Activity Relationship of...deterrent effects of a series of saturated and unsaturated fatty acids against Aedes aegypti (L), yellow fever mosquito (Diptera: Culicidae) using theK...corresponding C12:0 and C12:1 homologues. KEYWORDS fatty acid, biting deterrence, repellent, structure-activity relationship, Aedes aegypti Mosquitoes transmit

  3. Abuse-deterrent formulations, an evolving technology against the abuse and misuse of opioid analgesics.

    PubMed

    Schaeffer, Tammi

    2012-12-01

    The increased use of opioid pain medication has been mirrored by the increased misuse and abuse of these drugs. As part of a multidisciplinary approach to this epidemic, pharmaceutical companies, with the encouragement of the Food and Drug Administration, have increased the development of abuse-deterrent formulations. While all have the goal of treating pain while mitigating misuse and abuse, there are different technologies utilized to impart the abuse-deterrent properties. The goal of this paper is to review the basis of abuse-deterrent formulations, the different types and approaches of some of the abuse-deterrent products, and their current regulatory status in the USA.

  4. Nuclear weapons and medicine: some ethical dilemmas.

    PubMed

    Haines, A; de B White, C; Gleisner, J

    1983-12-01

    The enormous destructive power of present stocks of nuclear weapons poses the greatest threat to public health in human history. Technical changes in weapons design are leading to an increased emphasis on the ability to fight a nuclear war, eroding the concept of deterrence based on mutually assured destruction and increasing the risk of nuclear war. Medical planning and civil defence preparations for nuclear war have recently been increased in several countries although there is little evidence that they will be of significant value in the aftermath of a nuclear conflict. These developments have raised new ethical dilemmas for those in health professions. If there is any risk of use of weapons of mass destruction, then support for deterrence with these weapons as a policy for national or global security appears to be incompatible with basic principles of medical ethics and international law. The primary medical responsibility under such circumstances is to participate in attempts to prevent nuclear war.

  5. Nuclear weapons and medicine: some ethical dilemmas.

    PubMed Central

    Haines, A; de B White, C; Gleisner, J

    1983-01-01

    The enormous destructive power of present stocks of nuclear weapons poses the greatest threat to public health in human history. Technical changes in weapons design are leading to an increased emphasis on the ability to fight a nuclear war, eroding the concept of deterrence based on mutually assured destruction and increasing the risk of nuclear war. Medical planning and civil defence preparations for nuclear war have recently been increased in several countries although there is little evidence that they will be of significant value in the aftermath of a nuclear conflict. These developments have raised new ethical dilemmas for those in health professions. If there is any risk of use of weapons of mass destruction, then support for deterrence with these weapons as a policy for national or global security appears to be incompatible with basic principles of medical ethics and international law. The primary medical responsibility under such circumstances is to participate in attempts to prevent nuclear war. PMID:6668585

  6. Random patterns and biometrics for counterfeit deterrence

    SciTech Connect

    Tolk, K.M.

    1993-12-31

    Sandia National Laboratories (SNL) has been working on non-counterfeitable seals, tags, and documents for over fifteen years. During that time, several technologies have been developed that can be applied to deter counterfeiting of identification documents such as ID cards, passports, and possibly credit cards. Two technologies are presented in some detail. The first is reflective particle tagging technology that was developed to help verify treaties limiting the numbers of nuclear weapons that participating parties may possess. This approach uses the random locations and orientations of reflective particles applied to the surface of an item to uniquely identify the item. The resulting tags are secure against even the most determined adversaries. The second technology uses biometric information printed on the document and public key cryptography to ensure that an adversary cannot issue identification documents to unauthorized individuals.

  7. Isolation and characterization of an H10N7 avian influenza virus from poultry carcasses smuggled from China into Italy.

    PubMed

    Serena Beato, Maria; Terregino, Calogero; Cattoli, Giovanni; Capua, Ilaria

    2006-10-01

    Intensified official veterinary controls on warehouses supplying Chinese retailers resulted in the seizure of smuggled poultry products. Frozen and vacuum-packed frozen raw duck and chicken carcasses, and anatomic parts (legs) of these species, were collected and processed for laboratory investigations aiming at the detection of avian influenza virus. Real-time reverse transcription-polymerase chain reaction (RRT-PCR) targeting the M gene, performed on the lung and trachea from duck and chicken carcasses, yielded positive results. Virus isolation attempts in specific pathogen free embryonated eggs yielded an H10N7 virus from the duck carcass. The isolate had an intravenous pathogenicity index of 0.0, and phylogenetic analysis revealed a nucleotide homology of 97 and 96% with virus A/duck/Zhejiang/52/2000 (H5N1) for the PB2 and NS genes, respectively. The results of this study indicate that low-pathogenicity avian influenza viruses may be introduced into a country through trade of carcasses regardless of the non-systemic nature of this disease. The export ban applied to countries affected by the H5N1 epidemic may result in increased smuggling of poultry products, which remains one of the means by which influenza viruses can cross-national boundaries. Increased surveillance at borders and at a national level is recommended.

  8. A CONCEPT FOR NATIONAL NUCLEAR FORENSIC LIBRARIES

    SciTech Connect

    Wacker, John F.; Curry, Michael

    2010-08-11

    The interpretation of data from the nuclear forensic analysis of illicit nuclear material of unknown origin requires comparative data from samples of known origin. One way to provide such comparative data is to create a system of national nuclear forensics libraries, in which each participating country stores information about nuclear or other radioactive material that either resides in or was manufactured by that country. Such national libraries could provide an authoritative record of the material located in or produced by a particular country, and thus forms an essential prerequisite for a government to investigate illicit uses of nuclear or other radioactive material within its borders. We describe the concept of the national nuclear forensic library, recommendations for content and structure, and suggested querying methods for utilizing the information for addressing nuclear smuggling.

  9. Nuclear Weapons Complex reconfiguration study

    SciTech Connect

    Not Available

    1991-01-01

    Shortly after assuming duties as Secretary of Energy, I reviewed the Nuclear Weapons Complex Modernization Report'' submitted to the Congress in January 1989 as required by the National Defense Authorization Act of 1988 and 1989. My review showed that several of the report's assumptions needed to be re-evaluated. During this eighteen-month review, dramatic world changes forced further reassessments of the future Nuclear Weapons Complex. These changes are reflected in the new report. The new report presents a plan to achieve a reconfigured complex, called Complex-21. Complex-21 would be smaller, less diverse, and less expensive to operated than the Complex of today. Complex-21 would be able to safely and reliability support nuclear deterrent stockpile objectives set forth by the President and funded by the Congress. It would be consistent with realities of the emerging international security environment and flexible enough to accommodate the likely range of deterrent contingencies. In addition, Complex-21 would be constructed and operated to comply with all applicable federal, state, and local laws, regulations, and orders. Achieving Complex-21 will require significant resources. This report provides and organized approach toward selecting the most appropriate configuration for Complex-21, satisfying environmental requirements, and minimizing costs. The alternative -- to continue to use piecemeal fixes to run an antiquated complex -- will be more expensive and provide a less reliable Nuclear Weapons Complex. As a consequence, implementation of the Complex-21 plan is considered necessary to ensure continued viability of our nuclear deterrent.

  10. Controlling Threats to Nuclear Security: A Hollistic Model

    DTIC Science & Technology

    1997-06-01

    located at Chelyabinsk-65 (Mayak), Tomsk-7, and Krasnoyarsk-26. In addition, there were two tritium production reactors. By 1994, between three and... tritium were still operational in 1996. At Krasnoyarsk, one of three production reactors continues to operate; the other two were shut down in 1994...be available around the year 2000. Although not pertinent in the discussion of nuclear materials that are likely to be stolen or smuggled, tritium

  11. Ethics and Nuclear Arms: European and American Perspectives.

    ERIC Educational Resources Information Center

    English, Raymond, Ed.

    In these 10 essays, 5 European and 5 American political and religious leaders examine the ethics of possessing and using nuclear weapons. They appraise the policy of nuclear deterrence. Protestant and Catholic viewpoints are represented. There are disagreements on details and differences in emphasis on positions and policies. There is general…

  12. Integration of conventional and nuclear: What does it mean?

    SciTech Connect

    Manzo, Vincent A.; Miles, Aaron R.

    2016-08-04

    In October 2015, Secretary of Defense Carter called for NATO to better integrate conventional and nuclear deterrence. Four months later, Assistant Secretary of Defense Robert Scher stated in Senate testimony that the DoD is "working to ensure an appropriate level of integration between nuclear and conventional planning and operations."

  13. Ethics and Nuclear Arms: European and American Perspectives.

    ERIC Educational Resources Information Center

    English, Raymond, Ed.

    In these 10 essays, 5 European and 5 American political and religious leaders examine the ethics of possessing and using nuclear weapons. They appraise the policy of nuclear deterrence. Protestant and Catholic viewpoints are represented. There are disagreements on details and differences in emphasis on positions and policies. There is general…

  14. Post Cold War Nuclear Weapons Policy

    DTIC Science & Technology

    2012-03-20

    are unknown.”14 This instability threatens the success and future of the NPT. According to scholar Joseph F. Pilat , While the vision of a nuclear...for the Study of Weapons of Mass Destruction, April 2007. 15 Joseph F. Pilat , “Nonproliferation, Arms Control and Disarmament, and ExtendedDeterrence

  15. Deterrence, Lily Pads, And Regionally Aligned Forces: Keys To The Successful Application Of Strategic Landpower

    DTIC Science & Technology

    2016-05-26

    Deterrence, Lily Pads, and Regionally Aligned Forces...COVERED (From - To) Master’s Thesis 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Deterrence, Lily Pads and Regionally Aligned Forces: Keys to the...unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT The US military uses prepositioned stocks located in Western Germany in conjunction with regionally

  16. The Logic of Integrating Conventional and Nuclear Planning [Integration of conventional and nuclear: What does it mean?

    DOE PAGES

    Manzo, Vincent A.; Miles, Aaron R.

    2016-10-31

    In October 2015, Secretary of Defense Carter called for NATO to better integrate conventional and nuclear deterrence. Four months later, Assistant Secretary of Defense Robert Scher stated in Senate testimony that the DoD is "working to ensure an appropriate level of integration between nuclear and conventional planning and operations."

  17. A Study on the Failure of Conventional Deterrence: The Case Study of the Bombardment of Yeonpyeong in 2010

    DTIC Science & Technology

    2016-12-01

    fear of punishment dominates; deterrence always relevant May or may not be, depending on structure of relationship Success /failure Clear...the Yeonpyeong bombardment. The thesis finds that most of the criteria for successful conventional deterrence were absent prior to the Yeonpyeong...bombardment. The thesis finds that most of the criteria for successful conventional deterrence were absent prior to the Yeonpyeong bombardment

  18. Deterrence Theory and the Role of Shame in Projected Offending of College Students against a Ban on Alcohol

    ERIC Educational Resources Information Center

    Kelley, Margaret S.; Fukushima, Miyuki; Spivak, Andrew L.; Payne, David

    2009-01-01

    In the present study we advance previous research in deterrence theory by examining the perceived deterrent effects of a newly instituted dry policy on a college campus. A survey of 500 full-time undergraduate students between the ages of 18 and 26 was conducted 3 months following the ban on alcohol. Hypotheses are derived from deterrence theory…

  19. Deterrence Theory and the Role of Shame in Projected Offending of College Students against a Ban on Alcohol

    ERIC Educational Resources Information Center

    Kelley, Margaret S.; Fukushima, Miyuki; Spivak, Andrew L.; Payne, David

    2009-01-01

    In the present study we advance previous research in deterrence theory by examining the perceived deterrent effects of a newly instituted dry policy on a college campus. A survey of 500 full-time undergraduate students between the ages of 18 and 26 was conducted 3 months following the ban on alcohol. Hypotheses are derived from deterrence theory…

  20. ''Whither Deterrence?'' Final Report of the 2001 Futures Project

    SciTech Connect

    Poppe, C; Vergino, E; Barker, R; Brown, P; Gilmartin, T J; Nacht, M; Sloss, L

    2002-05-01

    This study began in April of 2001 to address the question of what deterrence should look like in the future. This section presents a brief synopsis of the study--a longer, more comprehensive report follows. This study presents four futures as a tool for planners who must think ahead fifteen years or more, rather than a prediction of the future. None of the four futures will emerge in just the way that has been described. Fifteen years from now, some mix of these futures is more likely, or perhaps we will see a trend toward one future, but with the possibility that any of the other three could appear, perhaps quite swiftly.

  1. Potential feeding deterrents found in hemlock woolly adelgid, Adelges tsugae

    NASA Astrophysics Data System (ADS)

    Jones, Anne C.; Mullins, Donald E.; Jones, Tappey H.; Salom, Scott M.

    2012-07-01

    The nonnative hemlock woolly adelgid ( Adelges tsugae Annand, Hemiptera: Sternorrhyncha: Adelgidae) has been a significant mortality agent of eastern hemlock ( Tsuga canadensis Carriere) throughout a large portion of its geographic range. During a study investigating adelgid vigor in relation to host health, it was noted that adelgid extracts ranged from a yellow to a deep red color. Analysis by GC-MS identified the presence of the anthraquinone, chrysophanol and its anthrone precursor, chrysarobin in the extract. These compounds are predator deterrents in several other insects, including chrysomelid beetles. It is hypothesized that these compounds serve a similar purpose in the hemlock woolly adelgid.

  2. Coercive Nuclear Campaigns in the 21st Century: Understanding Adversary Incentives and Options for Nuclear Escalation

    DTIC Science & Technology

    2013-01-01

    culture   frequently   portrays   nuclear   weapons   as   uncontrollably...episodes,   facilitating   coercion.     In   our   popular   culture ,   nuclear   weapons  are  incredibly  blunt  tools...of  deterrence  dismiss  the  likelihood  of  intentional  nuclear  attack  by  one  state  on   anther ,

  3. Ending a nuclear war

    SciTech Connect

    Cimbala, S.J.; Douglass, J.D.

    1988-01-01

    Western strategic concepts have had their own built-in images of nuclear war. These concepts concentrate largely upon the uncertainties of mass nuclear exchanges and the unbelievable devastation that would accompany such a conflict. By not considering in detail how a war of such magnitude and violence might unfold, let alone be ended, these nightmare strategists must resign themselves to either capitulation or cataclysm if their theories of deterrence should prove to be either inoperative or inappropriate in the acid test of reality. The world is at a crossroads in the development of its views of nuclear strategy. The rapid pace of technological development has profound implications for how both conventional and nuclear war might be either avoided or waged. The impact of technological development has been especially great in the area of strategic defense where, like never before, we have the opportunity to create an alternative to the exclusive reliance on the threat of retaliation. Ending a Nuclear War: Are the Superpowers Prepared provides contribution to the study of this vitally important component of deterrence.

  4. The Strategic Defense Initiative: New perspectives on deterrence

    SciTech Connect

    Dallmeyer, D.G.

    1986-01-01

    The Strategic Defense Initiative has evolved into a massively funded research and development effort with profound implications not only for weapons technology but also for East-West relations. In this book, preeminent figures from the policymaking and defense communities address critical aspects of the program, offering widely divergent points of view. Some contributors view SDI as the best way to develop alternatives to the strategy of retaliation by strengthening defensive deterrence, and they decry political reluctance to proceed with deployment. Others cite what they argue are virtually insurmountable technological obstacles to developing a ''perfect'' defense. They believe SDI will mean the end of arms control and an escalation of superpower competition in both offensive and defensive weapons. Some contributors look at the foreign policy perspectives, examining the fear of our NATO allies that SDI represents a progressive decoupling of the U.S. strategic deterrent from the defense of Europe. But as a counterpoint, some argue that SDI is not a doctrinal revolution in American strategic policy but rather a way to gain leverage over the Soviet strategic arsenal.

  5. French and British nuclear forces in an era of uncertainty

    SciTech Connect

    Boyer, Y.

    1992-12-31

    Britain and France have always been considered as special players in the nuclear deterrence game. Their respective arsenals have never exceeded a very small fraction of the USSR`s and the United States strategic forces; Britain`s and France`s rationales for having nuclear weapons have been based on criteria tailored specifically for medium nuclear powers. Moreover, in sharp contrast with both superpowers, the development costs of the French and British nuclear forces have been very high, penalizing conventional forces in the case of France and leading to a growing dependence on the United States in the case of the United Kingdom (UK). Finally, although Paris and London have been able to draw advantages from the possession of nuclear forces, they have never been in a position to offer an explicit nuclear guarantee to their European allies, thus leaving the United States as the sole provider of extended deterrence within the framework of the integrated military structure of the Atlantic alliance. The unchallenged nuclear preponderance of Moscow and Washington was a powerful instrument of influence in world affairs during the East-West confrontation. Accordingly, debates on deterrence have always been expressed in terms and concepts designed by Washington and never explicitly rejected by Moscow. On the contrary, terms and concepts similar to those used in France are now utilized by a new generation of Russian strategic analysts to argue for a redefinition of Russia`s deterrence posture. Today, however, this mechanism of control through preponderance is severely affected because it is likely that the function of nuclear deterrence will be reassessed in the new security environment prevailing after the end of the Cold War. Meanwhile, the prospect of a new world order leads the Western nuclear states to redefine their nuclear doctrine and restructure their strategic forces. 24 refs.

  6. Integrating nuclear weapons stockpile management and nuclear arms control to enable significant stockpile reductions

    SciTech Connect

    Sanders, Lani Miyoshi; DeLand, Sharon M.; Pregenzer, Arian L.

    2010-11-01

    In his 2009 Prague speech and the 2010 Nuclear Posture Review, President Barack Obama committed the United States to take concrete steps toward nuclear disarmament while maintaining a safe, secure, and effective nuclear deterrent. There is an inherent tension between these two goals that is best addressed through improved integration of nuclear weapons objectives with nuclear arms control objectives. This article reviews historical examples of the interaction between the two sets of objectives, develops a framework for analyzing opportunities for future integration, and suggests specific ideas that could benefit the nuclear weapons enterprise as it undergoes transformation and that could make the future enterprise compatible with a variety of arms control futures.

  7. The state of nuclear forensics

    NASA Astrophysics Data System (ADS)

    Kristo, Michael J.; Tumey, Scott J.

    2013-01-01

    Nuclear terrorism has been identified as one of the most serious security threats facing the world today. Many countries, including the United States, have incorporated nuclear forensic analysis as a component of their strategy to prevent nuclear terrorism. Nuclear forensics involves the laboratory analysis of seized illicit nuclear materials or debris from a nuclear detonation to identify the origins of the material or weapon. Over the years, a number of forensic signatures have been developed to improve the confidence with which forensic analysts can draw conclusions. These signatures are validated and new signatures are discovered through research and development programs and in round-robin exercises among nuclear forensic laboratories. The recent Nuclear Smuggling International Technical Working Group Third Round Robin Exercise and an on-going program focused on attribution of uranium ore concentrate provide prime examples of the current state of nuclear forensics. These case studies will be examined and the opportunities for accelerator mass spectrometry to play a role in nuclear forensics will be discussed.

  8. The second coming of the nuclear age

    SciTech Connect

    Ikle, F.C.

    1996-01-01

    Nuclear weapons were used for the first and only time in World War II, and the world has grown accustomed to their nonuse. But the overwhelming deterrent forces that worked during the Cold War will not provide protection against the new threats: terrorism and catastrophic accident. The arsenals and mindsets of the past half-century present a formidable barrier to change, but the United States must lead the way in preventing nuclear weapons from becoming acceptable.

  9. Nuclear War. The moral dimension

    SciTech Connect

    Child, J.W.

    1985-01-01

    U.S. nuclear policy has become the target of increasing criticism during the past decade. Critics often argue that the use of nuclear weapons would be irrational, would destroy humankind, and thus could not serve any rational policy goal. Other critics point to the immortality of the use of nuclear weapons. Both groups condemn U.S. military policy. In Nuclear War, James Child considers and rejects both these lines of criticism. He argues that a policy of deterrence can be both rational and moral; that U.S. nuclear policy is, on balance, based on rational and moral foundations. Child examines near-term consequences of a nuclear war and finds them ghastly but not unthinkable or incomparable to the havoc produced by previous wars. He also analyzes long-term consequences, such as those proposed by the ''nuclear winter'' theory, and finds the fear of total annihilation of humankind to be unfounded.

  10. International Technical Working Group Cooperation to Counter Illicit Nuclear Trafficking

    SciTech Connect

    Smith, D K; Niemeyer, S

    2004-09-18

    The Nuclear Smuggling International Technical Working Group (ITWG) is an international body of nuclear forensic experts that cooperate to deter the illicit trafficking of nuclear materials. The objective of the ITWG is to provide a common approach and effective technical solutions to governments who request assistance in nuclear forensics. The ITWG was chartered in 1996 and since that time more than 28 nations and organizations have participated in 9 international meetings and 2 analytical round-robin trials. Soon after its founding the ITWG adopted a general framework to guide nuclear forensics investigations that includes recommendations for nuclear crime scene security and analysis, the best application of radioanalytical methods, the conduct of traditional forensic analysis of contaminated materials, and effective data analysis to interpret the history of seized nuclear materials. This approach has been adopted by many nations as they respond to incidents of illicit nuclear trafficking.

  11. Can abuse deterrent formulations make a difference? Expectation and speculation.

    PubMed

    Budman, Simon H; Grimes Serrano, Jill M; Butler, Stephen F

    2009-05-29

    It is critical that issues surrounding the abuse and misuse of prescription opioids be balanced with the need for these medications for the treatment of pain. One way to decrease the abuse of prescription opioid medications is to develop abuse deterrent formulations (or ADFs) that in some way prevent drug abusers from extracting out the active ingredient in order to employ alternate routes of administration, such as injection, snorting, and smoking. Several factors including the pharmacokinetic profile of the drug, the features of the drug formulation that make it attractive or unattractive for abuse, the type of drug abuser, the progression of one's addiction pathway, and one's social environment may all play a role in the abuse of prescription opioids and what methods are used to abuse these drugs. This paper will examine these factors in order to understand how they affect the abuse of prescription opioids and routes of administration, and how the development of ADFs may alter these patterns.

  12. Can abuse deterrent formulations make a difference? Expectation and speculation

    PubMed Central

    Budman, Simon H; Grimes Serrano, Jill M; Butler, Stephen F

    2009-01-01

    It is critical that issues surrounding the abuse and misuse of prescription opioids be balanced with the need for these medications for the treatment of pain. One way to decrease the abuse of prescription opioid medications is to develop abuse deterrent formulations (or ADFs) that in some way prevent drug abusers from extracting out the active ingredient in order to employ alternate routes of administration, such as injection, snorting, and smoking. Several factors including the pharmacokinetic profile of the drug, the features of the drug formulation that make it attractive or unattractive for abuse, the type of drug abuser, the progression of one's addiction pathway, and one's social environment may all play a role in the abuse of prescription opioids and what methods are used to abuse these drugs. This paper will examine these factors in order to understand how they affect the abuse of prescription opioids and routes of administration, and how the development of ADFs may alter these patterns. PMID:19480676

  13. On international fisheries agreements, entry deterrence, and ecological uncertainty.

    PubMed

    Ellefsen, Hans; Grønbæk, Lone; Ravn-Jonsen, Lars

    2017-02-10

    A prerequisite for an international fisheries agreement (IFA) to be stable is that parties expect the benefits from joining the agreement to exceed the benefits from free riding on the agreement, and parties only comply with the agreement as long as this is true. The agreement, therefore, implicitly builds on an expectation of the ecological condition of the natural resource. Game theoretical models often assume that all parties have the same (often perfect) information about the resource and that the exploitation is an equilibrium use of the stock. As stated by experts in natural science, the fish ecology still has many open questions, for example how to predict population dynamics, migration patterns, food availability, etc. In some cases, parties disagree about the state, abundance, and migration of a stock, which can reduce the possibilities of reaching an agreement for exploitation of the stock. This paper develops a model and applies it to the North-East Atlantic mackerel fishery, in order to analyze an IFA under different ecological scenarios, and also combines the model with the economic theory of entry deterrence. The model is used empirically to determine whether the parties with original access to the resource have an advantage when forming an agreement with a new party in having the ability to fish the stock down to a smaller size and thereby prevent another party from entering into the fishery. With a basis in entry deterrence, combined with lack of information, the paper illustrates the obstacles that have made an agreement for the North-East Atlantic mackerel so difficult to achieve.

  14. TRPA1 Mediates the Noxious Effects of Natural Sesquiterpene Deterrents*S⃞

    PubMed Central

    Escalera, Jasmine; von Hehn, Christian A.; Bessac, Bret F.; Sivula, Michael; Jordt, Sven-Eric

    2008-01-01

    Plants, fungi, and animals generate a diverse array of deterrent natural products that induce avoidance behavior in biological adversaries. The largest known chemical family of deterrents are terpenes characterized by reactive α,β-unsaturated dialdehyde moieties, including the drimane sesquiterpenes and other terpene species. Deterrent sesquiterpenes are potent activators of mammalian peripheral chemosensory neurons, causing pain and neurogenic inflammation. Despite their wide-spread synthesis and medicinal use as desensitizing analgesics, their molecular targets remain unknown. Here we show that isovelleral, a noxious fungal sesquiterpene, excites sensory neurons through activation of TPRA1, an ion channel involved in inflammatory pain signaling. TRPA1 is also activated by polygodial, a drimane sesquiterpene synthesized by plants and animals. TRPA1-deficient mice show greatly reduced nocifensive behavior in response to isovelleral, indicating that TRPA1 is the major receptor for deterrent sesquiterpenes in vivo. Isovelleral and polygodial represent the first fungal and animal small molecule agonists of nociceptive transient receptor potential channels. PMID:18550530

  15. An evaluation of the deterrent impact of Ontario's 12-hour licence suspension law.

    PubMed

    Vingilis, E; Blefgen, H; Lei, H; Sykora, K; Mann, R

    1988-02-01

    The deterrent impact of Ontario's 12-hour licence suspension law, a law intended to mete out swift punishment is evaluated. A process model of deterrence is included. Time series analyses of the monthly log odds of number of positive B.A.C. fatalities over the number of negative B.A.C. fatalities indicated a small, short-term effect. The intermediate measures of four surveys of media coverage, Toronto residents, Ontario residents, and police forces supported these results, and affirmed the potential validity of the process model of deterrence. The results suggest that laws to increase the celerity and certainty of punishment will have little deterrent impact without enforcement and publicity of the new laws.

  16. Nuclear proliferation: The diplomatic role of non-weaponized programs

    SciTech Connect

    Reynolds, R.R.

    1996-01-01

    The end of the Cold War has not seen the end of reliance on nuclear weapons for deterrence or diplomacy purposes. The use of nuclear weapons for such purposes is as evident in the threshold states as in the nuclear powers. The nuclear weapon states used their nuclear weapons for deterrence, bargaining, and blackmail, even during the early years of the Cold War when the US was essentially non-Weaponized. In the nuclear non-Weaponized states in Asia a non-Weaponized deterrent relationship is developing between India and Pakistan and North Korea has used its nuclear program to restore diplomatic relations with the international community. The role of nuclear weapons in the post Cold War world is determined by the role of non-Weaponized programs in proliferating states. This paper describes examples in South Asia and the Korean peninsula and show that while an increased reliance on nuclear weapons programs may be a threat to the current non-proliferation regime, the focus on non-Weaponized programs rather than on weapons themselves actually improves international security by reducing the threat of nuclear war.

  17. The bishops and nuclear weapons: The catholic pastoral letter on war and peace

    SciTech Connect

    Dougherty, J.E.

    1984-01-01

    This is a contribution to the Catholic debate over nuclear weapons, by an international relations scholar who teaches at a Catholic college. Dougherty is critical of the 1983 pastoral letter, arguing that it focuses too much on the dangers of nuclear war and the inadequacies of deterrence while giving insufficient attention to Soviet expansionism and the need for stable deterrence through a judicious mixture of military modernization and arms control. He is concerned by an increase in ''Catholic nuclear pacifism,'' fearing that the pastoral letter could become a theological rationalization for neo-isolationism in the United States. The European bishops, he notes, take a more moderate view.

  18. Out of (South) Africa: Pretoria`s nuclear weapons experience. Final report

    SciTech Connect

    Horton, R.E.

    1998-04-01

    The primary focus of this paper is the impact of key South African leaders on the successful developments and subsequent rollbacks of South Africa`s nuclear weapons capability. It highlights the key milestones in the development of South Africa`s nuclear weapon capability. It also relates how different groups within South Africa (scientists, politicians, military and technocrats) interacted to successfully produce South Africa`s nuclear deterrent. It emphasizes the pivotal influence of the senior political leadership to pursue nuclear rollback given the disadvantages of its nuclear means to achieve vital national interests. The conclusions drawn from flu`s effort are the South African nuclear program was an extreme response to its own identity Crisis. Nuclear weapons became a means to achieving a long term end of a closer affiliation with the West. A South Africa yearning to be identified as a Western nation and receive guarantees of its security rationalized the need for a nuclear deterrent. The deterrent was intended to draw in Western support to counter a feared total onslaught by Communist forces in the region. Two decades later, that same South Africa relinquished its nuclear deterrent and reformed its domestic policies to secure improved economic and political integration with the West.

  19. Comprehensive Nuclear-Test-Ban Treaty: Background and Current Developments

    DTIC Science & Technology

    2008-04-30

    SUBTITLE Comprehensive Nuclear-Test-Ban Treaty: Background and Current Developments 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...administration that may have to conduct a test of an element of an aging, unmodernized stockpile in order to assure the reliability of the nuclear deterrent force...continued) Soviet Union, excerpt from a report by Russian News Agency ITAR-TASS, September 23, 2005. 15 “Russia Supports CTBT as Key Element of Nuclear Non

  20. Scanning of vehicles for nuclear materials

    SciTech Connect

    Katz, J. I.

    2014-05-09

    Might a nuclear-armed terrorist group or state use ordinary commerce to deliver a nuclear weapon by smuggling it in a cargo container or vehicle? This delivery method would be the only one available to a sub-state actor, and it might enable a state to make an unattributed attack. Detection of a weapon or fissile material smuggled in this manner is difficult because of the large volume and mass available for shielding. Here I review methods for screening cargo containers to detect the possible presence of nuclear threats. Because of the large volume of innocent international commerce, and the cost and disruption of secondary screening by opening and inspection, it is essential that the method be rapid and have a low false-positive rate. Shielding can prevent the detection of neutrons emitted spontaneously or by induced fission. The two promising methods are muon tomography and high energy X-radiography. If they do not detect a shielded threat object they can detect the shield itself.

  1. Scanning of vehicles for nuclear materials

    NASA Astrophysics Data System (ADS)

    Katz, J. I.

    2014-05-01

    Might a nuclear-armed terrorist group or state use ordinary commerce to deliver a nuclear weapon by smuggling it in a cargo container or vehicle? This delivery method would be the only one available to a sub-state actor, and it might enable a state to make an unattributed attack. Detection of a weapon or fissile material smuggled in this manner is difficult because of the large volume and mass available for shielding. Here I review methods for screening cargo containers to detect the possible presence of nuclear threats. Because of the large volume of innocent international commerce, and the cost and disruption of secondary screening by opening and inspection, it is essential that the method be rapid and have a low false-positive rate. Shielding can prevent the detection of neutrons emitted spontaneously or by induced fission. The two promising methods are muon tomography and high energy X-radiography. If they do not detect a shielded threat object they can detect the shield itself.

  2. Feeding Deterrence of Cabbage Looper (Lepidoptera: Noctuidae) by 1-Allyloxy-4-Propoxybenzene, Alone and Blended With Neem Extract.

    PubMed

    Cameron, Linda M; Rogers, Megan; Aalhus, Melissa; Seward, Brendan; Yu, Yang; Plettner, Erika

    2014-12-01

    The cabbage looper, Trichoplusia ni (Hübner) (Lepidoptera: Noctuidae), is one of the most damaging insect pests of cabbage (Brassica oleracea variety capitata) and broccoli (B. oleracea variety italica) in North America. Leaf-feeding larvae attack crucifer and vegetable crops in greenhouses and fields. Here, we have studied a synthetic feeding deterrent, 1-allyloxy-4-propoxybenzene, and a botanical deterrent, neem (an extract from seeds of Azadirachta indica A. de Jussieu (Meliaceae)), in leaf disc choice bioassays with T. ni. We tested the two deterrents and the combination, and we found that the blend exhibits synergy between the two deterrents. We also tested the deterrents in assays with whole cabbage plants in ventilated enclosures and found that 1-allyloxy-4-propoxybenzene evaporated and, therefore, in that context addition of 1-allyloxy-4-propoxybenzene to neem did not enhance deterrence against T. ni.

  3. Crisis Stability and Nuclear Exchange Risks on the Subcontinent: Major Trends and the Iran Factor

    DTIC Science & Technology

    2013-11-01

    acknowledgement or a test, the security impacts will be tectonic rather than volcanic.77 A decision to cross the nuclear threshold, secretly manufacture a...would face a more complicated future for its nuclear deterrent than it has ever contem- plated . At the very least, New Delhi’s rather tepid pursuit of

  4. Nuclear Forensics and Attribution for Improved Energy Security: The Use of Taggants in Nuclear Fuel

    SciTech Connect

    Kristo, M J; Robel, M; Hutcheon, I D

    2007-04-05

    The Global Nuclear Energy Partnership (GNEP), recently announced by DOE Secretary Bodman, poses significant new challenges with regard to securing, safeguarding, monitoring and tracking nuclear materials. In order to reduce the risk of nuclear proliferation, new technologies must be developed to reduce the risk that nuclear material can be diverted from its intended use. Regardless of the specific nature of the fuel cycle, nuclear forensics and attribution will play key roles to ensure the effectiveness of nonproliferation controls and to deter the likelihood of illicit activities. As the leader of the DHS nuclear and radiological pre-detonation attribution program, LLNL is uniquely positioned to play a national leadership role in this effort. Ensuring that individuals or organizations engaged in illicit trafficking are rapidly identified and apprehended following theft or diversion of nuclear material provides a strong deterrent against unlawful activities. Key to establishing this deterrent is developing the ability to rapidly and accurately determine the identity, source and prior use history of any interdicted nuclear material. Taggants offer one potentially effective means for positively identifying lost or stolen nuclear fuels. Taggants are materials that can be encoded with a unique signature and introduced into nuclear fuel during fuel fabrication. During a nuclear forensics investigation, the taggant signature can be recovered and the nuclear material identified through comparison with information stored in an appropriate database. Unlike serial numbers or barcodes, microtaggants can provide positive identification with only partial recovery, providing extreme resistance to any attempt to delete or alter them.

  5. Security culture for nuclear facilities

    NASA Astrophysics Data System (ADS)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  6. Deterrent Concentration Measurement with FTIR and Subsequent Ballistic Performance in Medium Caliber Propellant

    NASA Technical Reports Server (NTRS)

    Furrow, Keith W.; Ritchie, Steve J.; Morris, Amy

    2000-01-01

    To meet ballistic requirements, medium and small caliber propellants use deterrent coatings to obtain burn rate progressivity. The required amount and distribution of deterrent varies between gun systems, propellant types, and often between lots. Micro Fourier Transform Infrared (FTIR) spectroscopy was used to measure deterrent gradients in RP36 propellants coated with methyl centralite (MC) at different deterrent levels and different processing conditions. The aromatic C-C bonds at 1496 cm(exp -1) wavenumber were used to monitor the deterrent profiles through the grain. Deterrent gradients measured with FTIR spectroscopy were then used to estimate burn rate gradients in the deterred grains. Burn rates were calculated from literature models and from closed bomb data of RP36 containing uniform deterrent concentration. Finally, the burn rate gradients were input into an IBHFG2 model of a 200 cc-closed bomb. The early flame spreading portion of the closed bomb ballistic cycle (0 to 0.2 P/Pmax) was roughly modeled by dividing the charge up into five propellant decks and igniting them at different times in the ballistic cycle. Pressure traces and vivacity curves from closed bomb shots were compared to predictions. In addition to the burn rate gradient, the closed bomb pressure trace was heavily dependent on ignition and flame spread. These two phenomena were not readily distinguishable from one another in deterred grains. The same RP-36 propellant was shot in a 25 mm M793TP round which was again modeled with IBHVG2. Peak pressure and muzzle velocity were accurately modeled when erosive burning effects were empirically factored into the model.

  7. Deterrent Concentration Measurement with FTIR and Subsequent Ballistic Performance in Medium Caliber Propellant

    NASA Technical Reports Server (NTRS)

    Furrow, Keith W.; Ritchie, Steve J.; Morris, Amy

    2000-01-01

    To meet ballistic requirements, medium and small caliber propellants use deterrent coatings to obtain burn rate progressivity. The required amount and distribution of deterrent varies between gun systems, propellant types, and often between lots. Micro Fourier Transform Infrared (FTIR) spectroscopy was used to measure deterrent gradients in RP36 propellants coated with methyl centralite (MC) at different deterrent levels and different processing conditions. The aromatic C-C bonds at 1496 cm(exp -1) wavenumber were used to monitor the deterrent profiles through the grain. Deterrent gradients measured with FTIR spectroscopy were then used to estimate burn rate gradients in the deterred grains. Burn rates were calculated from literature models and from closed bomb data of RP36 containing uniform deterrent concentration. Finally, the burn rate gradients were input into an IBHFG2 model of a 200 cc-closed bomb. The early flame spreading portion of the closed bomb ballistic cycle (0 to 0.2 P/Pmax) was roughly modeled by dividing the charge up into five propellant decks and igniting them at different times in the ballistic cycle. Pressure traces and vivacity curves from closed bomb shots were compared to predictions. In addition to the burn rate gradient, the closed bomb pressure trace was heavily dependent on ignition and flame spread. These two phenomena were not readily distinguishable from one another in deterred grains. The same RP-36 propellant was shot in a 25 mm M793TP round which was again modeled with IBHVG2. Peak pressure and muzzle velocity were accurately modeled when erosive burning effects were empirically factored into the model.

  8. The medium nuclear powers and nuclear stability: The Nth Country Problem revisited

    SciTech Connect

    Hu, W.

    1992-01-01

    The theme of this thesis is about what is the impact of the three medium nuclear powers (Britain, France, and China) on nuclear stability. The purpose of studying this issue is to go beyond the thinking of the bipolar nuclear deterrence and to gain a better understanding of the meaning of a future multilateral nuclear world. Two different but complementary approaches -- structural realist and liberal institutionalist -- are used to interpret: (a) what are the structural reasons of the MNPs' nuclear behavior in the international system; and (b) what is the learning effect on their nuclear behavior. By examining the three countries' role in three aspects of nuclear stability (crisis stability, arms race stability, and nuclear nonproliferation), this thesis concludes that they are generally stabilizing to the international nuclear system, and rejects the relevance of the destabilizing propositions of the [open quotes]Nth Country Problem[close quotes] to the issue of the MNPs and nuclear stability.

  9. Deterrence enhanced by SDI (Strategic Defense Initiative). Student essay

    SciTech Connect

    Sowa, P.T.

    1987-03-23

    The Strategic Defense Initiative (SDI) is an investigation by scientists, military leaders, and technologists of the feasibility of strategic defenses against ballistic missiles. Whether strategic defense is the way to go in the future remains to be seen. Although the capability of the envisioned layered, ground, and space-based defensive systems is not specifically addressed, the SDI research program's affect on national-security strategy and its formulation is examined. If found to be feasible and cost-effective, SDI will require a drastic change in our military strategy. This essay reviews how that strategy was formulated in the past in terms of a model and how strategic-defense strategy would be used in the future. More importantly, a discussion of how the SDI impacts on present US national strategy and enhances deterrence is presented. Its influence on technology, conventional defense, and arms controls are offered on this evolving strategic concept and the renewed vigor and interest it has provided in strategy formulation.

  10. Reputation systems, aggression, and deterrence in social interaction.

    PubMed

    Benard, Stephen

    2013-01-01

    Why do individuals sometimes pursue apparently senseless aggression, whether on the street, in court, at work, or in politics? Past work converges on the idea that individuals do so to establish social rank and deter prospective challengers. However, the fundamental claims of this argument - that concerns for one's reputation cause individuals to behave aggressively, and that a reputation for aggression deters threats from others - remain controversial. This paper offers a theoretical argument linking concern for reputation to aggressive behavior and deterrence. The theory argues that in competitive interactions, determining one's likelihood of prevailing in conflict ("competitive ability") is crucial for deciding whether to pursue conflict, but also rife with uncertainty. This motivates individuals to engage in aggressive behavior to signal to others (perhaps falsely) that they are strong competitors. Two behavioral experiments test this argument, and find that reputation systems motivate aggressive behavior, competitive ability moderates this effect, and reputations for aggressive behavior deter aggression from others. The results contribute to understanding the role reputation systems play in the social organization of aggressive behavior.

  11. Computerized hospitals: an attraction or deterrent to recruitment in nursing?

    PubMed

    Rapko, H; Adaskin, E

    1993-01-01

    This article describes a survey of 202 nursing recruits at an 850 bed hospital newly computerized with an Integrated Hospital Information System (IHIS). The nurses answered questions concerning their demographic characteristics, their experience with computers, their attitudes to computers and whether the fact that the hospital was computerized affected their decision to apply for employment. Results of this study suggest that the nurses' decision to apply to this setting for employment did not depend upon the factor of computerization. The majority of recruits held positive attitudes towards computers and it appeared that nurse recruits might be part of an ever increasing computer-literate population. Those having less experience with computers indicated greater anxiety. Implications for recruitment strategies and education are that while no major deterrents may exist for recruitment, new nurses with no computer experience require special attention because they may have higher levels of anxiety about computers. In orientation they may need clarification of what computers can be expected to do in a nursing environment so that they do not form unrealistic expectations. They may need to be informed as to whether a hospital is using a more general Hospital Information System which serves the needs of all departments, or a Nursing Information System which is more closely directed to the nurses' own daily work, since it is the latter which will most affect their degree of contact with computers.

  12. Abuse deterrent formulations and the Controlled Substances Act (CSA).

    PubMed

    Sapienza, Frank L

    2006-06-01

    The Controlled Substances Act (CSA) has reduced the diversion of controlled substances at the manufacturing and distribution levels. Recent increased diversion has occurred at the retail level. Levels of diversion and abuse of controlled substances with similar abuse potential and therapeutic indications often parallel availability for medical use, while rates of diversion and abuse may be influenced by factors related to specific products, including their formulations and risk management plans. Abuse deterrent formulations may reduce abuse and attendant adverse health consequences even if the products are diverted. Their development should consider how, to what extent and by whom products containing the targeted substance are abused. It should take into consideration all potential types of abuse including "as is", multiple doses, alternate routes of administration, physical or chemical separation of the active ingredient, compromised extended release mechanisms and abuse in combination with other substances. Industry incentives for developing abuse-resistant formulations include enhanced corporate image and potentially less restrictive scheduling or risk management plans. Scheduling is substance specific, but the CSA includes products/formulations that are differentially scheduled. Issues to be considered for differential scheduling under the CSA include: (1) whether there is legal authority to do so; (2) application of standard scheduling criteria to individual products; (3) product specific data for "eight factor analyses"; (4) development of predictive data and standards accepted by the scientific and regulatory communities; (5) use of predictive data or post marketing surveillance data; (6) international treaty obligations. These issues must be addressed before differential scheduling can be considered.

  13. Video Tracking Protocol to Screen Deterrent Chemistries for Honey Bees.

    PubMed

    Larson, Nicholas R; Anderson, Troy D

    2017-06-12

    The European honey bee, Apis mellifera L., is an economically and agriculturally important pollinator that generates billions of dollars annually. Honey bee colony numbers have been declining in the United States and many European countries since 1947. A number of factors play a role in this decline, including the unintentional exposure of honey bees to pesticides. The development of new methods and regulations are warranted to reduce pesticide exposures to these pollinators. One approach is the use of repellent chemistries that deter honey bees from a recently pesticide-treated crop. Here, we describe a protocol to discern the deterrence of honey bees exposed to select repellent chemistries. Honey bee foragers are collected and starved overnight in an incubator 15 h prior to testing. Individual honey bees are placed into Petri dishes that have either a sugar-agarose cube (control treatment) or sugar-agarose-compound cube (repellent treatment) placed into the middle of the dish. The Petri dish serves as the arena that is placed under a camera in a light box to record the honey bee locomotor activities using video tracking software. A total of 8 control and 8 repellent treatments were analyzed for a 10 min period with each treatment was duplicated with new honey bees. Here, we demonstrate that honey bees are deterred from the sugar-agarose cubes with a compound treatment whereas honey bees are attracted to the sugar-agarose cubes without an added compound.

  14. The Army Before Last: Military Transformation and the Impact of Nuclear Weapons on the US Army During the Early Cold War

    DTIC Science & Technology

    2004-09-01

    deterrent rather than increasing investment in nuclear weapons and delivery systems .9 This thinking was based on the Army’s belief that nuclear weapons...War .................................................. 21 Table 2. US Army Cannon Delivery System (Nuclear Capable)....................... 42 Table 3...US Army Rocket & Missile Systems 1953-1991................................. 43 x THIS PAGE INTENTIONALLY

  15. Oviposition deterrent activities of Pachyrhizus erosus seed extract and other natural products on Plutella xylostella (Lepidoptera: Plutellidae).

    PubMed

    Basukriadi, Adi; Wilkins, Richard M

    2014-01-01

    An extract of a rotenone-containing plant yam bean, Pachyrhizus erosus (L.) Urban, seeds was tested against the diamondback moth, Plutella xylostella (L.) in a greenhouse to determine its potential as an oviposition deterrent and compared with coumarin and rutin, known as diamondback moth oviposition deterrent compounds, rotenone, and an extract of Peruvian cube root, at a concentration of 0.5% (w/v). Oviposition deterrent index (ODI) was used to determine effects of extracts or compounds in inhibiting oviposition of diamondback moth. Coumarin showed a stronger deterrent effect than the yam bean seed extract with a higher ODI value. On the contrary, rotenone, rutin, and the cube root extract, containing 6.7% (w/w) of rotenone, showed no significant deterrent effects having low or negative ODI values, suggesting that the deterrent effect of the yam bean seed extract is not due to rotenone content of the yam bean seeds. The extract of yam bean seed and coumarin partially deterred the moth from laying eggs on treated leaves in a concentration-dependent manner. The effective concentration for 50% deterrency of coumarin and the yam bean seed extract were 0.11 and 0.83% (w/v), respectively. However, the yam bean seed extract showed a residual deterrent effect on the moth even at 3 d after the treatment and is probably because of its low volatile nature. A long-term deterrency of the yam bean seed extract is an advantage over coumarins. Both the yam bean seed extract and coumarin deterred diamondback moth from laying eggs in total darkness, indicating their nonvisual deterrent effect. This made the extract an effective deterrence to diamondback moth in light and in darkness. To conclude, this study revealed the potential of the crude extract of the yam bean seed to prevent diamondback moth from ovipositing on its plant host.

  16. Research design considerations for clinical studies of abuse-deterrent opioid analgesics: IMMPACT recommendations.

    PubMed

    Turk, Dennis C; O'Connor, Alec B; Dworkin, Robert H; Chaudhry, Amina; Katz, Nathaniel P; Adams, Edgar H; Brownstein, John S; Comer, Sandra D; Dart, Richard; Dasgupta, Nabarun; Denisco, Richard A; Klein, Michael; Leiderman, Deborah B; Lubran, Robert; Rappaport, Bob A; Zacny, James P; Ahdieh, Harry; Burke, Laurie B; Cowan, Penney; Jacobs, Petra; Malamut, Richard; Markman, John; Michna, Edward; Palmer, Pamela; Peirce-Sandner, Sarah; Potter, Jennifer S; Raja, Srinivasa N; Rauschkolb, Christine; Roland, Carl L; Webster, Lynn R; Weiss, Roger D; Wolf, Kerry

    2012-10-01

    Opioids are essential to the management of pain in many patients, but they also are associated with potential risks for abuse, overdose, and diversion. A number of efforts have been devoted to the development of abuse-deterrent formulations of opioids to reduce these risks. This article summarizes a consensus meeting that was organized to propose recommendations for the types of clinical studies that can be used to assess the abuse deterrence of different opioid formulations. Because of the many types of individuals who may be exposed to opioids, an opioid formulation will need to be studied in several populations using various study designs to determine its abuse-deterrent capabilities. It is recommended that the research conducted to evaluate abuse deterrence should include studies assessing: (1) abuse liability, (2) the likelihood that opioid abusers will find methods to circumvent the deterrent properties of the formulation, (3) measures of misuse and abuse in randomized clinical trials involving pain patients with both low risk and high risk of abuse, and (4) postmarketing epidemiological studies.

  17. Research design considerations for clinical studies of abuse-deterrent opioid analgesics: IMMPACT recommendations

    PubMed Central

    Turk, Dennis C.; O’Connor, Alec B.; Dworkin, Robert H.; Chaudhry, Amina; Katz, Nathaniel P.; Adams, Edgar H.; Brownstein, John S.; Comer, Sandra D.; Dart, Richard; Dasgupta, Nabarun; Denisco, Richard A.; Klein, Michael; Leiderman, Deborah B.; Lubran, Robert; Rappaport, Bob A.; Zacny, James P.; Ahdieh, Harry; Burke, Laurie B.; Cowan, Penney; Jacobs, Petra; Malamut, Richard; Markman, John; Michna, Edward; Palmer, Pamela; Peirce-Sandner, Sarah; Potter, Jennifer S.; Raja, Srinivasa N.; Rauschkolb, Christine; Roland, Carl L.; Webster, Lynn R.; Weiss, Roger D.; Wolf, Kerry

    2013-01-01

    Opioids are essential to the management of pain in many patients, but they also are associated with potential risks for abuse, overdose, and diversion. A number of efforts have been devoted to the development of abuse-deterrent formulations of opioids to reduce these risks. This article summarizes a consensus meeting that was organized to propose recommendations for the types of clinical studies that can be used to assess the abuse deterrence of different opioid formulations. Due to the many types of individuals who may be exposed to opioids, an opioid formulation will need to be studied in several populations using various study designs in order to determine its abuse-deterrent capabilities. It is recommended that the research conducted to evaluate abuse deterrence should include studies assessing: (1) abuse liability; (2) the likelihood that opioid abusers will find methods to circumvent the deterrent properties of the formulation; (3) measures of misuse and abuse in randomized clinical trials involving pain patients with both low risk and high risk of abuse; and (4) post-marketing epidemiological studies. PMID:22770841

  18. Decay chains and photofission investigation based on nuclear spectroscopy of highly enriched uranium sample.

    PubMed

    Sibczynski, P; Kownacki, J; Syntfeld-Kazuch, A; Moszynski, M; Kisielinski, M; Czarnacki, W; Kosinski, K; Matusiak, M; Klimasz, M; Kowalczyk, M; Abraham, T; Mierzejewski, J; Srebrny, J

    2013-12-01

    Nuclear spectroscopy experiments were performed for 100g metallic uranium rod enriched to 93% (235)U, in order to establish and characterize the most prominent γ-rays in the natural decay series and photofission reaction. Single γ-ray spectra and γ-γ coincidences measurements were conducted before irradiation. The uranium sample was subsequently irradiated with 15 MeV bremsstrahlung photons. Relative intensities of γ-lines and several values of half-lives of the fission fragments decays were determined. The obtained information can be utilized in detection of smuggled nuclear materials and characterization of bulky nuclear waste packages. © 2013 Elsevier Ltd. All rights reserved.

  19. The Need for a Strong Science and Technology Program in the Nuclear Weapons Complex for the 21st Century

    SciTech Connect

    Garaizar, Xabier

    2009-07-02

    In this paper I argue for the need for a strong Science and Technology program in the Nuclear Weapons Complex as the basis for maintaining a credible deterrence capability. The current Nuclear Posture Review establishes a New Triad as the basis for the United States deterrence strategy in a changing security environment. A predictive science capability is at the core of a credible National Nuclear Weapons program in the 21st Century. In absence of nuclear testing, the certification of our current Nuclear Weapons relies on predictive simulations and quantification of the associated simulation uncertainties. In addition, a robust nuclear infrastructure needs an active research and development program that considers all the required nuclear scenarios, including new configurations for which there is no nuclear test data. This paper also considers alternative positions to the need for a Science and Technology program in the Nuclear Weapons complex.

  20. Progress in counterfeit deterrence: the contribution of information exchange

    NASA Astrophysics Data System (ADS)

    Lancaster, Ian M.; Kontnik, Lewis T.

    1996-03-01

    In this paper we establish the need for communication between organizations involved in the fight against counterfeiting crime. We also examine the paradox in providing information that could serve the criminal as well as those attempting to protect themselves from criminal activity. Counterfeiting is estimated to account for over 5% of world trade. It is a global operation with no respect for international borders. It is increasingly sophisticated and increasingly the province of organized crime, which applies the techniques developed for drug distribution to the production and distribution of counterfeit articles. To fight this crime there is an increasing plethora of authenticating features and technologies available. Many companies do not recognize the problem and the number of anticounterfeit technologies can be confusing for potential users. There is therefore a need for information about them, their comparative characteristics, to be easily available. At present there is inadequate communication between those who develop and produce anti-counterfeiting devices and those who use them, notwithstanding the marketing efforts of the former. Communication which stimulates and encourages the spread of information between those engaged in the fight against counterfeit crime can only help in that fight. But what we term 'the communication paradox' requires circumspection and care in the content and the distribution of such information. The communication paradox is that the better the channels of communication, the easier it is for criminals to get hold of that information. The challenge is to institute communications which are effective but restrictive. More communication of information between those engaged in counterfeit deterrence will enhance individual companies' and organizations' anticounterfeit efforts and thus contribute to an overall improvement in the fight against counterfeit crime.

  1. USAWC (United States Army War College) Military Studies Program Paper. The Ingredients of Deterrence: Theory, Practice, and Implications.

    DTIC Science & Technology

    2014-09-26

    country. In its simplest genre , deterrence amounts to the threat of one state to punish another state in order to keep the latter from acting against the...Deterrence Thirty Years Later - What Has Changed? Villars, Switzerland: International Institute for Strategic StudiesTwenty-first Annual Conference, 6

  2. Continuous exposure to the deterrents cis-jasmone and methyl jasmonate does not alter the behavioural responses of Frankliniella occidentalis

    PubMed Central

    Egger, Barbara; Spangl, Bernhard; Koschier, Elisabeth Helene

    2016-01-01

    Behavioural responses of Frankliniella occidentalis (Pergande) (Thysanoptera: Thripidae), a generalist, cell sap-feeding insect species with piercing-sucking mouthparts, after continuous exposure to two deterrent secondary plant compounds are investigated. We compared in choice assays on bean leaf discs, the settling, feeding, and oviposition preferences of F. occidentalis females that had no experience with the two fatty acid derivatives methyl jasmonate and cis-jasmone before testing (naïve thrips) vs. females that had been exposed to the deterrent compounds before testing (experienced thrips). The thrips were exposed to the deterrents at low or high concentrations for varied time periods and subsequently tested on bean leaf discs treated with the respective deterrent at either a low or a high concentration. Frankliniella occidentalis females avoided settling on the deterrent-treated bean leaf discs for an observation period of 6 h, independent of their previous experience. Our results demonstrate that feeding and oviposition deterrence of the jasmonates to the thrips were not altered by continuous exposure of the thrips to the jasmonates. Habituation was not induced, neither by exposure to the low concentration of the deterrents nor by exposure to the high concentration. These results indicate that the risk of habituation to two volatile deterrent compounds after repeated exposure is not evident in F. occidentalis. This makes the two compounds potential candidates to be integrated in pest management strategies. PMID:26726263

  3. The Effectiveness of the U.S. Missile Defense Capabilities as a Deterrent to the North Korean Missile Threat

    DTIC Science & Technology

    2007-12-01

    THE U.S. MISSILE DEFENSE CAPABILITIES AS A DETERRENT TO THE NORTH KOREAN MISSILE THREAT by Issac G. Gipson December 2007 Thesis Advisor...SUBJECT TERMS Missile Deterrence, Missile Defense , North Korean Missile Threat, North Korean Missile Systems, U.S. Missile Defense Capabilities, 16...19 III. CURRENT MISSILE DEFENSE ANALYSIS AGAINST NORTH KOREAN MISSILE THREAT

  4. Social capital, the miniaturisation of community and consumption of homemade liquor and smuggled liquor during the past year. A population-based study.

    PubMed

    Lindström, Martin

    2005-12-01

    To study the impact of social participation, trust and the miniaturisation of community, i.e. high social participation/low trust, on consumption of homemade liquor and smuggled liquor during the past year. The Scania 2000 public health survey is a cross-sectional, postal questionnaire study. A total of 13,604 persons aged 18-80 years were included. A logistic regression model was used to investigate the association between the social capital variables and illegal alcohol consumption. The multivariate analyses analysed the importance of confounders (age, country of origin, education and economic stress) on the differences in consumption of homemade and smuggled liquor according to the social capital variables. A 28.2% proportion of all men and 14.9% of all women had consumed homemade liquor during the past year. The proportions who had consumed smuggled liquor during the past year were even higher, 40.1% among men and 21.4% among women. Both forms of illegal alcohol consumption were significantly positively associated with social participation and negatively associated with trust. The miniaturisation of community category, i.e. high social participation/low trust, had significantly higher risks of consumption during the past year of the consumption of both forms of illegally provided alcohol compared to the high social capital (high social participation/high trust) category, while the low social participation/high trust category had significantly lower risks. High social participation combined with low trust is positively associated with consumption of illegally provided alcohol. The results have implications for alcohol prevention programs, because structural/social factors that may hinder information and norms concerning illegal alcohol have been identified in this study.

  5. Focused deterrence and the prevention of violent gun injuries: practice, theoretical principles, and scientific evidence.

    PubMed

    Braga, Anthony A; Weisburd, David L

    2015-03-18

    Focused deterrence strategies are a relatively new addition to a growing portfolio of evidence-based violent gun injury prevention practices available to policy makers and practitioners. These strategies seek to change offender behavior by understanding the underlying violence-producing dynamics and conditions that sustain recurring violent gun injury problems and by implementing a blended strategy of law enforcement, community mobilization, and social service actions. Consistent with documented public health practice, the focused deterrence approach identifies underlying risk factors and causes of recurring violent gun injury problems, develops tailored responses to these underlying conditions, and measures the impact of implemented interventions. This article reviews the practice, theoretical principles, and evaluation evidence on focused deterrence strategies. Although more rigorous randomized studies are needed, the available empirical evidence suggests that these strategies generate noteworthy gun violence reduction impacts and should be part of a broader portfolio of violence prevention strategies available to policy makers and practitioners.

  6. Why do we punish? Deterrence and just deserts as motives for punishment.

    PubMed

    Carlsmith, Kevin M; Darley, John M; Robinson, Paul H

    2002-08-01

    One popular justification for punishment is the just deserts rationale: A person deserves punishment proportionate to the moral wrong committed. A competing justification is the deterrence rationale: Punishing an offender reduces the frequency and likelihood of future offenses. The authors examined the motivation underlying laypeople's use of punishment for prototypical wrongs. Study 1 (N = 336) revealed high sensitivity to factors uniquely associated with the just deserts perspective (e.g., offense seriousness, moral trespass) and insensitivity to factors associated with deterrence (e.g., likelihood of detection, offense frequency). Study 2 (N = 329) confirmed the proposed model through structural equation modeling (SEM). Study 3 (N = 351) revealed that despite strongly stated preferences for deterrence theory, individual sentencing decisions seemed driven exclusively by just deserts concerns.

  7. Oviposition Deterrents in Herbivorous Insects and their potential use in Integrated Pest Management.

    PubMed

    Kumari, Archana; Kaushik, Nutan

    2016-03-01

    In the life cycle of insects, oviposition is an important phenomenon, and it is influenced by many intrinsic and extrinsic factors, especially in relation to suitable hosts for completion of their life-cycle. Oviposition deterrents which deter an insect from laying eggs are important in the management of insect pests. Proper understanding of these deterrents shall provide necessary insight into new vistas for Insect Pest Management. Chemicals from plants and insects play an important role in attracting phytophagous insects for selecting host for oviposition. Considerable research has been done on oviposition deterrents and their mode of actions. In the present review, we have consolidated the updated information on this important aspect of insect behavior.

  8. Deterrent activity of hops flavonoids and their derivatives against stored product pests.

    PubMed

    Jackowski, J; Popłoński, J; Twardowska, K; Magiera-Dulewicz, J; Hurej, M; Huszcza, E

    2017-02-16

    Five flavonoids from hops, two of their derivatives, along with naringenin used as a model compound, were tested for their antifeedant activity against three coleopteran stored product pests: Sitophilus granarius L., Tribolium confusum Duv. and Trogoderma granarium Everts. The introduction, into the tested flavonoid molecules, of additional structural fragments such as prenyl or dimethylpyran moiety, is proposed to significantly alter the deterrent activity of the compounds. The prenyl moiety in flavonoids increased the deterrent activity of these compounds in all three of the grain feeding species used in the tests. It is also concluded that the introduction of dimethylpyran moiety to the flavonoid structure increases its deterrent activity in S. granarius and T. confusum, but in one of the test insects, T. granarium, an increased feeding was observed in response to the introduction of dimethylpyran moiety to the flavonoid structure.

  9. Embracing the Moon in the Sky or Fishing the Moon in the Water? Some Thoughts on Military Deterrence: Its Effectiveness and Limitations

    DTIC Science & Technology

    2012-08-01

    particularly fond of two troublesome “strategic gums ”: containment and deterrence, which they kept chewing for decades.4 After the end of the Cold War...the “containment gum ” seemed marginalized, but, as for the “deterrence gum ,” they are still reluctant to spit it out.5 Deterrence as a fundamental

  10. Essential Oils of Echinophora lamondiana (Apiales: Umbelliferae): A Relationship Between Chemical Profile and Biting Deterrence and Larvicidal Activity Against Mosquitoes (Diptera: Culicidae)

    DTIC Science & Technology

    2015-01-01

    Chemical Profile and Biting Deterrence and Larvicidal Activity Against Mosquitoes (Diptera: Culicidae) ABBAS ALI,1,2 NURHAYAT TABANCA,1 GULMIRA OZEK,3...deterrent or repellents against Ae. aegypti. KEY WORDS Echinophora lamondiana, biting deterrent, repellent, larvicide, mosquito Introduction Mosquitoes ...of human morbidity and mortality in environments where appropriate medical resources are not available. The primary method of mosquito control relies

  11. Chinese nuclear weapons and arms control policies. Final report

    SciTech Connect

    Sismanidis, R.D.

    1985-12-04

    This study examines Chinese nuclear weapons and arms control policies and focuses on the period since 1982. The section on nuclear weapons policies and capabilities discusses China`s land, sea, and airborne deterrent forces, the development of tactical nuclear weapons, and nuclear doctrine and policy. The section on arms control policy describes Beijing`s stance on disarmament, nonproliferation, arms control talks, the United States-Soviet space race, and the Strategic Defense Initiative. The conclusion examines the military and political objectives of nuclear weapons and arms control policies in China`s independent foreign policy.

  12. Preference and aversion for deterrent chemicals in two species of Peromyscus mouse.

    PubMed

    Glendinning, J I

    1993-07-01

    Deterrent chemicals such as quinine hydrochloride (QHC1) are generally considered to be aversive to mammals at all detectable concentrations. However, several species contain individuals that drink solutions containing low concentrations of deterrents in preference to plain water. The present study examines this paradoxical preference in two species of mouse, Peromyscus melanotis and P. aztecus. Preliminary findings had suggested that whereas some P. aztecus prefer low concentrations of QHC1, no P. melanotis prefer any concentration of QHC1. Experiment 1 tested the hypothesis that individual mice that prefer low concentrations of QHC1 would respond similarly to four other deterrents described by humans as bitter and/or astringent (ouabain, hop extract, sucrose octaacetate, and tannic acid) in 48-h, two-bottle choice tests. Peromyscus aztecus displayed a large amount of intraspecific variation in response to all five deterrents. Those P. aztecus that drank low concentrations of QHC1 in preference to plain water were significantly more likely to respond similarly to low concentrations of the other deterrents. No P. melanotis displayed a preference for any concentration of either deterrent. Experiment 2 examined the temporal stability of the response to 0.1 mM QHC1 in P. aztecus over six consecutive choice tests. Mice were divided into three groups based on their initial response to the QHC1 solution (preference, no response, or rejection) and then subjected to the 12-day test. The response of mice within each of the groups did not change significantly over time.(ABSTRACT TRUNCATED AT 250 WORDS)

  13. Impact of reassociation with a coevolved herbivore on oviposition deterrence in a hostplant.

    PubMed

    Jogesh, Tania; Wong, Joseph C H; Stanley, Margaret C; Berenbaum, May R

    2014-09-01

    Although selection by herbivores for increased feeding deterrence in hostplants is well documented, selection for increased oviposition deterrence is rarely examined. We investigated chemical mediation of oviposition by the parsnip webworm (Depressaria pastinacella) on its principal hostplant Pastinaca sativa to determine whether ovipositing adults choose hostplants based on larval suitability and whether hostplants experience selection for increased oviposition deterrence. Webworms consume floral tissues and florivory selects for increased feeding deterrents; moths, however, oviposit on leaves of pre-bolting plants. Exclusive use of different plant parts for oviposition and larval feeding suggests oviposition should select for increased foliar deterrents. Recent webworm colonization of New Zealand (NZ) allowed us to assess phenotypic changes in foliar chemicals in response to webworm oviposition. In a common garden experiment, we compared NZ populations with and without a history of infestation from 2004 to 2006 for changes in leaf chemistry in response to oviposition. Three leaf volatiles, cis- and trans-ocimene, and β-farnesene, elicit strong responses in female moth antennae; these compounds were negatively associated with oviposition and are likely oviposition deterrents. Leaf β-farnesene was positively correlated with floral furanocoumarins that deter florivory; greater oviposition on plants with low floral furanocoumarins indicates that moths preferentially oviposit on parsnips most suitable for larval growth. Unlike florivory, high oviposition on leaves did not lower plant fitness, consistent with the fact that NZ parsnip foliar chemistry was unaffected by 3-6 years of webworm infestation. Thus, in this system, selection by ovipositing moths on foliar chemistry is weaker than selection by larvae on floral chemistry.

  14. Space-Based Counterforce in the Second Nuclear Age

    DTIC Science & Technology

    2015-04-01

    AU/ACSC/ZIARNICK, B./AY15 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY SPACE- BASED COUNTERFORCE IN THE SECOND NUCLEAR AGE...of MASTER OF OPERATIONAL ARTS AND SCIENCES Advisor: Colonel Michael V. Smith, USAF Maxwell Air Force Base , Alabama April 2015 DISTRIBUTION...concludes that space- based nuclear deterrence may be the only method to establish true dominance and that Project Orion, an audacious plan championed by

  15. Arms Control and British and French Nuclear Forces.

    DTIC Science & Technology

    1987-12-01

    no doubt on the American nuclear guarantee. On the contrary, the British borrowed the French concept of a "second nuclear decision center " as...concept of alternate decision making centers as a rationale for independent deterrent capabilities argues that by having more than one alliance...debate has been rather unique in that it has centered on the question of retention or abdication of an independent dcterrent capability, rather than on

  16. The Best Defense: Making Maximum Sense of Minimum Deterrence

    DTIC Science & Technology

    2011-06-01

    disrespect for such exercises , and both knew that the avoidance of such a war was imperative.‖16 Large arsenals are useful for fighting wars, but...civilians retain control over the use of nuclear weapons with the CMC exercising direct command and control of the Second Artillery Force.29...16 Timothy Hoyt, "Strategic Myopia : Pakistan’s Nuclear Docrine and Crisis Stability in South Asia

  17. Advanced Neutron Detection Methods: new Tools for Countering Nuclear Terrorism (412th Brookhaven Lecture)

    SciTech Connect

    Vanier, Peter

    2006-02-15

    Acts of terrorism have become almost daily occurrences in the international news. Yet one of the most feared types of terrorism — nuclear terrorism — has not yet happened. One important way of preventing nuclear terrorism is to safeguard nuclear materials, and many people worldwide work continuously to achieve that goal. A second, vital defense is being developed: greatly improved methods of detecting material that a nuclear terrorist would need so that timely discovery of the material could become more probable. Special nuclear materials can emit neutrons, either spontaneously or when excited by a source of high-energy gamma rays, such as an electron accelerator. Traditional neutron detectors can sense these neutrons, but not the direction from which the neutrons come, or their energy. The odds against finding smuggled nuclear materials using conventional detectors are great. However, innovative designs of detectors are producing images that show the locations and even the shapes of man-made neutron sources, which stand out against the uniform background produced by cosmic rays. With the new detectors, finding needles in haystacks — or smuggled nuclear materials in a huge container among thousands of others in a busy port — suddenly becomes possible.

  18. The Prospects of Employing Semiochemical and Visual Deterrents in Protecting Trees from Bark Beetles

    Treesearch

    B.L. Strom; L.M. Roton; J.L. Hayes; R.A. Goyer

    1996-01-01

    Tree protection tactics based on semiochemicals are being investigated by many forest scientists but their consistent effectiveness remains a concern. One approach toward increasing the efficacy of such treatments is to combine semiochemically-based tactics with deterrents that disrupt other cues necessary for host finding and colonization. In this study we...

  19. Aedes aegypti (Diptera: culicidae) biting deterrence: structure-activity relationship of saturated and unsaturated fatty acids

    USDA-ARS?s Scientific Manuscript database

    In this study we systematically evaluated for the first time the biting deterrent effects of a series of saturated and unsaturated fatty acids against Aedes aegypti [yellow fever mosquito (Diptera: Culicidae)] using the K & D bioassay system (Klun et al 2005). The saturated fatty acids (C6:0 to C16...

  20. An Application of the Social Support Deterioration Deterrence Model to Rescue Workers

    ERIC Educational Resources Information Center

    Prati, Gabriele; Pietrantoni, Luca

    2010-01-01

    This study examined the role of social support in promoting quality of life in the aftermath of critical incidents involvement. Participants were a sample of 586 Italian rescue workers. Structural equation modelling was used to test the social support deterioration deterrence model. Results showed that the impact of critical incident involvement…

  1. Oviposition deterrents for the Mediterranean fruit fly, Ceratitis capitata (Diptera: Tephritidae) from fly faeces extracts.

    PubMed

    Arredondo, J; Díaz-Fleischer, F

    2006-02-01

    After oviposition, females of the Mediterranean fruit fly Ceratitis capitata Wiedemann deposit a host-marking pheromone on the fruit surface that deters oviposition by conspecifics. Methanolic extracts of fruit fly faeces elicit a similar deterrent effect. The results of laboratory and field experiments using raw methanolic extracts of C. capitata faeces as an oviposition deterrent are reported. Laboratory bioassays revealed a significant positive relationship between concentration of faeces and the inhibition of oviposition responses by C. capitata. Treatment of halves of coffee bushes with methanolic extracts containing 0.1, 1.0 and 10 mg faeces ml(-1) resulted in a significant reduction of infestation only at the highest concentration (P=0.03). Treatment of blocks of coffee bushes with an extract of 10 mg faeces ml(-1) resulted in an 84% reduction in infestation by C. capitata in sprayed plants and a 56% reduction in adjacent untreated coffee bushes surrounding treated plots, probably due to the deterrent effect of host-marking pheromone on fly oviposition. We conclude that faeces contain oviposition deterrent substances that effectively reduce fruit infestations by C. capitata, suggesting a clear potential for the use of this infochemical in integrated management programmes targeted at this pest.

  2. Academic Dishonesty in Online Courses: The Influence of Students' Characteristics, Perception of Connectedness, and Deterrents

    ERIC Educational Resources Information Center

    Chase, Artyce-Joy E.

    2010-01-01

    The purpose of this study was to explore undergraduate students' behaviors related to academic dishonesty. Additionally, this study examined students' perceptions of their own connectedness within the online classroom, and perceptions of the effectiveness of deterrents to cheating. Participants in the study were enrolled in online courses within…

  3. Deterrents to Participation in Continuing Professional Education: A Survey of the NTRS.

    ERIC Educational Resources Information Center

    Langsner, Stephen J.

    1994-01-01

    Reports a study designed to identify deterrents to participation in continuing professional education experienced by professional members of the National Therapeutic Recreation Society. The four top ranked barriers were cost, work constraints, lack of quality, and lack of benefit. There were regional differences relative to which factors were…

  4. The Tools of Prevention: Building Prevention and Deterrence into Exercise Programs

    DTIC Science & Technology

    2006-09-01

    will look at various prevention strategies, most notably, “All-Crimes,” Information Sharing, Private Sector Security, Attack Trees, Red - Teaming , and...Deterrence, Crime Prevention, All-Crimes, Attack Trees, Red Teams , Information Sharing Environment Analysis, Behavioral Analysis, Private Sector...Sharing, Private Sector Security, Attack Trees, Red - Teaming , and Behavioral Analysis, to determine how these prevention-related tools can be

  5. Feeding deterrence and inhibitory effects of bee balm (Monarda didyma) leaves on fall armyworm

    USDA-ARS?s Scientific Manuscript database

    The fall armyworm [Spodoptera frugiperda (J.E. Smith)] is a serious pest of many field and horticulture crops. Because of the many advantages for the use of plant-derived pesticides, we tested whether bee balm (Monarda didyma L.) leaves could have feeding deterrence on fall armyworm. When S. frugipe...

  6. Juvenile Transfer and Deterrence: Reexamining the Effectiveness of a "Get-Tough" Policy

    ERIC Educational Resources Information Center

    Jordan, Kareem L.; Myers, David L.

    2011-01-01

    Although research has examined the effectiveness of juvenile transfer on recidivism, there has been a lack of research done in assessing how well juvenile waiver to adult court meets the criteria necessary for deterrence to occur (i.e., certainty, severity, and swiftness of punishment). The purpose of this study is to assess how well juvenile…

  7. Deterrents to Nurses' Participation in Continuing Professional Education as Perceived by Licensed Nurses in Oklahoma

    ERIC Educational Resources Information Center

    Fahnestock, Annetta Bethene

    2012-01-01

    Little is known about the deterrents to licensed nurses' participation in continuing professional education (CPE) in Oklahoma, the licensed nurses' preferred method for obtaining CPE, and the ways in which employers support participation in CPE. A random sample of 78 licensed nurses in Oklahoma completed a 20 item questionnaire and a 40 item…

  8. 48 CFR 32.107 - Need for contract financing not a deterrent.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Need for contract... Need for contract financing not a deterrent. (a) If the contractor or offeror meets the standards... contractor's need for contract financing as a handicap for a contract award; e.g., as a responsibility...

  9. An Application of the Social Support Deterioration Deterrence Model to Rescue Workers

    ERIC Educational Resources Information Center

    Prati, Gabriele; Pietrantoni, Luca

    2010-01-01

    This study examined the role of social support in promoting quality of life in the aftermath of critical incidents involvement. Participants were a sample of 586 Italian rescue workers. Structural equation modelling was used to test the social support deterioration deterrence model. Results showed that the impact of critical incident involvement…

  10. Social Sources of Marital Violence and Deterrence: Testing an Integrated Theory of Assaults between Partners.

    ERIC Educational Resources Information Center

    Williams, Kirk R.

    1992-01-01

    Presents integrated theory which identifies attributes of intimate life assumed to reduce deterrent efficacy of arrest and thus increase probability of violence in marriage and marriagelike relationships. Research findings suggest that increased privacy, inequality, and legitimation of violence are associated with reduction in perceived arrest…

  11. Deterrency and Toxicity of Essential Oils to Argentine and Red Imported Fire Ants (Hymenoptera: Formicidae)

    USDA-ARS?s Scientific Manuscript database

    Laboratory assays were conducted to evaluate deterrency and contact toxicity of six essential oils to the Argentine ant, Linepithema humile (Mayr), and the red imported fire ant, Solenopsis invicta Buren. In choice tests, both Argentine ants and fire ants crossed barriers treated with multiple rates...

  12. 48 CFR 32.107 - Need for contract financing not a deterrent.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Need for contract... Need for contract financing not a deterrent. (a) If the contractor or offeror meets the standards... contractor's need for contract financing as a handicap for a contract award; e.g., as a responsibility factor...

  13. 48 CFR 32.107 - Need for contract financing not a deterrent.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Need for contract... Need for contract financing not a deterrent. (a) If the contractor or offeror meets the standards... contractor's need for contract financing as a handicap for a contract award; e.g., as a responsibility factor...

  14. 48 CFR 32.107 - Need for contract financing not a deterrent.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Need for contract... Need for contract financing not a deterrent. (a) If the contractor or offeror meets the standards... contractor's need for contract financing as a handicap for a contract award; e.g., as a responsibility factor...

  15. 48 CFR 32.107 - Need for contract financing not a deterrent.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Need for contract... Need for contract financing not a deterrent. (a) If the contractor or offeror meets the standards... contractor's need for contract financing as a handicap for a contract award; e.g., as a responsibility factor...

  16. Juvenile Transfer and Deterrence: Reexamining the Effectiveness of a "Get-Tough" Policy

    ERIC Educational Resources Information Center

    Jordan, Kareem L.; Myers, David L.

    2011-01-01

    Although research has examined the effectiveness of juvenile transfer on recidivism, there has been a lack of research done in assessing how well juvenile waiver to adult court meets the criteria necessary for deterrence to occur (i.e., certainty, severity, and swiftness of punishment). The purpose of this study is to assess how well juvenile…

  17. Differential Impact of Deterrence vs. Rehabilitation as Drug Interventions on Recidivism after 36 Months

    ERIC Educational Resources Information Center

    Sung, Hung-En

    2003-01-01

    Deterrence through pain infliction and rehabilitation through therapy and training are often conceptualized as competing practices in crime control. With the resurgence of the diversion movement and therapeutic justice, increasingly more offenders are exposed to a particular combination of incarceration and treatment. Even for offenders diverted…

  18. Assessing specific deterrence effects of increased speeding penalties using four measures of recidivism.

    PubMed

    Watson, B; Siskind, V; Fleiter, J J; Watson, A; Soole, D

    2015-11-01

    Traffic law enforcement sanctions can impact on road user behaviour through general and specific deterrence mechanisms. The manner in which specific deterrence can influence recidivist behaviour can be conceptualised in different ways. While any reduction in speeding will have road safety benefits, the ways in which a 'reduction' is determined deserves greater methodological attention and has implications for countermeasure evaluation more generally. The primary aim of this research was to assess the specific deterrent impact of penalty increases for speeding offences in Queensland, Australia, in 2003 on two cohorts of drivers detected for speeding prior to and after the penalty changes were investigated. Since the literature is relatively silent on how to assess recidivism in the speeding context, the secondary research aim was to contribute to the literature regarding ways to conceptualise and measure specific deterrence in the speeding context. We propose a novel way of operationalising four measures which reflect different ways in which a specific deterrence effect could be conceptualised: (1) the proportion of offenders who re-offended in the follow up period; (2) the overall frequency of re-offending in the follow up period; (3) the length of delay to re-offence among those who re-offended; and (4) the average number of re-offences during the follow up period among those who re-offended. Consistent with expectations, results suggested an absolute deterrent effect of penalty changes, as evidenced by significant reductions in the proportion of drivers who re-offended and the overall frequency of re-offending, although effect sizes were small. Contrary to expectations, however, there was no evidence of a marginal specific deterrent effect among those who re-offended, with a significant reduction in the length of time to re-offence and no significant change in the average number of offences committed. Additional exploratory analyses investigating potential

  19. Galactolipids rather than phlorotannins as herbivore deterrents in the brown seaweed Fucus vesiculosus.

    PubMed

    Deal, Michael S; Hay, Mark E; Wilson, Dean; Fenical, William

    2003-06-01

    The first investigation of seaweed chemical defense against herbivores involved the brown seaweed Fucus vesiculosus and suggested defense via phlorotannins. The first demonstration of seaweed induction of secondary metabolites in response to herbivory also involved the genus Fucus and assumed a defensive function for phlorotannins. Many other investigations correlate herbivore feeding preference with changing levels of phlorotannins in this genus and others, but few directly test the effects of phlorotannins. No studies have assessed Fucus chemical defenses using bioassay-guided separation to investigate the complete complement of compounds deterring herbivores. We investigated the deterrence of F. vesiculosus chemical extracts using herbivore bioassays to guide our chemical investigations. Although crude extracts from F. vesiculosus strongly deterred feeding by the sea urchin Arbacia punctulata, phlorotannins from this extract did not deter feeding at 2x or 4x natural concentration by dry mass. Feeding deterrence was due to: (1) a polar galactolipid in the ethyl acetate-soluble extract, and (2) a non-phenolic compound, or compounds, in the water-soluble extract. Although this is the first evidence of galactolipids deterring herbivores, such defenses could be geographically and taxonomically widespread. The galactolipid we discovered in Fucus occurs in marine dinoflagellates, and a related metabolite that deters herbivory has recently been discovered in a tropical green seaweed. We were unable to identify the second deterrent compound, but deterrence occurred in a fraction containing carbohydrates, including sulfated sugars, but no phlorotannins. Given the polarity of these chemical deterrents, they could co-occur with and confound bioassays of phlorotannins if investigators test phlorotannin-containing algal extracts without further purification.

  20. Antigen smuggling in tuberculosis.

    PubMed

    Hudrisier, Denis; Neyrolles, Olivier

    2014-06-11

    The importance of CD4 T lymphocytes in immunity to M. tuberculosis is well established; however, how dendritic cells activate T cells in vivo remains obscure. In this issue of Cell Host & Microbe, Srivastava and Ernst (2014) report a mechanism of antigen transfer for efficient activation of antimycobacterial T cells.

  1. The Importance of International Technical Nuclear Forensics to Deter Illicit Trafficking

    SciTech Connect

    Smith, D K

    2007-01-30

    Illicit trafficking of nuclear materials is a transboundary problem that requires a cooperative approach involving international nuclear forensics to ensure all states understand the threat posed by nuclear smuggling as well as a means to best deter the movement of nuclear contraband. To achieve the objectives, all cases involving illicit trafficking of nuclear and radiological materials must be vigorously pursued and prosecuted when appropriate. The importance of outreach and formal government-to-government relationships with partner nations affected by nuclear trafficking cannot be under-estimated. States that are situated on smuggling routes may be well motivated to counter nuclear crimes to bolster their own border and transportation security as well as strengthen their economic and political viability. National law enforcement and atomic energy agencies in these states are aggressively pursuing a comprehensive strategy to counter nuclear smuggling through increasing reliance on technical nuclear forensics. As part of these activities, it is essential that these organizations be given adequate orientation to the best practices in this emerging discipline including the categorization of interdicted nuclear material, collection of traditional and nuclear forensic evidence, data analysis using optimized analytical protocols, and how to best fuse forensics information with reliable case input to best develop a law enforcement or national security response. The purpose of formalized USG relationship is to establish an institutional framework for collaboration in international forensics, improve standards of forensics practice, conduct joint exercises, and pursue case-work that benefits international security objectives. Just as outreach and formalized relationships are important to cultivate international nuclear forensics, linking nuclear forensics to ongoing national assistance in border and transpiration security, including port of entry of entry monitoring

  2. Britain’s Nuclear Deterrent Force and the U.S.-U.K. Special Relationship

    DTIC Science & Technology

    2014-06-01

    a surprise first-strike. Protecting this dinosaur , by building hardened silos, was beyond the willingness and ability of the British government to...Streak took at least 20 minutes to fuel-up, it was always extremely vulnerable to a surprise first-strike. Protecting this dinosaur , by building hardened

  3. Report of the Defense Science Board Task Force on Nuclear Deterrence

    DTIC Science & Technology

    1998-10-01

    no funding until 2005. The Navy believes production should start in 2015 . Approximately, three hundred missiles is the projected production...the future force structure. 37 System Bombers/Cruise Missiles SSBN/SLBM ICBM Industrial Base 2035/ 2015 2020 Issues/Concerns Continuous...Test (DARHT) - National Ignition Facility ( NIF ) - Enhanced LANSCE - Atlas Pulsed Power Facility - 100-fold improvement in computations - Provides

  4. Driving to Zero: Defining Credible Nuclear Deterrence in an Era of Disarmament

    DTIC Science & Technology

    2012-02-01

    it is not copyrighted, but is the property of the United States government. Biography Lieutenant Colonel Scott Jacobs is a student at the...drives to zero. 1 Introduction On 5 April 2009, President Obama spoke at Hradcany Square in Prague and declared “So today, I state clearly and...representative of different points along the continuum. 1 Remarks By President Barack Obama

  5. Strategic Personality and the Effectiveness of Nuclear Deterrence: Deterring Iraq and Iran

    DTIC Science & Technology

    2001-09-01

    intervention. Pulling those babies out of their incubators was a huge miscalculation, and the new Iraqi regime will take care to ensure such excesses do...demands for democratic reform as the post -revolution “ baby boomers” (who constituted some 65 percent of the population) came of age, embraced Western...vision and values. This US drive to maintain its global freedom-of-action, combined with its post -Cold War strategic hegemony and military

  6. The Credibility of America’s Extended Nuclear Deterrent: The Case of the Republic of Turkey

    DTIC Science & Technology

    2011-09-01

    u t al o n g d o tt ed li n e AIR...Sea Black Sea lllcosla e __d ~,_’:.. Turkey Administrative Divisions -----·--~~-* NllloniiQPibt • ~raM~llf ,.,..._.r:==’=---- 0 100 100~ 100...and ordinary things like that.”2 A few days after authorizing work for a thermonuclear weapon in January 1950, Truman told his staff, “[W] e had

  7. China’s New Undersea Nuclear Deterrent: Strategy, Doctrine, and Capabilities

    DTIC Science & Technology

    2008-01-01

    art form, working together closely to bottle up Soviet forces operating in the Seas of Okhotsk and Japan. These “legacy” systems and well-devel...submarine and ballistic missile forces. They predict that China will soon put to sea an SSBN fleet more symmetrical with the U.S. Navy in terms of both...strike capability. By the late Cold War, 18 Ohio-class SSBNs armed with Trident II sea -launched ballistic mis- siles constituted the U.S. undersea

  8. The Erosion of US Nuclear Deterrence Credibility in the 21st Century

    DTIC Science & Technology

    2010-02-17

    Finally, future asymmetric or cross-domain threats promise to complicate the future geopolitical structure. As Colonel Dawkins wrote in a 2009 paper, a... Dawkins , Colonel James C., Jr., ―Rising Dragon: Deterring China in 2035.‖ Research Report. Maxwell AFB, AL: Air War College, 2009. Defense... Dawkins , ―Rising Dragon: Deterring China in 2035,‖ 39. 45 Congressional Commission, America’s Strategic Posture, 7. 46 Centers for

  9. Can Deterrence Be Tailored? Strategic Forum, Number 225, January 2007

    DTIC Science & Technology

    2007-01-01

    release; distribution unlimited 13. SUPPLEMENTARY NOTES The original document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY... escala - tion—that is, nuclear use during war. If the primary objective were the former, the United States might say, “If you cross the 38th paral- lel

  10. Cyber Deterrence: An Old Concept in a New Domain

    DTIC Science & Technology

    2013-03-01

    In the movie “By Dawn’s Early Light” a rogue Russian general launches a nuclear missile against the US which the US misattributes to the Soviet... piracy by a renegade member of the Khmer Rouge.34 While attribution challenges may increase the risk of misattribution in the cyber domain, these

  11. Post-cold war nuclear dangers: Proliferation and terrorism

    SciTech Connect

    Nuckolls, J.H.

    1995-02-24

    This article discusses several aspects of post cold war nuclear problems facing both the world and the USA. Included are the following topics: four nuclear nightmare scenarios; availability of nuclear weapons, materials, and expertise; US programs to reduce smoggling of nuclear weapons and materials; US options in the future; Global options; and priority actions, including effective nuclear intelligence; read teams to find vulverablities and evaluate countermeasures to nuclear terrorism; accelerate development of advanced detection and disarmament technologies; implement urgent CISAC recommendation on management of nuclear materials and inherent security technologies; accelerate research and development of a globle space-based missile defence; ensure crediability of nuclear deterrent; accelerate development of conventional weapons that reduce the role of nuclear weapons. 9 refs.

  12. Trace Analytical Techniques for Nuclear Forensics

    SciTech Connect

    Halverson, J.E.

    1999-04-28

    Over the history of the Savannah River Site, the Savannah River Technology Center (SRTC) has developed high sensitivity analytical capabilities in support of the Site's Environmental Monitoring Program and nuclear material protection process. Many of these techniques are applicable to the developing need for nuclear forensic analysis capabilities. Radiological and critically control procedures are in place at the SRTC, as well as clean room practices, to minimize the potential for a radiological evidentiary sample to contaminate personnel and the facility, as well as to minimize contaminating the sample thus rendering it useless by law enforcement agencies. Some of the trace analytical techniques available at the SRTC include ultra-low-level gamma and alpha spectrometry, high-sensitivity thermal ionization mass spectrometry, time-of-flight secondary ion mass spectrometry and trace organic analyses. These techniques have been tested during a planned domestic smuggling exercise and in the analysis of an unknown sample.In the event of an interdiction involving the illegal use or movement of radioactive material by U.S. law enforcement agencies (local, state or federal) forensic analyses will be used in developing and building a legal case against the perpetrators. The Savannah River Technology Center (SRTC) at the U.S. Department of Energy's Savannah River Site, a former nuclear production site currently conducting nuclear material stabilization missions, located in Aiken South Carolina, has a long history of performing trace analytical analyses for environmental monitoring. Many of these techniques are also applicable to nuclear forensic analyses. A summary of the trace analytical techniques used at the SRTC, which are applicable to Nuclear Forensics, is presented in this paper.Contamination control, of facilities and personnel involved in the analytical analyses, as well as preventing contamination of the sample, is a unique challenge for nuclear forensic analyses

  13. Essential oil of catnip, Nepeta cataria, as a repellent, an oviposition deterrent and a larvicide against mosquitoes and biting flies

    USDA-ARS?s Scientific Manuscript database

    Presenting brief reviews of using catnip oil as an alternative control agent against biting insects, as well as their newly found larvicidal activities and oviposition deterrence including effectiveness and longevity....

  14. Use of prescription opioids with abuse-deterrent technology to address opioid abuse.

    PubMed

    Michna, Edward; Kirson, Noam Y; Shei, Amie; Birnbaum, Howard G; Ben-Joseph, Rami

    2014-08-01

    The development of new formulations of extended-release (ER) opioids with abuse-deterrent technology attempts to deter prescription opioid abuse while maintaining appropriate access to care for pain patients. This study examined the degree to which some patients may avoid switching to reformulated ER opioids with abuse-deterrent technology and the extent to which those patients are more likely to be abusers. We analyzed Truven MarketScan pharmacy and medical claims data following the introduction of two reformulated ER opioids with abuse-deterrent technology. Adults aged 18-64 who were continuous users of extended-release oxycodone HCl (ER oxycodone) or extended-release oxymorphone HCl (ER oxymorphone) in a 6 month period prior to the introduction of the respective reformulations of those products were identified and categorized based on whether they switched to the reformulation, switched to other ER/long-acting (LA) opioids (without abuse-deterrent technology), or discontinued ER/LA opioid treatment in a 6 month post-reformulation period. Abusers were identified using ICD-9-CM diagnosis codes for opioid abuse/dependence. Pearson's chi-squared tests and Fisher's exact tests were then used to compare rates of abuse between patients who avoided switching to a reformulated ER opioid. Sensitivity analyses examined several definitions used in this analysis. ER/LA opioid utilization; rates of diagnosed opioid abuse. A total of 31%-50% of patients avoided switching to reformulated ER opioids. Rates of diagnosed opioid abuse were higher among these patients compared to patients who transitioned to the reformulated ER opioids. Due to the observational research design, caution is warranted in causal interpretation of the findings. The study was conducted among commercially insured continuous ER oxycodone or ER oxymorphone users; future research should consider additional patient populations, such as non-continuous users and those without commercial insurance (i.e., Medicare

  15. Development concept for a small, split-core, heat-pipe-cooled nuclear reactor

    NASA Technical Reports Server (NTRS)

    Lantz, E.; Breitwieser, R.; Niederauer, G. F.

    1974-01-01

    There have been two main deterrents to the development of semiportable nuclear reactors. One is the high development costs; the other is the inability to satisfy with assurance the questions of operational safety. This report shows how a split-core, heat-pipe cooled reactor could conceptually eliminate these deterrents, and examines and summarizes recent work on split-core, heat-pipe reactors. A concept for a small reactor that could be developed at a comparatively low cost is presented. The concept would extend the technology of subcritical radioisotope thermoelectric generators using 238 PuO2 to the evolution of critical space power reactors using 239 PuO2.

  16. [Excise taxes on tobacco and the problem of smuggling - concerning the credibility of the tobacco industry's "Discarded-Cigarette-Packages-Study"].

    PubMed

    Adams, M; Effertz, T

    2011-10-01

    The consumption of tobacco products is one of the main causes of illnesses. An often neglected but highly effective instrument for fiscal and preventive purposes is higher taxes on tobacco products. The tobacco industry however claims that higher taxes have tremendous effects on smuggling activity with additional costs with regard to law enforcement. The claim appears to be substantiated by a study which collects and documents the amounts of discarded empty cigarette packs, and which is used to estimate the fraction of illegally imported cigarettes. We show that this study makes use of systematic misspecifications and impreciseness and thus seems to pursue the aim of showing an exaggerated high amount of illegally imported cigarettes. The industry's claim that two thirds of non-taxed cigarettes in Germany are imported illegally, thus lacks any sound, well-grounded empirical corroboration. © Georg Thieme Verlag KG Stuttgart · New York.

  17. Cyber Attacks, Attribution, and Deterrence: Three Case Studies

    DTIC Science & Technology

    2015-05-23

    6 first use of nuclear weapons.15 In the early 1990’s Russian theorists began discussing using malware as a force multiplier in future conflicts...available for public review. This paper will not examine routine malware , used for criminal financial gain or mischief, since there is no...then the technique was well proven and expanded for the attacks on Georgia. Stuxnet In 2010, a new malware program named Stuxnet made its way

  18. The Intercontinental Ballistic Missile and Post Cold War Deterrence

    DTIC Science & Technology

    2010-02-17

    current conventional weapons effects, but vulnerable to nuclear weapons. Advances in conventional weapons capabilities, to include ― bunker busters ...heavier warheads or longer ranges) coupled with an increased accuracy would result in better target kill. ICBMs were newly available, the size of...air defenses as would the bomber force. An 5 on alert status provided an immediate strike capability. The ICBM warhead would also be an effective

  19. Extended Deterrence and Arms Control: A Collection of Conference Papers

    DTIC Science & Technology

    1988-05-01

    presented at the conference. It should be of interest to analysts working on political and defense issues. The views expressed by the authors should be...complete and the scheduled FY87 IOC will be met; additionally, work has begun on a simi- lar modernization of the Fylingdales site; - progress continues...on the development of the Nuclear Detonation Detection System, and we are working suc- cessfully toward an FOC late in this decade; - by the end of

  20. Feeding deterrent and growth inhibitory activities of PONNEEM, a newly developed phytopesticidal formulation against Helicoverpa armigera (Hubner)

    PubMed Central

    Packiam, Soosaimanickam Maria; Baskar, Kathirvelu; Ignacimuthu, Savarimuthu

    2014-01-01

    Objective To assess the feeding deterrent, growth inhibitory and egg hatchability effects of PONNEEM on Helicoverpa armigera (H. armigera). Methods Five oil formulations were prepared at different ratios to assess the feeding deterrent, growth inhibitory and egg hatchability effects on H. armigera. Results Invariably all the newly formulated phytopesticidal oil formulations showed the feeding deterrent and growth inhibitory activities against H. armigera. The maximum feeding deterrent activity of 88.44% was observed at 15 µL/L concentration of PONNEEM followed by formulation A (74.54%). PONNEEM was found to be effective in growth inhibitory activities and egg hatchability at 10 µL/L concentration. It exhibited statistically significant feeding deterrent activity and growth inhibitory activity compared with all the other treatments. Conclusions PONNEEM was found to be effective phytopesticidal formulation to control the larval stage of H. armigera. This is the first report for the feeding deterrent activity of PONNEEM against H. armigera. This newly formulated phytopesticide was patented in India. PMID:25183105

  1. Detection of Shielded Nuclear Material in a Cargo Container

    SciTech Connect

    J. L. Jones; D. R. Norman; K. J. Haskell; J. W. Sterbentz; W. Y. Yoon; S. M. Watson; J. T. Johnson; J. M. Zabriskie; B. D. Bennett; R. W. Watson; J. F. Hamon

    2005-06-01

    The Idaho National Laboratory, along with Los Alamos National Laboratory and the Idaho State University’s Idaho Accelerator Center, are developing electron accelerator-based, photonuclear inspection technologies for the detection of shielded nuclear material within air-, rail-, and especially, maritime-cargo transportation containers. This paper describes a developing prototypical cargo container inspection system utilizing the Pulsed Photonuclear Assessment (PPA) technology, incorporates interchangeable, well-defined, contraband shielding structures (i.e., "calibration" pallets) providing realistic detection data for induced radiation signatures from smuggled nuclear material, and provides various shielded nuclear material detection results. Using a 4.8-kg quantity of depleted uranium, neutron and gamma-ray detection responses are presented for well-defined shielded and unshielded configurations evaluated in a selected cargo container inspection configuration. © 2001 Elsevier Science. All rights reserved

  2. In-field analysis and assessment of nuclear material

    SciTech Connect

    Morgado, R.E.; Myers, W.S.; Olivares, J.A.; Phillips, J.R.; York, R.L.

    1996-05-01

    Los Alamos National Laboratory has actively developed and implemented a number of instruments to monitor, detect, and analyze nuclear materials in the field. Many of these technologies, developed under existing US Department of Energy programs, can also be used to effectively interdict nuclear materials smuggled across or within national borders. In particular, two instruments are suitable for immediate implementation: the NAVI-2, a hand-held gamma-ray and neutron system for the detection and rapid identification of radioactive materials, and the portable mass spectrometer for the rapid analysis of minute quantities of radioactive materials. Both instruments provide not only critical information about the characteristics of the nuclear material for law-enforcement agencies and national authorities but also supply health and safety information for personnel handling the suspect materials.

  3. Nuclear Resonance Fluorescence Measurements on ^237Np for Security and Safeguards Applications

    NASA Astrophysics Data System (ADS)

    Angell, C. T.; Joshi, T.; Yee, Ryan; Norman, E. B.; Kulp, W. D.; Warren, G. A.; Korbly, S.; Klimenko, A.; Wilson, C.; Copping, R.; Shuh, D. K.

    2009-10-01

    The smuggling of nuclear material and the diversion of fissile material for covert weapon programs both present grave risks to world security. Methods are needed to detect nuclear material smuggled in cargo, and for proper material accountability in civilian fuel re-processing facilities. Nuclear resonance fluorescence (NRF) is a technique that can address both needs. It is a non-destructive active interrogation method that provides isotope-specific information. It works by using a γ-ray beam to resonantly excite levels in a nucleus and observing the γ-rays emitted whose energy and intensity are characteristic of that isotope. ^237Np presents significant safeguard challenges; it is fissile yet currently has fewer safeguard restrictions. NRF measurements on ^237Np will expand the nuclear database and will permit designing interrogation and assay systems. Measurements were made using the bremsstrahlung beam at the HVRL at MIT on a 7 g target of ^237Np with two incident electron energies of 2.8 and 3.1 MeV. Results will be presented with discussion of the relevant nuclear structure necessary to predict levels in other actinides.

  4. Relationship between deterrence and toxicity of plant secondary compounds for the grasshopperSchistocerca americana.

    PubMed

    Bernays, E A

    1991-12-01

    A variety of plant secondary compounds, several of which are quite widespread in nature were tested for their deterrence to the generalist grasshopperSchistocerca americana in short-term behavioral assays. The compounds were coumarin, salicin, tannic acid, gramine, nicotine, quinine, carvone, geraniol, abietic acid, umbelliferone, and ursolic acid. These were then tested for their post-ingestional effects over the whole of the last larval instar. Different methods were employed to mask the taste of compounds that were deterrent in order to ensure that any effects were not due to reduced feeding. In no case was there any indication of a detrimental effect or any trend suggesting one. In two cases, there was a significant increase in growth rate with the addition of the secondary compound to the diet. The evolutionary implications of these findings are discussed.

  5. Pungent spices, ground red pepper, and synthetic capsaicin as onion fly ovipositional deterrents.

    PubMed

    Cowles, R S; Keller, J E; Miller, J R

    1989-02-01

    In laboratory choice experiments, the spices dill, paprika, black pepper, chili powder, ginger, and red pepper deterredDelia antiqua oviposition by 88-100%. Dose-response choice tests demonstrated that 1 mg of ground cayenne pepper (GCP) placed within 1 cm of artificial onion foliage reduced oviposition by 78%. A synthetic analog of capsaicin, the principal flavor ingredient of red peppers, deterred oviposition by 95% when present at 320 ppm in the top centimeter of sand (the ovipositional substrate). However, in no-choice conditions 10 mg GCP was not an effective deterrent. Sevana Bird Repellent and Agrigard Insect Repellent both use red pepper as a principal ingredient; at recommended field rates, neither of these materials was an effective ovipositional deterrent either in laboratory or field. Capsaicin-based materials do not appear to be candidates for onion maggot control via behavioral modification.

  6. Abuse-deterrent formulations of prescription opioid analgesics in the management of chronic noncancer pain.

    PubMed

    Hale, Martin E; Moe, Derek; Bond, Mary; Gasior, Maciej; Malamut, Richard

    2016-10-01

    Misuse, abuse and diversion of prescription opioid analgesics represent a global public health concern. The development of abuse-deterrent formulations (ADFs) of prescription opioid analgesics is an important step toward reducing abuse and diversion of these medications, as well as potentially limiting medical consequences when misused or administered in error. ADFs aim to hinder extraction of the active ingredient, prevent administration through alternative routes and/or make abuse of the manipulated product less attractive, less rewarding or aversive. However, opioid ADFs may still be abused via the intended route of administration by increasing the dose and/or dosing frequency. The science of abuse deterrence and the regulatory landscape are still relatively new and evolving. This paper reviews the current status of opioid ADFs, with particular focus on different approaches that can be used to deter abuse, regulatory considerations and implications for clinical management.

  7. Deterrent activity of plant lectins on cowpea weevil Callosobruchus maculatus (F.) oviposition.

    PubMed

    Sadeghi, Amin; Van Damme, Els J M; Peumans, Willy J; Smagghe, Guy

    2006-09-01

    A set of 14 plant lectins was screened in a binary choice bioassay for inhibitory activity on cowpea weevil Callosobruchus maculatus (F.) oviposition. Coating of chickpea seeds (Cicer arietinum L.) with a 0.05% (w/v) solution of plant lectins caused a significant reduction in egg laying. Control experiments with heat inactivated lectin and BSA indicated that the observed deterrent effects are specific and require carbohydrate-binding activity. However, no clear correlation could be established between deterrent activity and sugar-binding specificity/molecular structure of the lectins. Increasing the insect density reduced the inhibitory effect of the lectins confirming that female insects are capable of adjusting their oviposition rates as a function of host availability.

  8. A Statistical Model for Generating a Population of Unclassified Objects and Radiation Signatures Spanning Nuclear Threats

    SciTech Connect

    Nelson, K; Sokkappa, P

    2008-10-29

    This report describes an approach for generating a simulated population of plausible nuclear threat radiation signatures spanning a range of variability that could be encountered by radiation detection systems. In this approach, we develop a statistical model for generating random instances of smuggled nuclear material. The model is based on physics principles and bounding cases rather than on intelligence information or actual threat device designs. For this initial stage of work, we focus on random models using fissile material and do not address scenarios using non-fissile materials. The model has several uses. It may be used as a component in a radiation detection system performance simulation to generate threat samples for injection studies. It may also be used to generate a threat population to be used for training classification algorithms. In addition, we intend to use this model to generate an unclassified 'benchmark' threat population that can be openly shared with other organizations, including vendors, for use in radiation detection systems performance studies and algorithm development and evaluation activities. We assume that a quantity of fissile material is being smuggled into the country for final assembly and that shielding may have been placed around the fissile material. In terms of radiation signature, a nuclear weapon is basically a quantity of fissile material surrounded by various layers of shielding. Thus, our model of smuggled material is expected to span the space of potential nuclear weapon signatures as well. For computational efficiency, we use a generic 1-dimensional spherical model consisting of a fissile material core surrounded by various layers of shielding. The shielding layers and their configuration are defined such that the model can represent the potential range of attenuation and scattering that might occur. The materials in each layer and the associated parameters are selected from probability distributions that span the

  9. Plant secondary compounds as oviposition deterrents for cabbage butterfly,Pieris rapae (Lepidoptera: Pieridae).

    PubMed

    Tabashnik, B E

    1987-02-01

    Oviposition byPieris rapae butterflies was deterred by spraying the plant secondary compounds coumarin and rutin on cabbage plants in greenhouse choice tests. In no-choice tests ranging from 5 min to 24 hr, acceptance of rutin-treated plants for oviposition increased with trial duration. Both coumarin and rutin deterred oviposition primarily by affecting prealighting rather than postalighting behavior, indicating that deterrence was mediated by noncontact cues.

  10. Deterrence & Influence in Counterterrorism. A Component in the War on al Qaeda

    DTIC Science & Technology

    2002-02-01

    Duncan , and Jeffrey Simon, “U.S. Countermeasures Against Terrorism.” 20See also National Commission on Terrorism (2000). 58 Deterrence and Influence in...Leadership + Cyberspace infrastructure + C3 and industry Tanks, soldiers Soft factors Current State of the art ? Goal + Integration and adaptation...Green Berets, he served in the Dominican Republic during the American inter- vention, and later in Vietnam (1966–1967), where he was deco - rated on

  11. Deterrence and the Future of U.S.-GCC Defense Cooperation: A Strategic Dialogue Event

    DTIC Science & Technology

    2015-07-01

    viable are the UAE, Turkey, Egypt, and Saudi Arabia. Jordan is considered an outlier due to the discovery of uranium deposits in the country...Deterrence, Assurance, Middle East, Gulf Cooperation Council, GCC, Iran, Turkey, Jordan , Iraq, Syria, Saudi Arabia, Oman, United Arab Emirates, UAE...United States, the five GCC states (Saudi Arabia, United Arab Emirates, Qatar, Oman, Kuwait, and Bahrain), Jordan , and Turkey to engage in an

  12. Reinforcing Deterrence on NATO’s Eastern Flank: Wargaming the Defense of the Baltics

    DTIC Science & Technology

    2016-01-01

    the outskirts of Tallinn and Riga is 60 hours. • Such a rapid defeat would leave NATO with a limited number of options, all bad . • Having a force of...of Tallinn and Riga, respectively, is 60 hours. Such a rapid defeat would leave NATO with a limited number of options, all bad : a bloody... powerful coalition, a war Moscow must fear it would be likely to lose. Crafting this deterrent posture would not be inexpensive in absolute terms, with

  13. Identification of mosquito biting deterrent constituents from the Indian folk remedy plant Jatropha curcas.

    PubMed

    Cantrell, Charles L; Ali, Abbas; Duke, Stephen O; Khan, Ikhlas

    2011-07-01

    An investigation of the Indian folk remedy plant Jatropha curcas L., was performed to identify the constituents responsible for the mosquito biting deterrent activity of the oil. J. curcas seed oil is burned in oil lamps in India and parts of Africa to repel biting insects, primarily mosquitoes. The seed oil was thoroughly analyzed by 1H NMR, 13C NMR, high-performance liquid chromatography-refractive index, and gas chromatography-flame ionization detection to identify the constituents in the oil. Identified constituents, both free fatty acids and triglycerides, were evaluated for activity in Aedes aegypti (L.) (Diptera: Culicidae) biting deterrent assays. Furthermore, an oil condensation trap was used to demonstrate that free fatty acids or triglycerides are partially volatilized during the combustion process. These compounds were found to be responsible for the biting deterrency of the burned oil. Specifically, oleic, palmitic, linoleic, and stearic acids were all active at 25 nmol/cm2 above that of solvent control in Ae. aegypti biting deterrent assays. Oleic, palmitic, and linoleic acids were all more active than stearic acid in the same bioassay. Evaluation of the triglycerides containing each of these fatty acids revealed that tripalmitin, tristearin, trilinolein, and triolein all demonstrated significant activity above a solvent control at 10 microg/cm2, whereas tripalmitin was the most active. Due to literature reports suggesting larvicidal activity of the oil, J. curcas seed oil and its free fatty acid constituents also were evaluated against 1-d-old Ae. aegypti larvae up to 500 ppm. Oleic acid was the only fatty acid having larvicidal activity against 1-d-old Ae. aegypti larvae, with an LD50 of 47.9 ppm.

  14. Only in the Mind of the Enemy: Can Deterrence Effectiveness be Measured?

    DTIC Science & Technology

    2011-06-10

    use of positive incentives in addition to the developing a fear of negative consequences.4 The study by Paul Huth and Bruce Russett tried to...threat of unacceptable counteraction.”2 This chapter further discusses two methods used to deter adversary aggression through denial and punishment ...benefit analysis into believing that any perceived benefits are unlikely to be gained. The second method is deterrence by punishment . The

  15. An overview of prodrug technology and its application for developing abuse-deterrent opioids.

    PubMed

    Gudin, Jeffrey A; Nalamachu, Srinivas R

    2016-01-01

    The Centers for Disease Control and Prevention has classified prescription drug abuse and overdose deaths as an epidemic. Prescription drug overdose is now the leading cause of injury death, with rates that have more than doubled since 1999. This crisis has developed concurrently with the increased prescribing and availability analgesic drugs, especially opioids, resulting from an effort on the part of clinicians to address a critical need for improved pain assessment and treatment. Clinicians have recognized that oftentimes, opioid analgesics are one of the few remaining options for patients who suffer with severe pain. A 2015 fact sheet issued by the Office of National Drug Policy stated: "While we must ensure better access to prescription medications to alleviate suffering, it is also vital that we do all we can to reduce the diversion and abuse of pharmaceuticals." The US Food and Drug Administration has issued guidance that encourages the research and development of abuse-deterrent formulation of opioids which have the potential to curtail abuse. Included among the recommended formulations for development of abuse-deterrent opioids are prodrugs. Prodrugs are chemically modified versions of pharmacological agents that must undergo a biochemical conversion following administration, often by enzymatic cleavage, to free the active drug. Prodrugs may be inherently abuse-deterrent because they are inactive or significantly less active until conversion to the active drug. This requirement for conversion in the GI tract can modify the pharmacokinetic profile and eliminate or reduce the euphoria when abusers change the route of administration. Abusers often attempt to extract the active drug for injection or insufflation. Prodrugs can be designed to be resistant to crushing or dissolving. In this article, we review the concept of prodrugs and introduce and examine the potential of abuse-deterrent opioid prodrugs.

  16. Evaluating the Effectiveness of an Ultrasonic Acoustic Deterrent for Reducing Bat Fatalities at Wind Turbines

    PubMed Central

    Arnett, Edward B.; Hein, Cris D.; Schirmacher, Michael R.; Huso, Manuela M. P.; Szewczak, Joseph M.

    2013-01-01

    Large numbers of bats are killed by wind turbines worldwide and minimizing fatalities is critically important to bat conservation and acceptance of wind energy development. We implemented a 2-year study testing the effectiveness of an ultrasonic acoustic deterrent for reducing bat fatalities at a wind energy facility in Pennsylvania. We randomly selected control and treatment turbines that were searched daily in summer and fall 2009 and 2010. Estimates of fatality, corrected for field biases, were compared between treatment and control turbines. In 2009, we estimated 21–51% fewer bats were killed per treatment turbine than per control turbine. In 2010, we determined an approximate 9% inherent difference between treatment and control turbines and when factored into our analysis, variation increased and between 2% more and 64% fewer bats were killed per treatment turbine relative to control turbines. We estimated twice as many hoary bats were killed per control turbine than treatment turbine, and nearly twice as many silver-haired bats in 2009. In 2010, although we estimated nearly twice as many hoary bats and nearly 4 times as many silver-haired bats killed per control turbine than at treatment turbines during the treatment period, these only represented an approximate 20% increase in fatality relative to the pre-treatment period for these species when accounting for inherent differences between turbine sets. Our findings suggest broadband ultrasound broadcasts may reduce bat fatalities by discouraging bats from approaching sound sources. However, effectiveness of ultrasonic deterrents is limited by distance and area ultrasound can be broadcast, in part due to rapid attenuation in humid conditions. We caution that an operational deterrent device is not yet available and further modifications and experimentation are needed. Future efforts must also evaluate cost-effectiveness of deterrents in relation to curtailment strategies to allow a cost-benefit analysis for

  17. Evaluating the effectiveness of an ultrasonic acoustic deterrent for reducing bat fatalities at wind turbines

    USGS Publications Warehouse

    Arnett, Edward B.; Hein, Cris D.; Schirmacher, Michael R.; Huso, Manuela M.P.; Szewczak, Joseph M.

    2013-01-01

    Large numbers of bats are killed by wind turbines worldwide and minimizing fatalities is critically important to bat conservation and acceptance of wind energy development. We implemented a 2-year study testing the effectiveness of an ultrasonic acoustic deterrent for reducing bat fatalities at a wind energy facility in Pennsylvania. We randomly selected control and treatment turbines that were searched daily in summer and fall 2009 and 2010. Estimates of fatality, corrected for field biases, were compared between treatment and control turbines. In 2009, we estimated 21–51% fewer bats were killed per treatment turbine than per control turbine. In 2010, we determined an approximate 9% inherent difference between treatment and control turbines and when factored into our analysis, variation increased and between 2% more and 64% fewer bats were killed per treatment turbine relative to control turbines. We estimated twice as many hoary bats were killed per control turbine than treatment turbine, and nearly twice as many silver-haired bats in 2009. In 2010, although we estimated nearly twice as many hoary bats and nearly 4 times as many silver-haired bats killed per control turbine than at treatment turbines during the treatment period, these only represented an approximate 20% increase in fatality relative to the pre-treatment period for these species when accounting for inherent differences between turbine sets. Our findings suggest broadband ultrasound broadcasts may reduce bat fatalities by discouraging bats from approaching sound sources. However, effectiveness of ultrasonic deterrents is limited by distance and area ultrasound can be broadcast, in part due to rapid attenuation in humid conditions. We caution that an operational deterrent device is not yet available and further modifications and experimentation are needed. Future efforts must also evaluate cost-effectiveness of deterrents in relation to curtailment strategies to allow a cost-benefit analysis for

  18. From Power Projection To Power Protection: Revitalizing Conventional Deterrence In NATO

    DTIC Science & Technology

    2016-06-01

    a neighboring country (as in the case of Iraq’s seizure of Kuwait) is extremely difficult to reverse. Alexander George and William Simons Old...L. George and William E. Simons , The Limits of Coercive Diplomacy (Boulder, CO: Westview Press, 1994), 7. 10. Edward Rhodes, “Conventional...closer to immediate deterrence, it takes on forms that resemble other types of coercion. Alexander George and William Simons described blackmail and

  19. Advanced techniques for the analysis of crisis stability, deterrence, and latency

    SciTech Connect

    Canavan, G.H.

    1997-12-01

    Studies on crisis stability, deterrence, and latency are presented in chronological order, which also reflects their logical order of development, captures the main features of stability analysis; relates first strike, crisis, and arms control stability as seen from US and Russian perspective; and addresses questions such as whether uncertainty in damage preference or defense deployment can be destabilizing. It illustrates the problems with alternative metrics, latency and reconstitution, and deep unilateral and proportional force reductions.

  20. Biosynthesis and Regulation of Bioprotective Alkaloids in the Gramineae Endophytic Fungi with Implications for Herbivores Deterrents.

    PubMed

    Luo, Hongping; Xie, Longxiang; Zeng, Jie; Xie, Jianping

    2015-12-01

    Four kinds of bioprotective alkaloids-peramine, loline, ergot alkaloid, indole-diterpenes, produced by grass-fungal endophyte symbioses, are deterrents or toxic to vertebrate and invertebrate herbivores. Ergot alkaloids have pharmacological properties and widely are used clinically. The regulation of alkaloids biosynthesis is under intensive study to improve the yield for better agricultural and medicinal application. In this paper, we summarize the structure, related genes, regulation, and toxicity of alkaloids. We focus on the biosynthesis and the regulation network of alkaloids.

  1. Lactones: Part 11. Feeding-deterrent activity of some bi- and tricyclic terpenoid lactones.

    PubMed

    Paruch, E; Nawrot, J; Wawrzeńczyk, C

    2001-09-01

    The feeding-deterrent activities of thirteen synthetic terpenoid lactones, including isomeric bicyclic gamma-spirolactones with the limonene system and tricyclic gamma-lactones with the pinane system, were determined towards three storage pest insects: the adults of Sitophilus granarius, the adults and larvae of Tribolium confusum and the larvae of Trogoderma granarium. The configuration of chiral centres, as well as the presence of additional functional groups (double bond, iodine and hydroxy group) are important for antifeeding activity.

  2. The Major Asian Powers and the Korean Reunification Process: Catalysts or Deterrents?

    DTIC Science & Technology

    1986-06-01

    RD-Ai65 128 THE MAJOR ASIAN POWERS AND THE KOREAN REUNIFICATION 1/2 PROCESS- CATALYSTS OR DETERRENTS?(U) DEFENSE INTELLIGENCE COLL WASHINGTON DC J J...the Korean cultural heritage. This was followed by a review of current economic, political, social, and military systems in North and South Korea ... Korean question. This material supplemented details from current news media on North-South Korean rapprochement and major power actions vis-a-vis Korea

  3. Evaluating the Effectiveness of an Ultrasonic Acoustic Deterrent for Reducing Bat Fatalities at Wind Turbines.

    PubMed

    Arnett, Edward B; Hein, Cris D; Schirmacher, Michael R; Huso, Manuela M P; Szewczak, Joseph M

    2013-01-01

    Large numbers of bats are killed by wind turbines worldwide and minimizing fatalities is critically important to bat conservation and acceptance of wind energy development. We implemented a 2-year study testing the effectiveness of an ultrasonic acoustic deterrent for reducing bat fatalities at a wind energy facility in Pennsylvania. We randomly selected control and treatment turbines that were searched daily in summer and fall 2009 and 2010. Estimates of fatality, corrected for field biases, were compared between treatment and control turbines. In 2009, we estimated 21-51% fewer bats were killed per treatment turbine than per control turbine. In 2010, we determined an approximate 9% inherent difference between treatment and control turbines and when factored into our analysis, variation increased and between 2% more and 64% fewer bats were killed per treatment turbine relative to control turbines. We estimated twice as many hoary bats were killed per control turbine than treatment turbine, and nearly twice as many silver-haired bats in 2009. In 2010, although we estimated nearly twice as many hoary bats and nearly 4 times as many silver-haired bats killed per control turbine than at treatment turbines during the treatment period, these only represented an approximate 20% increase in fatality relative to the pre-treatment period for these species when accounting for inherent differences between turbine sets. Our findings suggest broadband ultrasound broadcasts may reduce bat fatalities by discouraging bats from approaching sound sources. However, effectiveness of ultrasonic deterrents is limited by distance and area ultrasound can be broadcast, in part due to rapid attenuation in humid conditions. We caution that an operational deterrent device is not yet available and further modifications and experimentation are needed. Future efforts must also evaluate cost-effectiveness of deterrents in relation to curtailment strategies to allow a cost-benefit analysis for

  4. SIGNALING THE END OF DETERRENCE AFFORDED BY DUAL CAPABLE AIRCRAFT

    DTIC Science & Technology

    2017-04-06

    Germany’s defense minister to Trump : No, we don’t owe NATO money,” CNN, 20 March 2017. 52 Pew Research Center, “NATO Publics Blame Russia for Ukrainian...release/148024/dutch-government- explainsf_35-decision.html Euan McKidy, “Germany’s defense minister to Trump : No, we don’t owe NATO money,” CNN...20 March 2017, http://www.cnn.com/2017/03/politics/nato-commitment-germany-reacts- trump /index.html. Germany: Nuclear power plants to close by

  5. The Clinical Applications of Extended-Release Abuse-Deterrent Opioids.

    PubMed

    Vadivelu, Nalini; Schermer, Erika; Kodumudi, Gopal; Berger, Jack M

    2016-07-01

    Opioids are the mainstay for treatment of acute pain and cancer pain, and also have a role in the treatment of chronic non-malignant pain. There has been, however, a growing public health problem stemming from the misuse of opioid analgesics leading to serious consequences. To deter abuse, new formulations of extended-release opioid analgesics and tamper-resistant opioids have recently been developed. The concept of abuse-deterrent extended-release opioids is relatively new and, although abuse may not be completely prevented, the utilization of such abuse-deterrent extended-release opioids could reduce this risk. Extended-release abuse-deterrent opioids have been found to have important clinical applications in cancer, acute pain, and chronic non-malignant pain for analgesia control with decreased incidence of tampering and abuse. In this review, different extended-release formulations of opioids available for clinical applications are presented with descriptions of the formulations, their physical properties, and the clinical studies performed to provide physicians with a better understanding of their uses.

  6. Chemical Constituents of Supercritical Extracts from Alpinia officinarum and the Feeding Deterrent Activity against Tribolium castaneum.

    PubMed

    Xin, Mintong; Guo, Shanshan; Zhang, Wenjuan; Geng, Zhufeng; Liang, Junyu; Du, Shushan; Deng, Zhiwei; Wang, Yongyan

    2017-04-18

    Alpinia officinarum has been confirmed to possess bioactivities against some pests. In this work, a sample was obtained from A. officinarum rhizomes by supercritical fluid CO₂ extraction (SFE). According to GC-MS analysis, the main chemical components for SFE-sample included benzylacetone (26.77%), 1,7-diphenyl-5-hydroxy-3-heptanone (17.78%), guaiacylacetone (10.03%) and benzenepropanal (7.42%). The essential oil of A. officinarum rhizomes (LD50 = 20.71 μg/adult) exhibited more contact toxicity than SFE extract (LD50 = 82.72 μg/adult) against Tribolium castaneum. From SFE extracts, one new compound, 1-phenyl-4-(16,17-dimethyl-9,13-octadiene)-5-isopentenyl-7-(4"-methoxyl-3"-hydroxyl-phenyl)-3-heptanone (3), together with five known compounds identified as 5-hydroxy-1,7-diphenyl-3-heptanone (1), 1,7-diphenyl-4-hepten-3-one (2), galangin (4), galangin-3-methyl ether (5) and pinocembrin (6), were isolated and their feeding deterrent activities against T. castaneum adults were assessed. It was found that compounds 1-6 had feeding deterrent activities against T. castaneum with feeding deterrent indices of 18.21%, 18.94%, 19.79%, 26.99%, 20.34%, and 35.81%, respectively, at the concentration of 1500 ppm. Hence, the essential oil and SFE extracts/compounds of A. officinarum rhizomes represent promising alternatives in the control of T. castaneum adults.

  7. In Vitro and In Vivo Evaluation of Infestation Deterrents Against Lice.

    PubMed

    Yoon, Kyong Sup; Ketzis, Jennifer K; Andrewes, Samuel W; Wu, Christopher S; Honraet, Kris; Staljanssens, Dorien; Rossel, Bart; Marshall Clark, J

    2015-09-01

    The human head louse is a cosmopolitan ectoparasite and frequently infests many people, particularly school-age children. Due to widespread pyrethroid resistance and the lack of efficient resistance management, there has been a considerable interest in the protection of uninfested people and prevention of reinfestation by disrupting lice transfer. In this study, two nonclinical model systems (in vitro and in vivo) were used to determine the efficacy of the infestation deterrents, Elimax lotion and Elimax shampoo, against human head lice or poultry chewing lice, respectively. With in vitro assessments, female head lice exhibited significantly higher avoidance responses to hair tufts treated with either of the test formulations, which led to significantly higher ovipositional avoidance when compared with female lice on control hair tufts. Additionally, both formulations were determined to be competent infestation deterrents in a competitive avoidance test in the presence of a known attractant (head louse feces extract). In in vivo assessments using a previously validated poultry model, Elimax shampoo was determined to be an efficacious deterrent against poultry chewing lice within Menopon spp. and Menacanthus spp. © The Authors 2015. Published by Oxford University Press on behalf of Entomological Society of America.

  8. In Vitro and In Vivo Evaluation of Infestation Deterrents Against Lice

    PubMed Central

    Yoon, Kyong Sup; Ketzis, Jennifer K.; Andrewes, Samuel W.; Wu, Christopher S.; Honraet, Kris; Staljanssens, Dorien; Rossel, Bart; Marshall Clark, J.

    2015-01-01

    The human head louse is a cosmopolitan ectoparasite and frequently infests many people, particularly school-age children. Due to widespread pyrethroid resistance and the lack of efficient resistance management, there has been a considerable interest in the protection of uninfested people and prevention of reinfestation by disrupting lice transfer. In this study, two nonclinical model systems (in vitro and in vivo) were used to determine the efficacy of the infestation deterrents, Elimax lotion and Elimax shampoo, against human head lice or poultry chewing lice, respectively. With in vitro assessments, female head lice exhibited significantly higher avoidance responses to hair tufts treated with either of the test formulations, which led to significantly higher ovipositional avoidance when compared with female lice on control hair tufts. Additionally, both formulations were determined to be competent infestation deterrents in a competitive avoidance test in the presence of a known attractant (head louse feces extract). In in vivo assessments using a previously validated poultry model, Elimax shampoo was determined to be an efficacious deterrent against poultry chewing lice within Menopon spp. and Menacanthus spp. PMID:26336209

  9. Fouling deterrence on the bivalve shell Mytilus galloprovincialis: a physical phenomenon?

    PubMed

    Scardino, Andrew J; de Nys, Rocky

    2004-01-01

    The physical nature of fouling deterrence by the mussel Mytilus galloprovincialis was investigated using high-resolution biomimics of the bivalve surface. The homogeneous microtextured surface of M. galloprovincialis (1.94 +/- 0.03 microm), the smooth surface of the bivalve Amusium balloti (0 microm), and moulds of these surfaces (biomimics) were compared with controls of smooth (0 microm) and sanded moulds, (55.4 +/- 2.7 microm) and PVC strips (0 microm) in a 12-week field trial. The shell and mould of M. galloprovincialis were fouled by significantly fewer species and had significantly less total fouling cover than the shell and mould of A. balloti over a 12-week period. However, the major effects were between surfaces with and without microtopography. Surface microtopography, be it structured as in the case of M. galloprovincialis shell and mould, or random as in the case of the sanded mould, had a lower cover of fouling organisms than treatments without microtopography after 6 weeks. There was also no difference between the effect of the M. galloprovincialis mould and the sanded mould. The strong fouling deterrent effects of both these surfaces diminished rapidly after 6 to 8 weeks while that of M. galloprovincialis shell remained intact for the duration of the experiment suggesting factors in addition to surface microtopography contribute to fouling deterrence.

  10. A quantitative in vitro assay for chemical mosquito-deterrent activity without human blood cells.

    PubMed

    Klun, Jerome A; Kramer, Matthew; Zhang, Aijun; Wang, Shifa; Debboun, Mustapha

    2008-12-01

    We report that an aqueous solution containing 10(-3) M adenosine triphosphate (ATP) and citrate-phosphate-dextrose-adenine (CPDA-1) can effectively replace transfusable human red blood cells in an in vitro Klun and Debboun bioassay system for evaluating chemicals for mosquito feeding-deterrent activity, using either Aedes aegypti or Anopheles stephensi. These species fed with similar avidity through collagen membrane covering aqueous 10(-3) M ATP plus CPDA-1 or red blood cells in CPDA-1 supplemented with ATP. In a 2nd experiment, we evaluated the feeding-deterrent activity of N,N-diethyl-3-methylbenzamide and a newly discovered natural product chemical, (-)-isolongifolenone, against these 2 mosquito species. We found that the feeding-deterrent efficacy of the 2 chemicals was similar whether the feeding stimulant was red blood cells supplemented with ATP or ATP alone with CPDA-1. Since the use of human red blood cells in bioassays raises important health and logistic issues, aqueous ATP with CPDA-1 is a reasonable alternative to human blood cells for routine in vitro chemical screening.

  11. Abuse-deterrent formulations: part 2: commercial products and proprietary technologies.

    PubMed

    Mastropietro, David J; Omidian, Hossein

    2015-02-01

    Increased misuse and abuse of prescription pain medications has driven extensive research and development to produce what are best known as abuse-deterrent formulations (ADFs). The ADFs are intended to prevent, impede or discourage physical and chemical tampering while still being able to provide safe and accurate delivery of an abusable medication for therapeutic benefit. This review primarily focuses on patents and company literature regarding the formulations, manufacturing and physiochemical properties of abuse-deterrent compositions. Also included are journal articles with relevance to the development of these novel technologies. Particular attention is given to oral dosage forms with applications found in prescription drug products, over-the-counter medications and proprietary technologies in development. Overall, the formulations of 14 drug products, 2 meth-resistant cold products and 17 pharmaceutical proprietary technologies are explored in detail. Despite the introduction of a wide range of formulation and technology interventions with different deterrence potential, the progression of these technologies seems to be moving from inhibiting only one type of abuse to stopping multiple types of tampering methods. Information on inherent strengths and weaknesses of various formulations can be utilized in the development of more robust and resistant ADF in the future.

  12. Donating blood: a meta-analytic review of self-reported motivators and deterrents.

    PubMed

    Bednall, Timothy C; Bove, Liliana L

    2011-10-01

    Although research on blood donor motivation abounds, most studies have typically focused on small sets of variables, used different terminology to label equivalent constructs, and have not attempted to generalize findings beyond their individual settings. The current study sought to synthesize past findings into a unified taxonomy of blood donation drivers and deterrents and to estimate the prevalence of each factor across the worldwide population of donors and eligible nondonors. Primary studies were collected, and cross-validated categories of donation motivators and deterrents were developed. Proportions of first-time, repeat, lapsed, apheresis, and eligible nondonors endorsing each category were calculated. In terms of motivators, first-time and repeat donors most frequently cited convenience, prosocial motivation, and personal values; apheresis donors similarly cited the latter 2 motivators and money. Conversely, lapsed donors more often cited collection agency reputation, perceived need for donation, and marketing communication as motivators. In terms of deterrents, both donors and nondonors most frequently referred to low self-efficacy to donate, low involvement, inconvenience, absence of marketing communication, ineffective incentives, lack of knowledge about donating, negative service experiences, and fear. The integration of past findings has yielded a comprehensive taxonomy of factors influencing blood donation and has provided insight into the prevalence of each factor across multiple stages of donors' careers. Implications for collection agencies are discussed. Copyright © 2011 Elsevier Inc. All rights reserved.

  13. Deterrence in the workplace: perceived certainty, perceived severity, and employee theft.

    PubMed

    Hollinger, R C; Clark, J P

    1983-12-01

    The phenomenon of employee theft is examined empirically, utilizing a deterrence paradigm. Employees selected randomly from three different industry sectors and metropolitan areas were asked to self-report their involvement in a number of property theft activities within the employment setting. Using a weighted least-squares logit regression analysis, the study found that the perception of both the certainty and severity of organizational sanctions were related to employee theft. Males reported more theft than did females, but contrary to previous research, no gender/certainty or gender/severity interactions were observed. The best-fit model did, however, contain two significant first-order interactions: age/certainty and age/severity. These interactions strongly suggest that younger employees are not as deterrable as their older peers, especially under conditions of both high certainty and high severity of punishment. While a number of possible explanations might account for differential deterrability according to age, a commitment to or stakes in conformity explanation is proposed.

  14. Risk based in vitro performance assessment of extended release abuse deterrent formulations.

    PubMed

    Xu, Xiaoming; Gupta, Abhay; Al-Ghabeish, Manar; Calderon, Silvia N; Khan, Mansoor A

    2016-03-16

    High strength extended release opioid products, which are indispensable tools in the management of pain, are associated with serious risks of unintentional and potentially fatal overdose, as well as of misuse and abuse that might lead to addiction. The issue of drug abuse becomes increasingly prominent when the dosage forms can be readily manipulated to release a high amount of opioid or to extract the drug in certain products or solvents. One approach to deter opioid drug abuse is by providing novel abuse deterrent formulations (ADF), with properties that may be viewed as barriers to abuse of the product. However, unlike regular extended release formulations, assessment of ADF technologies are challenging, in part due to the great variety of formulation designs available to achieve deterrence of abuse by oral, parenteral, nasal and respiratory routes. With limited prior history or literature information, and lack of compendial standards, evaluation and regulatory approval of these novel drug products become increasingly difficult. The present article describes a risk-based standardized in-vitro approach that can be utilized in general evaluation of abuse deterrent features for all ADF products.

  15. Risk based In Vitro Performance Assessment of Extended Release Abuse Deterrent Formulations

    PubMed Central

    Xu, Xiaoming; Gupta, Abhay; Al-Ghabeish, Manar; Calderon, Silvia N.; Khan, Mansoor A.

    2016-01-01

    High strength extended release opioid products, which are indispensable tools in the management of pain, are associated with serious risks of unintentional and potentially fatal overdose, as well as of misuse and abuse that might lead to addiction. The issue of drug abuse becomes increasingly prominent when the dosage forms can be readily manipulated to release a high amount of opioid or to extract the drug in certain products or solvents. One approach to deter opioid drug abuse is by providing novel abuse deterrent formulations (ADF), with properties that may be viewed as barriers to abuse of the product. However, unlike regular extended release formulations, assessment of ADF technologies are challenging, in part due to the great variety of formulation designs available to achieve deterrence of abuse by oral, parenteral, nasal and respiratory routes. With limited prior history or literature information, and lack of compendial standards, evaluation and regulatory approval of these novel drug products become increasingly difficult. The present article describes a risk-based standardized in-vitro approach that can be utilized in general evaluation of abuse deterrent features for all ADF products. PMID:26784976

  16. Abuse-deterrent formulations: transitioning the pharmaceutical market to improve public health and safety

    PubMed Central

    Worthy, Stacey L.; Barnes, Michael C.; Tarbell, Benjamin

    2015-01-01

    This article evaluates abuse-deterrent formulations (ADFs) as a method to reduce prescription drug abuse while ensuring access to vital medications for individuals with legitimate need; assesses the pros and cons of ADFs and the current state of ADF adoption in the market; and develops policy recommendations to transition the market to ADFs. Although abuse-deterrent technology is still in its nascent stages, ADFs have been proven to reduce prescription drug abuse and its consequences, and even an incremental reduction in abuse can have a significant impact on the nation by reducing the costly social, physical, mental, and public health problems resulting from abuse. Federal ADF policy does not reflect the urgency of the prescription drug abuse epidemic and does not go far enough toward changing the status quo. Policies must be implemented to encourage innovation and a market shift toward ADFs by ensuring any generic medication that references a branded ADF demonstrates that it does not have abuse-deterrent properties inferior to the branded ADF product. Policies must also require federal prescription drug benefit plans to cover ADFs to ensure consumers have access to such medications. PMID:25922655

  17. The Task of Detecting Illicit Nuclear Material: Status and Challenges

    NASA Astrophysics Data System (ADS)

    Kouzes, Richard

    2006-04-01

    In August 1994, police at the Munich airport intercepted a suitcase from Moscow with half a kilogram of nuclear-reactor fuel, of which 363 grams was weapons- grade plutonium. A few months later police seized 2.7 kilograms of highly enriched uranium from a former worker at a Russian nuclear institute and his accomplices in Prague. These are just two of 18 incidents involving the smuggling of weapons grade nuclear materials between 1993 and 2004 reported by the International Atomic Energy Agency. The consequences of a stolen or improvised nuclear device being exploded in a U.S. city would be world changing. The concern over the possibility of a nuclear weapon, or the material for a weapon or a radiological dispersion device, being smuggled across U.S. borders has led to the deployment of radiation detection equipment at the borders. Related efforts are occurring around the world. Radiation portal monitors are used as the main screening tool, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. Passive detection techniques combined with imaging, and possibly active techniques, are the current available tools for screening cargo for items of concern. There are a number of physics limitations to what is possible with each technology given the presence of naturally occurring radioactive materials, commercial sources, and medical radionuclides in the stream of commerce. There have been a number of lessons learned to date from the various efforts in the U.S. and internationally about the capability for interdicting illicit nuclear material.

  18. Comprehensive Nuclear-Test-Ban Treaty: Background and Current Developments

    DTIC Science & Technology

    2010-12-07

    Current Developments 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT...test of an element of an aging, unmodernized stockpile in order to assure the reliability of the nuclear deterrent force. Absent such a test, the...the Administration’s effort to gain Senate support for the treaty.”17 Under Secretary of State Ellen Tauscher described elements of the

  19. The French Nuclear Policy in the New Century

    DTIC Science & Technology

    2000-01-01

    deterrence. Such an association is more problematic with sea-based component. An accident under the sea or an attack during a patrol or in a harbor...Contractor: Dassault Aviation The Mirage 2000N ( Nucleaire ) is the nuclear strike component of France’s Force Aerienne Strategique (FAS). It is the...class carriers, the Clemenceau (R98) and Foch (R99), which have Toulon as their home port. Referred to by the French as PANs (Porte-Avions Nucleaire

  20. Commentary from Westminster. Medical effects of nuclear war.

    PubMed

    Deitch, R

    1983-03-12

    A British Medical Association report on the medical consequences of nuclear war, scheduled for commercial publication in April 1983, could damage the Government's arguments for maintaining a nuclear deterrent. The gist of the BMA's findings is that Britain could not possibly cope with the aftermath of nuclear attack. Although Prime Minister Thatcher has made no comment, both the Home Office and the Department of Health and Social Security have criticized the report's negative conclusions. The BMA is expected to take up the issue at its annual meeting, and the Labour party has called for a Parliamentary debate on the report and its implications.

  1. Predicting DUI decisions in different legal environments: investigating deterrence with a conjoint experiment.

    PubMed

    Yao, Jie; Johnson, Mark B; Beck, Kenneth H

    2014-01-01

    Driving under the influence (DUI) enforcement practices and sanctions contribute differentially to the certainty, swiftness, and severity of punishment, which are the key components of general deterrence theory. This study used a conjoint experiment to understand the decision-making process of potential DUI offenders and tested how variation in enforcement and legal punishment affects drinking and driving decisions. It sought to verify and quantify the unique deterrent effects of certainty, severity, and swiftness and to predict the rates of drinking and driving in different legal environments. One hundred twenty-one college seniors and graduate students at the University of Maryland participated in the Web-based conjoint experiment. They were randomly assigned to 4 blocks, each of which included 9 hypothetical scenarios composed of different levels of DUI enforcement and penalties. Respondents were asked to state their likelihood of drinking and driving under each scenario, as well as their estimated chance of being caught by the police for DUI. Intensified enforcement, harsh jail penalty, and immediate long license suspension were found to be the strongest deterrents to drinking and driving. Alternative ways to get home were also important in reducing people's willingness to drive. These factors accounted for most of the attribute effect on the DUI decision, whereas delayed punishment due to judicial processing, fine penalty, and legal blood alcohol concentration (BAC) limit had negligible effects. For the personal characteristics, college seniors and those who had previously driven after drinking were more likely to choose to drink and drive, whereas those who expect a jail penalty for a DUI offense were less likely to drive. Our research confirmed and quantified certainty of punishment as the greatest deterrent to DUI, but it also indicated the equally important effect of a severe jail penalty. It provides evidence on the feasibility of using a conjoint

  2. Weapons of Mass Destruction Conference: Avoiding a Nuclear Catastrophe. Summary Report

    DTIC Science & Technology

    2010-12-01

    is posed by Iran’s ballistic missiles—short-range Scud B and C missiles, medium-range Shahab - 3 and Ashura missiles, long-range Safir space launch...DEC 2010 2. REPORT TYPE 3 . DATES COVERED 00-00-2010 to 00-00-2010 4. TITLE AND SUBTITLE Avoiding a Nuclear Catastrophe. Summary Report 5a...2010. Includes bibliographical references. ISBN: 978-1-58566211-1 1. Nuclear nonproliferation—Congresses. 2. Deterrence (Strategy)—Congresses. 3

  3. Safety, Security, and Stability: The Role of Nuclear Control Regimes in a Proliferated World

    DTIC Science & Technology

    1995-05-01

    Harper Collins College, 1993), 107. 6Lewis A. Dunn and Herman Kahn, Trends in Nuclear Proliferation: 1975-1995, Projections, Problems, and Policy...America’s Foreign Policy in a Changing World (New York: Harper Collins College Publishers, 1994), 288. 47 Richard Nixon, The Memoirs of Richard Nixon...Nuclear Weapons Safety, 101st Cong, 2nd Session, No. 15 (Washington: GPO,1990), 9. 136 Ibid, 10. 137 Shaun Gregory, The Hidden Cost of Deterrence

  4. Peace in a nuclear age: The bishops' pastoral letter in perspective

    SciTech Connect

    Reid, C.

    1986-01-01

    This book is a discussion of The Challenge of Peace, the Catholic bishops' pastoral letter on nuclear war. It is a collection of twenty-five essays which confront issues raised by nuclear deterrence policy and the Catholic Church's response to this ethical dilemma. This book addresses the tradition of the Church, the making of public policy, religious ethics, and the implications for American Catholics.

  5. What About the Children? The Threat of Nuclear War and Our Responsibility to Preserve this Planet for Future Generations.

    ERIC Educational Resources Information Center

    Hawkes, Glenn W.

    Part of a global effort, this brochure was written to increase understanding of the threat nuclear war poses to children. Several issues are raised and briefly discussed, including (1) the present capacity for annihilating the next generation or ending human life on this planet, (2) the inadequacy of deterrence, (3) the suffering of children after…

  6. What About the Children? The Threat of Nuclear War and Our Responsibility to Preserve this Planet for Future Generations.

    ERIC Educational Resources Information Center

    Hawkes, Glenn W.

    Part of a global effort, this brochure was written to increase understanding of the threat nuclear war poses to children. Several issues are raised and briefly discussed, including (1) the present capacity for annihilating the next generation or ending human life on this planet, (2) the inadequacy of deterrence, (3) the suffering of children after…

  7. Nuclear war: the facts on our survival

    SciTech Connect

    Goodwin, P.

    1981-01-01

    Unless we reject the premise that a nuclear war can be waged rationally and one side can emerge victorious, a nuclear war could happen. Goodwin describes what will happen during and after a nuclear exchange. He describes the effects of heat and blast, and the effects and treatment of radiation exposure, then outlines simple protective steps individuals can take to improve their margin of safety. He describes a variety of civil defense and individual shelters that can be built, but questions how many will go to the necessary trouble. Photographs of Hiroshima and nuclear test sites illustrate the text. Public policy should focus first on sustaining deterrence and preventing war, according to Goodwin. 36 references, 40 figures, 4 tables. (DCK)

  8. Cult of deterrence: A moral and strategic critique of the anti-ballistic missile treaty. Master`s thesis

    SciTech Connect

    Pringle, C.S.

    1997-12-30

    Ballistic missile defense is the morally and strategically superior alternative to the current system of deterrence, provided that it is responsibly implemented. Analysis of the Just War Criteria and the utilitarian justifications of deterrence present a moral obligation to pursue the alternative strategy of missile defense as a means of defending the United States. However, the Anti-Ballistic Missile (ABM) Treaty does not allow earnest pursuit of this alternative, despite recent efforts to exploit its loopholes and broaden its meaning beyond any reasonable limit. Moreover, deterrence can no longer provide the guarantee of security that it did during the Cold War. Offense-Defense Theory shows that revisionist states are not subject to the same calculations of effective deterrence that the Soviet Union was during that period. This strategic analysis underlies the moral evaluations and further supports missile defense. The cult of deterrence is presented as an explanation for the failure to adapt national security policy to the new international structure, as European powers failed to perceive the offense-defense balance prior to World War I. The ABM regime threatens to reproduce those same mistakes with even greater consequences.

  9. Scientific impacts on nuclear strategic policy: Dangers and opportunities

    NASA Astrophysics Data System (ADS)

    Keeny, Spurgeon M.

    1988-12-01

    Nuclear weapons have revolutionized warfare, making a mutual capability for assured destruction a fact of life and mutual assured deterrence the underlying nuclear strategy of the superpowers. The program to find a technical solution to the threat of nuclear weapons by creating an impervious defense is fatally flawed by failure to consider responses available to a sophisticated adversary at much lower cost. Responses could involve: exploiting vulnerabilities; increased firepower; technical innovation; and circumvention. Efforts to achieve strategic defense would in fact increase risk of nuclear war by stimulating the nuclear arms race since history demonstrates neither side will allow its deterrent force to be seriously degraded. Defenses would increase instability in times of a crisis. Science has also reduced the risk of nuclear war by making possible improved control and safety of nuclear forces and predictability of US/Soviet relations, verifiability of arms control agreements, and survivable strategic systems. Science can be a tool for good or evil; mankind must be its masters not its slaves.

  10. Interpretational framework for forensic analyses of illicit nuclear materials

    SciTech Connect

    Niemeyer, S.; Kammeraad, J.

    1996-10-01

    jThe interdiction of illicit special nuclear materials (SNM) causes many attribution questions to be asked, e.g. where was this material produced, where was legitimate control lost, how was it transported, etc. We have developed a general framework for evaluating forensic measurements that will be useful in answering attribution questions, and will present an initial prioritization of these measurements. Interpretation of the measurements requires the integration of inputs from a diverse set of experts who have knowledge of environmental signatures, radiochemical signatures, weapons production complex, production pathways for SNM, criminal forensics, law enforcement, and intelligence. Comparison databases and international cooperation are crucial for future application of forensic measurements to the nuclear smuggling problem.

  11. Production, perceptions, and punishment: restrictive deterrence in the context of cannabis cultivation.

    PubMed

    Nguyen, Holly; Malm, Aili; Bouchard, Martin

    2015-03-01

    American authorities have invested extraordinary resources to keep up with the growth in cannabis cultivation, and state-level cannabis laws have been changing rapidly. Despite these changes, little research on the relationship between criminal justice sanctions and grower behaviours exist, in particular research that examines restrictive deterrence - the altering of an illegal behaviour as opposed to desisting from it completely. We examine restrictive deterrence in the context of cannabis cultivation by modelling the relationship between the threat of sanctions and the size of cultivation site and number of co-offenders. We use data from an anonymous web survey where participants were recruited through advertisements on websites related to cannabis use and cultivation. Negative binomial regression were used on 337 cases that contain valid data on size of cultivation site and 338 cases that contain valid data on the number of co-offenders. Our study found some evidence that the severity of state sanctions reduces the size of cultivation sites among growers who reside in the state. However, the number of contacts with the police had the opposite effect. In addition, we did not find a restrictive deterrent effect for the number of co-offenders, suggesting that different factors affect different decision points. Interestingly, objective skill and subjective skill had positive and independent effects on size of site. Results suggest that state-level sanctions have a structuring effect by restricting the size of cultivation sites but further increases in sanctions or enforcement are unlikely to deter more individuals from growing cannabis. In fact, there may be some potential dangers of increased enforcement on cannabis growers. Copyright © 2014 Elsevier B.V. All rights reserved.

  12. Impact of abuse-deterrent OxyContin on prescription opioid utilization.

    PubMed

    Hwang, Catherine S; Chang, Hsien-Yen; Alexander, G Caleb

    2015-02-01

    We quantified the degree to which the August 2010 reformulation of abuse-deterrent OxyContin affected its use, as well as the use of alternative extended-release and immediate-release opioids. We used the IMS Health National Prescription Audit, a nationally representative source of prescription activity in the USA, to conduct a segmented time-series analysis of the use of OxyContin and other prescription opioids. Our primary time period of interest was 12 months prior to and following August 2010. We performed model checks and sensitivity analyses, such as adjusting for marketing and promotion, using alternative lag periods, and adding extra observation points. OxyContin sales were similar before and after the August 2010 reformulation, with approximately 550 000 monthly prescriptions. After adjusting for declines in the generic extended-release oxycodone market, the formulation change was associated with a reduction of approximately 18 000 OxyContin prescription sales per month (p = 0.02). This decline corresponded to a change in the annual growth rate of OxyContin use, from 4.9% prior to the reformulation to -23.8% during the year after the reformulation. There were no statistically significant changes associated with the sales of alternative extended-release (p = 0.42) or immediate-release (p = 0.70) opioids. Multiple sensitivity analyses supported these findings and their substantive interpretation. The market debut of abuse-deterrent OxyContin was associated with declines in its use after accounting for the simultaneous contraction of the generic extended-release oxycodone market. Further scrutiny into the effect of abuse-deterrent formulations on medication use and health outcomes is vital given their popularity in opioid drug development. Copyright © 2014 John Wiley & Sons, Ltd.

  13. The effects of drinking-driving laws: a test of the differential deterrence hypothesis.

    PubMed

    Mann, Robert E; Smart, Reginald G; Stoduto, Gina; Adlaf, Edward M; Vingilis, Evelyn; Beirness, Douglas; Lamble, Robert; Asbridge, Mark

    2003-11-01

    Ontario introduced an Administrative Driver's Licence Suspension (ADLS) law in 1996, whereby a person with a blood alcohol level over the legal limit of 80 mg%, or who refused to provide a breath sample, would have his or her driver's licence suspended immediately for a period of 90 days. We test the differential deterrence hypothesis which would predict that social or lighter drinkers would be more affected by the Administrative Driver's License Suspension law than heavier drinkers. Data from the 1996 and 1997 cycles of the Ontario Drug Monitor, a general population survey of Ontario adults (monthly cross-sectional surveys), were employed (response rate 64-67%). Analyses were restricted to drivers who reported at least some drinking during the last year (n = 3827). The total number of drinks consumed during the past 12 months was analysed with analysis of variance. We found that the mean alcohol consumption of those who reported drinking-driving increased significantly after the ADLS was introduced, whereas the alcohol consumption of those who did not drive after drinking remained the same. The limits of this study include a lack of comparison data from regions without ADLS, a reliance on self-report measures, possible age restrictions of the findings and the fact that only an inferential test of the differential deterrence hypothesis is permitted by the data. Despite these limitations, these findings are consistent with the prediction that lighter or more moderate drinkers will tend to stop driving after drinking completely, and thus drop out of the drinking-driving population when the ADLS law was introduced, leaving heavier drinkers in this population. It will be important to continue to examine the dynamics of differential deterrence over a longer interval.

  14. Isolation and identification of mosquito (Aedes aegypti ) biting deterrent fatty acids from male inflorescences of breadfruit (Artocarpus altilis (Parkinson) Fosberg).

    PubMed

    Jones, A Maxwell P; Klun, Jerome A; Cantrell, Charles L; Ragone, Diane; Chauhan, Kamlesh R; Brown, Paula N; Murch, Susan J

    2012-04-18

    Dried male inflorescences of breadfruit ( Artocarpus altilis , Moraceae) are burned in communities throughout Oceania to repel flying insects, including mosquitoes. This study was conducted to identify chemicals responsible for mosquito deterrence. Various crude extracts were evaluated, and the most active, the hydrodistillate, was used for bioassay-guided fractionation. The hydrodistillate and all fractions displayed significant deterrent activity. Exploratory GC-MS analysis revealed more than 100 distinctive peaks, and more than 30 compounds were putatively identified, including a mixture of terpenes, aldehydes, fatty acids, and aromatics. A systematic bioassay-directed study using adult Aedes aegypti females identified capric, undecanoic, and lauric acid as primary deterrent constituents. A synthetic mixture of fatty acids present in the most active fraction and individual fatty acids were all significantly more active than N,N-diethyl-m-toluamide (DEET). These results provide support for this traditional practice and indicate the potential of male breadfruit flowers and fatty acids as mosquito repellents.

  15. Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting

    DOEpatents

    Hamlet, Jason R; Bauer, Todd M; Pierson, Lyndon G

    2014-09-30

    Deterrence of device subversion by substitution may be achieved by including a cryptographic fingerprint unit within a computing device for authenticating a hardware platform of the computing device. The cryptographic fingerprint unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware platform. The PUF circuit is used to generate a PUF value. A key generator is coupled to generate a private key and a public key based on the PUF value while a decryptor is coupled to receive an authentication challenge posed to the computing device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  16. Structural Activity of Bovidic Acid and Related Compounds as Feeding Deterrents against Aedes aegypti

    DTIC Science & Technology

    2007-01-01

    927, American Chemical Society, Wash- ington DC, pp. 210–218. Chauhan, K.R., Klun, J.A., Debboun , M. and Kramer, M. (2005) Feeding deterrent effects...fat. Tetrahedron Lett. 12, 4011–4014. Klun, J.A., Kramer, M. and Debboun , M. (2005) A new in vitro bioassay system for discovery of novel human-use...J.E., Weldon, P.J., Peterson, K.S., Schmidt, W.F. and Debboun , M. (2003) Synthesis and abso- lute configuration reassignment of 5-(1- Hydroxynonyl

  17. Will abuse-deterrent formulations of opioid analgesics be successful in achieving their purpose?

    PubMed

    Bannwarth, Bernard

    2012-09-10

    During the last 2 decades, there has been a dramatic increase in the use of strong opioids for chronic non-cancer pain. This increase has been accompanied by a steep increase in abuse, misuse, and both fatal and non-fatal overdoses involving prescription opioids. The situation is already alarming in the US. Prescription opioid-related harm is a complex, multifactorial issue that requires a multifaceted solution. In this respect, formulations of opioid analgesics designed to resist or deter abuse may be a useful component of a comprehensive opioid risk minimization programme. Such formulations have or are being developed. Abuse-resistant opioids include those that use some kind of physical barrier to prevent tampering with the formulation. Abuse-deterrent opioids are not necessarily resistant to tampering, but contain substances that are designed to make the formulation less attractive to abusers. This article focuses on two products intended to deter abuse that were reviewed by the US Food and Drug Administration (FDA). The first (Embeda®) consists of extended-release morphine with sequestered naltrexone, an opioid antagonist that is released if the tablet is compromised by chewing or crushing. Although Embeda® exhibited abuse-deterrent features, its label warns that it can be abused in a manner similar to other opioid agonists. Furthermore, tampering with Embeda® will result in the release of naltrexone, which may precipitate withdrawal in opioid-tolerant individuals. In March 2011, all dosage forms of Embeda® were recalled because the product failed to meet routine stability standards, and its return date to the market is currently unknown. The second product (Acurox®) was intended to be both tamper resistant and abuse deterrent. It consisted of an immediate-release oxycodone tablet with subtherapeutic niacin as an aversive agent and used a gel-forming ingredient designed to inhibit inhalation and prevent extraction of the drug for injection. The new drug

  18. Advanced techniques for the analysis of crisis stability, deterrence, and latency

    SciTech Connect

    Canavan, G.H.

    1998-12-31

    This is the final report of a one-year, Laboratory Directed Research and Development (LDRD) project at Los Alamos National Laboratory (LANL). The principal results of studies on crisis stability, deterrence, and latency are presented in their order of development. They capture the main features of stability analysis; relate first strike, crisis, and arms control stability as seen from US and Russian perspective; and address whether different metrics, uncertain damage preferences, or the deployment of defenses can be destabilizing. The report explores differences between unilateral and proportional force reductions in the region of deep reductions where concern shifts from stability to latency.

  19. Strategic regulatory entry deterrence: an empirical test in the ophthalmic market.

    PubMed

    Haas-Wilson, D

    1989-12-01

    This paper provides an empirical test of the theory of strategic regulatory entry deterrence--the theory that subgroups of firms within an industry will use the regulatory process to increase rivals' costs and thereby deter rivals' entry. The results suggest that the commercial practice restrictions present in the ophthalmic industry deterred chain optical firms' entry into the market. This result in combination with earlier findings that the restrictions increase optometrists' prices suggests that cost-raising strategies can be used to disadvantage rivals or drive them out of the market without the need to lower price.

  20. Testing the effectiveness of an acoustic deterrent for gray whales along the Oregon coast

    SciTech Connect

    Lagerquist, Barbara; Winsor, Martha; Mate, Bruce

    2012-12-31

    This study was conducted to determine whether a low-powered sound source could be effective at deterring gray whales from areas that may prove harmful to them. With increased interest in the development of marine renewal energy along the Oregon coast the concern that such development may pose a collision or entanglement risk for gray whales. A successful acoustic deterrent could act as a mitigation tool to prevent harm to whales from such risks. In this study, an acoustic device was moored on the seafloor in the pathway of migrating gray whales off Yaquina Head on the central Oregon coast. Shore-based observers tracked whales with a theodolite (surveyor’s tool) to accurately locate whales as they passed the headland. Individual locations of different whales/whale groups as well as tracklines of the same whale/whale groups were obtained and compared between times with the acoustic device was transmitting and when it was off. Observations were conducted on 51 d between January 1 and April 15, 2012. A total of 143 individual whale locations were collected for a total of 243 whales, as well as 57 tracklines for a total of 142 whales. Inclement weather and equipment problems resulted in very small sample sizes, especially during experimental periods, when the device was transmitting. Because of this, the results of this study were inconclusive. We feel that another season of field testing is warranted to successfully test the effectiveness of the deterrent, but recommend increasing the zone of influence to 3 km to ensure the collection of adequate sample sizes. Steps have been taken to acquire the necessary federal research permit modification to authorize the increased zone of influence and to modify the acoustic device for the increased power. With these changes we are confident we will be able to determine whether the deterrent is effective at deflecting gray whales. A successful deterrent device may serve as a valuable mitigation tool to protect gray whales, and

  1. Nuclear Terrorism - Dimensions, Options, and Perspectives in Moldova

    NASA Astrophysics Data System (ADS)

    Vaseashta, Ashok; Susmann, P.; Braman, Eric W.; Enaki, Nicolae A.

    Securing nuclear materials, controlling contraband and preventing proliferation is an international priority to resolve using technology, diplomacy, strategic alliances, and if necessary, targeted military exercises. Nuclear security consists of complementary programs involving international legal and regulatory structure, intelligence and law enforcement agencies, border and customs forces, point and stand-off radiation detectors, personal protection equipment, preparedness for emergency and disaster, and consequence management teams. The strategic goal of UNSCR 1540 and the GICNT is to prevent nuclear materials from finding their way into the hands of our adversaries. This multi-jurisdictional and multi-agency effort demands tremendous coordination, technology assessment, policy development and guidance from several sectors. The overall goal envisions creating a secured environment that controls and protects nuclear materials while maintaining the free flow of commerce and individual liberty on international basis. Integral to such efforts are technologies to sense/detect nuclear material, provide advance information of nuclear smuggling routes, and other advanced means to control nuclear contraband and prevent proliferation. We provide an overview of GICNT and several initiatives supporting such efforts. An overview is provided of technological advances in support of point and stand-off detection and receiving advance information of nuclear material movement from perspectives of the Republic of Moldova.

  2. Taste detection of the non-volatile isothiocyanate moringin results in deterrence to glucosinolate-adapted insect larvae.

    PubMed

    Müller, Caroline; van Loon, Joop; Ruschioni, Sara; De Nicola, Gina Rosalinda; Olsen, Carl Erik; Iori, Renato; Agerbirk, Niels

    2015-10-01

    Isothiocyanates (ITCs), released from Brassicales plants after hydrolysis of glucosinolates, are known for their negative effects on herbivores but mechanisms have been elusive. The ITCs are initially present in dissolved form at the site of herbivore feeding, but volatile ITCs may subsequently enter the gas phase and all ITCs may react with matrix components. Deterrence to herbivores resulting from topically applied volatile ITCs in artificial feeding assays may hence lead to ambiguous conclusions. In the present study, the non-volatile ITC moringin (4-(α-L-rhamnopyranosyloxy)benzyl ITC) and its glucosinolate precursor glucomoringin were examined for effects on behaviour and taste physiology of specialist insect herbivores of Brassicales. In feeding bioassays, glucomoringin was not deterrent to larvae of Pieris napi (Lepidoptera: Pieridae) and Athalia rosae (Hymenoptera: Tenthredinidae), which are adapted to glucosinolates. Glucomoringin stimulated feeding of larvae of the related Pieris brassicae (Lepidoptera: Pieridae) and also elicited electrophysiological activity from a glucosinolate-sensitive gustatory neuron in the lateral maxillary taste sensilla. In contrast, the ITC moringin was deterrent to P. napi and P. brassicae at high levels and to A. rosae at both high and low levels when topically applied to cabbage leaf discs (either 12, 120 or 1200 nmol moringin per leaf disc of 1cm diameter). Survival of A. rosae was also significantly reduced when larvae were kept on leaves treated with moringin for several days. Furthermore, moringin elicited electrophysiological activity in a deterrent-sensitive neuron in the medial maxillary taste sensillum of P. brassicae, providing a sensory mechanism for the deterrence and the first known ITC taste response of an insect. In simulated feeding assays, recovery of moringin was high, in accordance with its non-volatile nature. Our results demonstrate taste-mediated deterrence of a non-volatile, natural ITC to glucosinolate

  3. Joseph A. Burton Forum Award: Some Nuclear Weapons Dilemmas

    NASA Astrophysics Data System (ADS)

    May, Michael

    2014-03-01

    Nuclear weapons pose a combination of political and ethical dilemmas the solution to which has not been found. On one hand, in the view of both US government leaders and US allies, nuclear deterrence continues to play an essential part in the US role as the ultimate source of military strength for the alliances among the major democratic countries. It also continues to be in demand by countries that believe themselves to be isolated and threatened. On the other hand, nuclear weapons, besides being effective deterrents, can cause unprecedented loss of life and risk the demise of civilizations. No ban or technical precaution could prevent the rebuilding of nuclear weapons in a crisis. No diplomatic arrangement to date has erased the threat of invasion and war in the world. Only the abandonment of war and the threat of war as instruments of policy can make nuclear weapons obsolete. The slow, halting, risky road to that end remains the only hope for a world in which lasting solutions to the nuclear dilemmas are possible.

  4. Without Testing: Stockpile Stewardship in the Second Nuclear Age

    SciTech Connect

    Martz, Joseph C.

    2014-01-07

    Stockpile stewardship is a topic dear to my heart. I’ve been fascinated by it, and I’ve lived it—mostly on the technical side but also on the policy side from 2009 to 2010 at Stanford University as a visiting scholar and the inaugural William J. Perry Fellow. At Stanford I worked with Perry, former secretary of defense, and Sig Hecker, former Los Alamos Lab director (1986–1997), looking at nuclear deterrence, nuclear policy, and stockpile stewardship and at where all this was headed.

  5. Comprehensive Nuclear-Test-Ban Treaty: Background and Current Developments

    DTIC Science & Technology

    2009-01-28

    Current Developments 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT...conduct a test of an element of an aging, unmodernized stockpile in order to assure the reliability of the nuclear deterrent force. Absent such a test...Tass, Russian Foreign Minister Sergei Lavrov “confirmed Russia’s unchanging support for the treaty as one of the key elements of the nuclear non

  6. Effects of an electric field on white sharks: in situ testing of an electric deterrent.

    PubMed

    Huveneers, Charlie; Rogers, Paul J; Semmens, Jayson M; Beckmann, Crystal; Kock, Alison A; Page, Brad; Goldsworthy, Simon D

    2013-01-01

    Elasmobranchs can detect minute electromagnetic fields, <1 nV cm(-1), using their ampullae of Lorenzini. Behavioural responses to electric fields have been investigated in various species, sometimes with the aim to develop shark deterrents to improve human safety. The present study tested the effects of the Shark Shield Freedom7™ electric deterrent on (1) the behaviour of 18 white sharks (Carcharodon carcharias) near a static bait, and (2) the rates of attacks on a towed seal decoy. In the first experiment, 116 trials using a static bait were performed at the Neptune Islands, South Australia. The proportion of baits taken during static bait trials was not affected by the electric field. The electric field, however, increased the time it took them to consume the bait, the number of interactions per approach, and decreased the proportion of interactions within two metres of the field source. The effect of the electric field was not uniform across all sharks. In the second experiment, 189 tows using a seal decoy were conducted near Seal Island, South Africa. No breaches and only two surface interactions were observed during the tows when the electric field was activated, compared with 16 breaches and 27 surface interactions without the electric field. The present study suggests that the behavioural response of white sharks and the level of risk reduction resulting from the electric field is contextually specific, and depends on the motivational state of sharks.

  7. Correlation between pigmentation and larval settlement deterrence by Pseudoalteromonas sp. sf57.

    PubMed

    Huang, Yi-Li; Li, Mu; Yu, Zhiliang; Qian, Pei-Yuan

    2011-03-01

    The red-pigmented marine bacterium Pseudoalteromonas sp. sf57 forms a biofilm that deters larval settlement of the tube-building polychaete Hydroides elegans. To investigate the correlation between pigmentation and larval settlement deterrence, mutants of sf57 with deficient or altered pigmentation were generated by transposon mutagenesis. Five groups of pigmented mutants were obtained, viz. white, yellow, pink, dark red, and white-to-red. The white mutant WM1, which exhibited a substantial increase in bacterial density in the biofilm, became inductive to larval settlement. The other mutants that showed a lesser increase in bacterial density in their biofilms either retained their deterrence or induced higher larval settlement rates, but did not become inductive strains. Analysis of the disrupted genes in these mutants suggests that the type II secretion pathway, the LysR transcriptional regulator, NAD(P)-binding proteins, exonuclease, pyruvate metabolism, flagella assembly, and cell membrane processes may play a role in the regulation of pigmentation in sf57.

  8. Acoustic deterrence of bighead carp (Hypophthalmichthys nobilis) to a broadband sound stimulus

    USGS Publications Warehouse

    Brooke J. Vetter,; Murchy, Kelsie A.; Cupp, Aaron R.; Amberg, Jon J.; Gaikowski, Mark P.; Mensinger, Allen F.

    2017-01-01

    Recent studies have shown the potential of acoustic deterrents against invasive silver carp (Hypophthalmichthys molitrix). This study examined the phonotaxic response of the bighead carp (H. nobilis) to pure tones (500-2000 Hz) and playbacks of broadband sound from an underwater recording of a 100 hp outboard motor (0.06-10 kHz) in an outdoor concrete pond (10 × 5 × 1.2 m) at the U.S. Geological Survey Upper Midwest Environmental Science Center in La Crosse, WI. The number of consecutive times the fish reacted to sound from alternating locations at each end of the pond was assessed. Bighead carp were relatively indifferent to the pure tones with median consecutive responses ranging from 0 to 2 reactions away from the sound source. However, fish consistently exhibited significantly (P < 0.001) greater negative phonotaxis to the broadband sound (outboard motor recording) with an overall median response of 20 consecutive reactions during the 10 min trials. In over 50% of broadband sound tests, carp were still reacting to the stimulus at the end of the trial, implying that fish were not habituating to the sound. This study suggests that broadband sound may be an effective deterrent to bighead carp and provides a basis for conducting studies with wild fish.

  9. Acoustic deterrence of bighead carp (Hypophthalmichthys nobilis) to a broadband sound stimulus

    USGS Publications Warehouse

    Vetter, Brooke J.; Murchy, Kelsie; Cupp, Aaron R.; Amberg, Jon J.; Gaikowski, Mark P.; Mensinger, Allen F.

    2017-01-01

    Recent studies have shown the potential of acoustic deterrents against invasive silver carp (Hypophthalmichthys molitrix). This study examined the phonotaxic response of the bighead carp (H. nobilis) to pure tones (500–2000 Hz) and playbacks of broadband sound from an underwater recording of a 100 hp outboard motor (0.06–10 kHz) in an outdoor concrete pond (10 × 5 × 1.2 m) at the U.S. Geological Survey Upper Midwest Environmental Science Center in La Crosse, WI. The number of consecutive times the fish reacted to sound from alternating locations at each end of the pond was assessed. Bighead carp were relatively indifferent to the pure tones with median consecutive responses ranging from 0 to 2 reactions away from the sound source. However, fish consistently exhibited significantly (P < 0.001) greater negative phonotaxis to the broadband sound (outboard motor recording) with an overall median response of 20 consecutive reactions during the 10 min trials. In over 50% of broadband sound tests, carp were still reacting to the stimulus at the end of the trial, implying that fish were not habituating to the sound. This study suggests that broadband sound may be an effective deterrent to bighead carp and provides a basis for conducting studies with wild fish.

  10. Structure-activity relationship studies on the mosquito toxicity and biting deterrency of callicarpenal derivatives.

    PubMed

    Cantrell, Charles L; Klun, Jerome A; Pridgeon, Julia; Becnel, James; Green, Solomon; Fronczek, Frank R

    2009-04-01

    Callicarpenal (=13,14,15,16-tetranorclerod-3-en-12-al=[(1S,2R,4aR,8aR)-1,2,3,4,4a,7,8,8a-octahydro-1,2,4a,5-tetramethylnaphthalen-1-yl]acetaldehyde; 1) has previously demonstrated significant mosquito bite-deterring activity against Aedes aegypti and Anopheles stephensi in addition to repellent activity against host-seeking nymphs of the blacklegged tick, Ixodes scapularis. In the present study, structural modifications were performed on callicarpenal (1) in an effort to understand the functional groups necessary for maintaining and/or increasing its activity and to possibly lead to more effective insect control agents. All modifications in this study targeted the C(12) aldehyde or the C(3) alkene functionalities or combinations thereof. Mosquito biting deterrency appeared to be influenced most by C(3) alkene modification as evidenced by catalytic hydrogenation that resulted in a compound having significantly less effectiveness than 1 at a test amount of 25 nmol/cm2. Oxidation and/or reduction of the C(12) aldehyde did not diminish mosquito biting deterrency, but, at the same time, none of the modifications were more effective than 1 in deterring mosquito biting. Toxicities of synthesized compounds towards Ae. aegypti ranged from an LD50 value of 2.36 to 40.11 microg per mosquito. Similarly, LD95 values ranged from a low of 5.59 to a high of 104.9 microg.

  11. A Biomimetic Ultrasonic Whistle for Use as a Bat Deterrent on Wind Turbines

    NASA Astrophysics Data System (ADS)

    Sievert, Paul; Seyed-Aghazadeh, Banafsheh; Carlson, Daniel; Dowling, Zara; Modarres-Sadeghi, Yahya

    2016-11-01

    As wind energy continues to gain worldwide prominence, more and more turbines are detrimentally influencing bat colonies. In 2012 alone, an estimated 600,000 bats were killed by wind turbines in the United States. Bats show a tendency to fly towards turbines. The objective of this work is to deter bats from the proximity of the swept area of operational wind turbine blades. Established field studies have shown that bats avoid broadband ultrasonic noise on the same frequency spectrum as their echolocation chirps. A biomimetic ultrasonic pulse generator for use as a bat deterrent on wind turbines is designed and studied experimentally. This device, which works based on the fundamentals of flow-induced oscillations of a flexible sheet is a whistle-like device inspired by a bat larynx, mechanically powered via air flow on a wind turbine blade. Current device prototypes have proven robust at producing ultrasound across the 20 - 70 kHz range for flow inlet velocities of 4 - 14 m/s. Ultimately, a deterrent as described here could provide a reliable, cost-effective means of alerting bats to the presence of moving turbine blades, reducing bat mortality at wind facilities, and reducing regulatory uncertainty for wind facility developers. The financial support provided by the US Department of Energy, and the Massachusetts Clean Energy center is acknowledged.

  12. A field test of the directed deterrence hypothesis in two species of wild chili.

    PubMed

    Levey, Douglas J; Tewksbury, Joshua J; Cipollini, Martin L; Carlo, Tomás A

    2006-11-01

    The directed deterrence hypothesis posits that secondary metabolites in ripe fruit function to deter fruit consumption by vertebrates that do not disperse seeds, while not impacting consumption by those that do. We tested this hypothesis in two species of wild chilies (Capsicum spp.). Both produce fruits that contain capsaicinoids, the compounds responsible for the pungency of chilies. Previous work suggests seed-dispersing birds but not seed-destroying rodents consume chili fruits, presumably because rodents are deterred by capsaicin. However, fruit removal from chili plants by rodents and other mammals has not been previously explored. Because laboratory rodents can develop a preference for capsaicin, it is quite possible that wild rodents are natural consumers of chili fruits. We monitored the fate of 125 marked fruits of Capsicum chacoense and 291 fruits of Capsicum annuum. For both species, essentially all fruit removal occurred during the day, when rodents are inactive. Video monitoring revealed fruit removal only by birds, mostly by species known to disperse chili seeds in viable condition. Furthermore, these species are from taxonomic groups that tend to specialize on lipid-rich fruits. Both species of chili produce fruits that are unusually high in lipids (35% in C. chacoense, 24% in C. annuum). These results support the directed deterrence hypothesis and suggest that fruiting plants distinguish between seed predators and seed dispersers by producing fruits that repel the former and attract the latter.

  13. Choosing Psychiatry as a Career: Motivators and Deterrents at a Critical Decision-Making Juncture

    PubMed Central

    Wiesenfeld, Lesley; Abbey, Susan; Takahashi, Sue Glover; Abrahams, Caroline

    2014-01-01

    Objective To examine factors influencing the choice of psychiatry as a career between residency program application and ranking decision making. Methods: Using an online questionnaire, applicants to the largest Canadian psychiatry residency program were surveyed about the impact of various factors on their ultimate decision to enter psychiatry residency training. Results: Applicants reported that patient-related stigma was a motivator in considering psychiatry as a career, but that negative comments from colleagues, friends, and family about choosing psychiatry was a deterrent. Training program length, limited treatments, and insufficient clerkship exposure were noted as deterrents to choosing psychiatry, though future job prospects, the growing role of neuroscience, and diagnostic complexity positively influenced choosing psychiatry as a specialty. Research and elective time away opportunities were deemed relatively unimportant to ranking decisions, compared with more highly weighted factors, such as program flexibility, emphasis on psychotherapy, service– training balance, and training program location. Most applicants also reported continuing to fine tune ranking decisions between the application and ranking submission deadline. Conclusions: Stigma, exposure to psychiatry, diagnostic complexity, and an encouraging job market were highlighted as positive influences on the choice to enter psychiatry residency. Interview and information days represent opportunities for continued targeted recruitment activity for psychiatry residency programs. PMID:25161070

  14. Choosing psychiatry as a career: motivators and deterrents at a critical decision-making juncture.

    PubMed

    Wiesenfeld, Lesley; Abbey, Susan; Takahashi, Sue Glover; Abrahams, Caroline

    2014-08-01

    To examine factors influencing the choice of psychiatry as a career between residency program application and ranking decision making. Using an online questionnaire, applicants to the largest Canadian psychiatry residency program were surveyed about the impact of various factors on their ultimate decision to enter psychiatry residency training. Applicants reported that patient-related stigma was a motivator in considering psychiatry as a career, but that negative comments from colleagues, friends, and family about choosing psychiatry was a deterrent. Training program length, limited treatments, and insufficient clerkship exposure were noted as deterrents to choosing psychiatry, though future job prospects, the growing role of neuroscience, and diagnostic complexity positively influenced choosing psychiatry as a specialty. Research and elective time away opportunities were deemed relatively unimportant to ranking decisions, compared with more highly weighted factors, such as program flexibility, emphasis on psychotherapy, service- training balance, and training program location. Most applicants also reported continuing to fine tune ranking decisions between the application and ranking submission deadline. Stigma, exposure to psychiatry, diagnostic complexity, and an encouraging job market were highlighted as positive influences on the choice to enter psychiatry residency. Interview and information days represent opportunities for continued targeted recruitment activity for psychiatry residency programs.

  15. Formulation Optimization of Hot Melt Extruded Abuse Deterrent Pellet Dosage Form Utilizing Design of Experiments (DOE)

    PubMed Central

    Maddineni, Sindhuri; Battu, Sunil Kumar; Morott, Joe; Majumdar, Soumyajit; Repka, Michael A.

    2014-01-01

    The objective of the present study was to develop techniques for an abuse-deterrent (AD) platform utilizing hot melt extrusion (HME) process. Formulation optimization was accomplished by utilizing Box-Behnken design of experiments to determine the effect of the three formulation factors: PolyOx™ WSR301, Benecel™ K15M, and Carbopol 71G; each of which was studied at three levels on TR attributes of the produced melt extruded pellets. A response surface methodology was utilized to identify the optimized formulation. Lidocaine Hydrochloride was used as a model drug, and suitable formulation ingredients were employed as carrier matrices and processing aids. All of the formulations were evaluated for the TR attributes such as particle size post-milling, gelling, percentage of drug extraction in water and alcohol. All of the DOE formulations demonstrated sufficient hardness and elasticity, and could not be reduced into fine particles (<150µm), which is a desirable feature to prevent snorting. In addition, all of the formulations exhibited good gelling tendency in water with minimal extraction of drug in the aqueous medium. Moreover, Benecel™ K15M in combination with PolyOx™ WSR301 could be utilized to produce pellets with TR potential. HME has been demonstrated to be a viable technique with a potential to develop novel abuse-deterrent formulations. PMID:24433429

  16. Effects of excipients and curing process on the abuse deterrent properties of directly compressed tablets.

    PubMed

    Rahman, Ziyaur; Zidan, Ahmed S; Korang-Yeboah, Maxwell; Yang, Yang; Siddiqui, Akhtar; Shakleya, Diaa; Khan, Mansoor A; Cruz, Celia; Ashraf, Muhammad

    2017-01-30

    The objective of the present investigation was to understand the effects of excipients and curing process on the abuse deterrent properties (ADP) of Polyox™ based directly compressible abuse deterrent tablet formulations (ADFs). The excipients investigated were lactose (monohydrate or anhydrous), microcrystalline cellulose and hydroxypropyl methylcellulose. The ADPs studied were tablet crush resistance or hardness, particle size distribution following mechanical manipulation, drug extraction in water and alcohol, syringeability and injectability. Other non-ADPs such as surface morphology and tablet dissolution were also studied. It was found that presence of 50% or more of water soluble or swellable excipient in the ADF tablets significantly affected the tablet hardness, particle size distribution following mechanical manipulation and drug extraction while small amount (5%) of excipients had either minimal or no effect on ADPs of these tablets. Addition of high molecular weight HPMC (K 100M) affected syringeability and injectability of ADF. Curing process was found to affect ADPs (hardness, particle size distribution, drug extraction and syringeability and injectability) when compared with uncured tablet. In conclusion, addition of large amount of excipients, especially water soluble ones in Polyox™ based ADF tablets increase the risk of abuse by various routes of administration. Published by Elsevier B.V.

  17. Effects of an Electric Field on White Sharks: In Situ Testing of an Electric Deterrent

    PubMed Central

    Huveneers, Charlie; Rogers, Paul J.; Semmens, Jayson M.; Beckmann, Crystal; Kock, Alison A.; Page, Brad; Goldsworthy, Simon D.

    2013-01-01

    Elasmobranchs can detect minute electromagnetic fields, <1 nVcm–1, using their ampullae of Lorenzini. Behavioural responses to electric fields have been investigated in various species, sometimes with the aim to develop shark deterrents to improve human safety. The present study tested the effects of the Shark Shield Freedom7™ electric deterrent on (1) the behaviour of 18 white sharks (Carcharodon carcharias) near a static bait, and (2) the rates of attacks on a towed seal decoy. In the first experiment, 116 trials using a static bait were performed at the Neptune Islands, South Australia. The proportion of baits taken during static bait trials was not affected by the electric field. The electric field, however, increased the time it took them to consume the bait, the number of interactions per approach, and decreased the proportion of interactions within two metres of the field source. The effect of the electric field was not uniform across all sharks. In the second experiment, 189 tows using a seal decoy were conducted near Seal Island, South Africa. No breaches and only two surface interactions were observed during the tows when the electric field was activated, compared with 16 breaches and 27 surface interactions without the electric field. The present study suggests that the behavioural response of white sharks and the level of risk reduction resulting from the electric field is contextually specific, and depends on the motivational state of sharks. PMID:23658766

  18. Bisdesmosidic saponins from Securidaca longepedunculata roots: evaluation of deterrency and toxicity to Coleopteran storage pests.

    PubMed

    Stevenson, Philip C; Dayarathna, Thamara K; Belmain, Steven R; Veitch, Nigel C

    2009-10-14

    Powdered dry root bark of Securidaca longepedunculata was mixed with maize and cowpea and effectively reduced the numbers of Sitophilus zeamais and Callosobruchus maculatus emerging from these commodities, respectively, more than 9 months after treatment. This effect was reciprocated in grain treated with a methanol extract of the root bark, indicating that compounds were present that were oviposition deterrents or directly toxic to the adults or larvae. Two new bisdesmosidic saponins, 3-O-beta-D-glucopyranosyl-28-O-(alpha-L-arabinopyranosyl-(1 --> 3)-beta-D-xylopyranosyl-(1 --> 4)[beta-D-apiofuranosyl-(1 --> 3)]-alpha-L-rhamnopyranosyl-(1 --> 2)-[4-O-(4-methoxycinnamoyl-beta-D-fucopyranosyl)])-medicagenic acid (securidacaside A) and 3-O-beta-D-glucopyranosyl-28-O-(alpha-L-arabinopyranosyl-(1 --> 3)-beta-D-xylopyranosyl-(1 --> 4)[beta-D-apiofuranosyl-(1 --> 3)]-alpha-L-rhamnopyranosyl-(1 --> 2)-[4-O-(3,4,5-trimethoxy-(E)-cinnamoyl-beta-D-fucopyranosyl)])-medicagenic acid (securidacaside B), were isolated from the methanol extract of the roots of S. longepedunculata and characterized by spectroscopic methods. Securidacaside A, which occurred as (E)- and (Z)-regioisomers, showed deterrency and toxicity toward C. maculatus and S. zeamais and could contribute to the biological activity of the methanol extract. The potential to optimize the use of this plant for stored product protection using water extracts, which would be appropriate technology for target farmers, is discussed.

  19. Toward a nuclear weapons free world?

    SciTech Connect

    Maaranen, S.A.

    1996-09-01

    Doubts about the wisdom of relying on nuclear weapons are as old as nuclear weapons themselves. But despite this questioning, nuclear weapons came to be seen as the indispensable element of American (indeed Western) security during the Cold War. By the 1970s and 1980s, however, discontent was growing about the intense US-Soviet nuclear arms competition, as it failed to provide any enduring improvement in security; rather, it was seen as creating ever greater risks and dangers. Arms control negotiations and limitations, adopted as a means to regulate the technical competition, may also have relieved some of the political pressures and dangers. But the balance of terror, and the fears of it, continued. The Strategic Defense Initiative (SDI) under President Reagan was a very different approach to escaping from the precarious protection of nuclear weapons, in that it sought a way to continue to defend the US and the West, but without the catastrophic risks of mutual deterrence. As such, SDI connoted unhappiness with the precarious nuclear balance and, for many, with nuclear weapons in general. The disappearance of the Warsaw Pact, the disintegration of the Soviet Union, and the sudden end of the Cold War seemed to offer a unique opportunity to fashion a new, more peaceful world order that might allow for fading away of nuclear weapons. Scholars have foreseen two different paths to a nuclear free world. The first is a fundamental improvement in the relationships between states such that nuclear weapons are no longer needed. The second path is through technological development, e.g., missile defenses which could provide effective protection against nuclear attacks. The paper discusses nuclear weapon policy in the US, views of other nuclear states, the future of nuclear weapons, and issues in a less-nuclear world.

  20. 78 FR 2676 - Draft Guidance for Industry on Abuse-Deterrent Opioids-Evaluation and Labeling; Availability

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-14

    ... their development. This draft guidance is intended to provide industry with a framework for evaluating... Food and Drug Administration (FDA) is announcing the availability of a draft guidance for industry...-deterrent properties of opioid analgesic products should be studied and evaluated, and what claims regarding...

  1. Callicarpenal and Intermedeol: Two Natural Arthropod Feeding Deterrent and Repellent Compounds Identified from the Southern Folk Remedy Plant, Callicarpa americana

    USDA-ARS?s Scientific Manuscript database

    In previous studies on the American beautyberry (Callicarpa americana), it was demonstrated that callicarpenal and intermedeol were responsible for the arthropod repellent and feeding deterrent activity of this folk remedy. Both compounds showed significant bite-deterring activity against Aedes aeg...

  2. Do deterrence and social-control theories predict driving after drinking 15 years after a DWI conviction?

    PubMed

    Lapham, Sandra C; Todd, Michael

    2012-03-01

    This study investigates the utility of deterrence and social-control theories for prospective prediction of driving-while-impaired (DWI) outcomes of first-time DWI offenders. The sample consisted of a subset of 544 convicted first-time DWI offenders (N=337 females) who were interviewed 5 and 15 years after referral to a Screening Program in Bernalillo County, New Mexico. Variables collected at the 5-year (initial) interview were used in structural equation models to predict past 3-months, self-reported DWI at the 15-year follow-up (follow-up) interview. These variables represented domains defined by deterrence and social-control theories of DWI behavior, with one model corresponding to deterrence theory and one to social-control theory. Both models fit the data. DWI jail time was positively related to perceived enforcement, which was negatively but not significantly related to self-reported DWI. Neither jail time for DWI nor perceived likelihood of arrest was linearly related to self-reported DWI at follow-up. Interactions between jail time and prior DWI behavior indicated relatively weaker associations between initial and 15-year DWI for those reporting more jail time. Our prospective study demonstrated that for this convicted DWI offender cohort, classic formulations of deterrence and social-control theories did not account for DWI. However, results suggest that punishment may decrease the likelihood of DWI recidivism. Copyright © 2012 Elsevier Ltd. All rights reserved.

  3. Do Deterrence and Social-Control Theories Predict Driving after Drinking 15 years after a DWI Conviction?

    PubMed Central

    Lapham, Sandra C.; Todd, Michael

    2012-01-01

    Objective This study investigates the utility of deterrence and social-control theories for prospective prediction of driving-while-impaired (DWI) outcomes of first-time DWI offenders. Method The sample consisted of a subset of 544 convicted first-time DWI offenders (n = 337 females) who were interviewed 5 and 15 years after referral to a screening program in Bernalillo County, New Mexico. Variables collected at the 5-year (initial) interview were used in structural equation models to predict past 3-months, self-reported DWI at the 15-year follow-up (follow-up) interview. These variables represented domains defined by deterrence and social-control theories of DWI behavior, with one model corresponding to deterrence theory and one to social-control theory. Results Both models fit the data. DWI jail time was positively related to perceived enforcement, which was negatively but not significantly related to self-reported DWI. Neither jail time for DWI nor perceived likelihood of arrest was linearly related to self-reported DWI at follow-up. Interactions between jail time and prior DWI behavior indicated relatively weaker associations between initial and 15-year DWI for those reporting more jail time. Conclusion Our prospective study demonstrated that for this convicted DWI offender cohort, classic formulations of deterrence and social-control theories did not account for DWI. However, results suggest that punishment may decrease the likelihood of DWI recidivism. PMID:22269495

  4. How Close is too Close? The Effect of a Non-Lethal Electric Shark Deterrent on White Shark Behaviour.

    PubMed

    Kempster, Ryan M; Egeberg, Channing A; Hart, Nathan S; Ryan, Laura; Chapuis, Lucille; Kerr, Caroline C; Schmidt, Carl; Huveneers, Charlie; Gennari, Enrico; Yopak, Kara E; Meeuwig, Jessica J; Collin, Shaun P

    2016-01-01

    Sharks play a vital role in the health of marine ecosystems, but the potential threat that sharks pose to humans is a reminder of our vulnerability when entering the ocean. Personal shark deterrents are being marketed as the solution to mitigate the threat that sharks pose. However, the effectiveness claims of many personal deterrents are based on our knowledge of shark sensory biology rather than robust testing of the devices themselves, as most have not been subjected to independent scientific studies. Therefore, there is a clear need for thorough testing of commercially available shark deterrents to provide the public with recommendations of their effectiveness. Using a modified stereo-camera system, we quantified behavioural interactions between white sharks (Carcharodon carcharias) and a baited target in the presence of a commercially available, personal electric shark deterrent (Shark Shield Freedom7™). The stereo-camera system enabled an accurate assessment of the behavioural responses of C. carcharias when encountering a non-lethal electric field many times stronger than what they would naturally experience. Upon their first observed encounter, all C. carcharias were repelled at a mean (± std. error) proximity of 131 (± 10.3) cm, which corresponded to a mean voltage gradient of 9.7 (± 0.9) V/m. With each subsequent encounter, their proximity decreased by an average of 11.6 cm, which corresponded to an increase in tolerance to the electric field by an average of 2.6 (± 0.5) V/m per encounter. Despite the increase in tolerance, sharks continued to be deterred from interacting for the duration of each trial when in the presence of an active Shark Shield™. Furthermore, the findings provide no support to the theory that electric deterrents attract sharks. The results of this study provide quantitative evidence of the effectiveness of a non-lethal electric shark deterrent, its influence on the behaviour of C. carcharias, and an accurate method for testing

  5. How Close is too Close? The Effect of a Non-Lethal Electric Shark Deterrent on White Shark Behaviour

    PubMed Central

    Hart, Nathan S.; Ryan, Laura; Chapuis, Lucille; Kerr, Caroline C.; Schmidt, Carl; Huveneers, Charlie; Gennari, Enrico; Yopak, Kara E.; Meeuwig, Jessica J.; Collin, Shaun P.

    2016-01-01

    Sharks play a vital role in the health of marine ecosystems, but the potential threat that sharks pose to humans is a reminder of our vulnerability when entering the ocean. Personal shark deterrents are being marketed as the solution to mitigate the threat that sharks pose. However, the effectiveness claims of many personal deterrents are based on our knowledge of shark sensory biology rather than robust testing of the devices themselves, as most have not been subjected to independent scientific studies. Therefore, there is a clear need for thorough testing of commercially available shark deterrents to provide the public with recommendations of their effectiveness. Using a modified stereo-camera system, we quantified behavioural interactions between white sharks (Carcharodon carcharias) and a baited target in the presence of a commercially available, personal electric shark deterrent (Shark Shield Freedom7™). The stereo-camera system enabled an accurate assessment of the behavioural responses of C. carcharias when encountering a non-lethal electric field many times stronger than what they would naturally experience. Upon their first observed encounter, all C. carcharias were repelled at a mean (± std. error) proximity of 131 (± 10.3) cm, which corresponded to a mean voltage gradient of 9.7 (± 0.9) V/m. With each subsequent encounter, their proximity decreased by an average of 11.6 cm, which corresponded to an increase in tolerance to the electric field by an average of 2.6 (± 0.5) V/m per encounter. Despite the increase in tolerance, sharks continued to be deterred from interacting for the duration of each trial when in the presence of an active Shark Shield™. Furthermore, the findings provide no support to the theory that electric deterrents attract sharks. The results of this study provide quantitative evidence of the effectiveness of a non-lethal electric shark deterrent, its influence on the behaviour of C. carcharias, and an accurate method for testing

  6. Strategic nuclear forces of Britain and France

    SciTech Connect

    Prados, J.; Wit, J.S.; Zagurek, M.J. Jr.

    1984-08-01

    Weapon inventories of the US and the USSR account for about 97% of the nuclear warheads in the world today; Britain and France have most of the remainder. Yet even the comparatively modest claims the two Western European nations can make in this regard represent an awesome military capability that the USSR (and, to a lesser extent, the US) cannot afford to ignore. Indeed, the recent proposals both superpowers have made to dismantle all their European-based intermediate-range missiles differ sharply in particulars but raise the same fundamental question: What role will the other nuclear forces in Europe have in the future military balance. The Europeans are unlikely to place their limited strategic forces on the bargaining table along with those of the USSR and the US unless the superpowers impose severe constraints on their own strategic-weapon programs, and in particular on their strategic-defense programs. The deployment of such defense systems poses a worrisome dilemma for the Europeans: while in the near term a Soviet anti-ballistic-missile (ABM) system might have only marginal military impact, over the longer term a novel, exotic defense could conceivably nullify the dependent deterrent Britain and France have so arduously sought. At the same time and American system such as the Strategic Defense Initiative could, by decoupling the defense of Europe from that of the US, increase the need for precisely such an independent deterrent in the minds of the British and the French.

  7. Nuclear threats from small states

    SciTech Connect

    Kahan, J.H.

    1994-06-13

    What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one or more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.

  8. Does getting away with it count? An application of stafford and warr's reconceptualised model of deterrence to drink driving.

    PubMed

    Szogi, E; Darvell, M; Freeman, J; Truelove, V; Palk, G; Davey, J; Armstrong, K

    2017-11-01

    Drink drivers continue to be disproportionately represented in road mortalities and morbidities. Given these costs, countermeasures that effectively reduce the behaviour (and its consequences) are imperative. Research has produced inconsistent findings regarding the deterrent effects of some countermeasures on drink driving behaviour, namely legal sanctions, suggesting other factors may be more influential. This study aimed to determine which deterrence measures based on Classical Deterrence Theory and Stafford and Warr's (1993) reconceptualised model of deterrence influence the propensity to drink and drive over the legal blood alcohol content limit of 0.05. In total, 1257 Australian drivers aged from 16 to 85 years completed a questionnaire assessing their self-reported drink driving behaviour and perceptions of legal sanctions. Consistent with previous research, past experiences of direct punishment avoidance was the most significant predictor of drink driving. Additionally, perceptions of personal certainty of apprehension were a significant (albeit weak) negative predictor of drink driving. Counterintuitively, experiences of indirect punishment were predictive of self-reported drink driving. Similarly, penalty severity produced mixed results as those who considered a penalty would be severe were less likely to drink and drive. However those that considered the penalty would cause a considerable impact on their lives, were more likely to drink and drive. Taken together, these findings suggest that while the threat of apprehension and punishment may influence self-reported drink driving behaviours, committing and offence while avoiding detection is a significant influence upon ongoing offending. This paper will further elaborate on the findings in regards to developing salient and effective deterrents that produce a lasting effect. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Routes of abuse of prescription opioid analgesics: a review and assessment of the potential impact of abuse-deterrent formulations.

    PubMed

    Gasior, Maciej; Bond, Mary; Malamut, Richard

    2016-01-01

    Prescription opioid analgesics are an important treatment option for patients with chronic pain; however, misuse, abuse and diversion of these medications are a major global public health concern. Prescription opioid analgesics can be abused via intended and non-intended routes of administration, both intact or after manipulation of the original formulation to alter the drug-delivery characteristics. Available data indicate that ingestion (with or without manipulation of the prescribed formulation) is the most prevalent route of abuse, followed by inhalation (snorting, smoking and vaping) and injection. However, reported routes of abuse vary considerably between different formulations. A number of factors have been identified that appear to be associated with non-oral routes of abuse, including a longer duration of abuse, younger age, male sex and a rural or socially deprived location. The development of abuse-deterrent formulations of prescription opioid analgesics is an important step toward reducing abuse of these medications. Available abuse-deterrent formulations aim to hinder extraction of the active ingredient, prevent administration through alternative routes and/or make abuse of the manipulated product less attractive, less rewarding or even aversive. There are currently five opioid analgesics with a Food and Drug Administration abuse-deterrent label, and a number of other products are under review. A growing body of evidence suggests that introduction of abuse-deterrent opioid analgesics in the USA has been associated with decreased rates of abuse of these formulations. The availability of abuse-deterrent formulations therefore appears to represent an important step toward curbing the epidemic of abuse of prescription opioid analgesics, while ensuring the availability of effective pain medications for patients with legitimate medical need.

  10. Oviposition deterrent and ovicidal activities of seven herbal essential oils against female adults of housefly, Musca domestica L.

    PubMed

    Sinthusiri, Jirisuda; Soonwera, Mayura

    2014-08-01

    The oviposition deterrent and ovicidal of seven herbal essential oils derived from Citrus sinensis, Cymbopogon citratus, Eucalyptus glubulus, Illicium verum, Lavandula angustifolia, Mentha piperita, and Zingiber cussumunar were assessed against the gravid female of housefly, Musca domestica L., under laboratory conditions and compared with commercial insecticide (10% w/v cypermethrin). They were assayed at three concentrations (1.0, 5.0, and 10.0%) where plastic cups containing 1 ml of desired oil concentration and cotton pad soaked with 10 ml of milk solution (10% w/v) were used as oviposition substrate. The 0.1 ml of deferent concentrations was dropped on ten housefly eggs, which were used for ovicidal activity. The number of eggs laid and the hatched larvae in each cup was recorded to evaluate the oviposition deterrent and ovicidal activities of the herbal essential oils. High concentration (10%) of herbal essential oils showed high percent effective repellency (ER). The 10% I. verum oil caused complete oviposition deterrence (100% ER, oviposition activity index (OAI) = -1.0), followed by Z. cussumunar, M. piperita, L. angustifolia, C. citratus, C. sinensis, and E. glubulus oils with 97.20, 88.55, 88.14, 87.93, 76.68, and 57.00% ER, respectively. As the concentration of herbal essential oils increased from 1.0, 5.0, and up to 10.0% concentration, the hatching rate decreased. Ten percent I. verum oil gave the maximum inhibiting rate at 97.3% (LC50 value of 6.85%); in addition, the other herbal essential oils showed the minimum inhibiting rate of 3.3-22.7%. On the other hand, cypermethrin 10% w/v showed complete oviposition deterrence (100% ER, OAI = -1.0) and ovicidal activity (100% inhibiting rate). Our data showed that I. verum oil have high potential of oviposition deterrence and ovicide housefly control.

  11. Mitigating the Impact of Bats in Historic Churches: The Response of Natterer's Bats Myotis nattereri to Artificial Roosts and Deterrence.

    PubMed

    Zeale, Matt R K; Bennitt, Emily; Newson, Stuart E; Packman, Charlotte; Browne, William J; Harris, Stephen; Jones, Gareth; Stone, Emma

    2016-01-01

    Bats frequently roost in historic churches, and these colonies are of considerable conservation value. Inside churches, bat droppings and urine can cause damage to the historic fabric of the building and to items of cultural significance. In extreme cases, large quantities of droppings can restrict the use of a church for worship and/or other community functions. In the United Kingdom, bats and their roosts are protected by law, and striking a balance between conserving the natural and cultural heritage can be a significant challenge. We investigated mitigation strategies that could be employed in churches and other historic buildings to alleviate problems caused by bats without adversely affecting their welfare or conservation status. We used a combination of artificial roost provision and deterrence at churches in Norfolk, England, where significant maternity colonies of Natterer's bats Myotis nattereri damage church features. Radio-tracking data and population modelling showed that excluding M. nattereri from churches is likely to have a negative impact on their welfare and conservation status, but that judicious use of deterrents, especially high intensity ultrasound, can mitigate problems caused by bats. We show that deterrence can be used to move bats humanely from specific roosting sites within a church and limit the spread of droppings and urine so that problems to congregations and damage to cultural heritage can be much reduced. In addition, construction of bespoke roost spaces within churches can allow bats to continue to roost within the fabric of the building without flying in the church interior. We highlight that deterrence has the potential to cause serious harm to M. nattereri populations if not used judiciously, and so the effects of deterrents will need careful monitoring, and their use needs strict regulation.

  12. On Deterrence,

    DTIC Science & Technology

    1980-04-01

    application of the theory and any prinaiples derived from it. Clausewitz distinguished between theory as a guide to self-instruction and as a guide to action ... Theory educates the mind, he wrote, but should not accompany the military leader "to the field of battle." 21 It is imperative to honor this

  13. Peace and war: a study of morality and US strategic nuclear policies. Study project report

    SciTech Connect

    Ginder, D.B.; Hicks, I.

    1983-05-01

    The paper examines the quesitons of peace and war and the morality of nuclear deterrence. These vital and enduring questions have been again become a focus of societal debate, especially in the light of the Catholic Bishop's pastoral letter. The nuclear debate is all encompassing, raising philosophical, political, social, strategic an religious questions. These issues present problems that each informed citizen will have to discern both morally and politically. The purpose of the paper is not to evaluate the morality of the defense and deterrent policies/strategies of the United States, but to provide the reader with the information to allow him to formulate judgment on this important question and be able to reconcile personal moral values with national policy and strategy.

  14. Nesting bird deterrents for the Federal Republic of Germany glass log storage pad

    SciTech Connect

    Mitchell, R.M.

    1997-04-15

    A proposed storage pad wi11 be constructed in the 200 West Area for the storage of isotopic heat and radiation sources from the Federal Republic of Germany. The pad will be constructed in the southern portion of the Solid Waste Operations Complex near the existing Sodium Storage Pad (Figure 1). Following a biological review by Pacific Northwest National Laboratory (PNNL) personnel (Brandt 1996), it was determined that in order for construction to take place after March 15, 1997, actions would need to be taken to prevent migratory birds from nesting in the project area. Special attention was focused on preventing sage sparrows and loggerhead shrikes, both Hanford Site species of concern (DOE/RL 1996), from nesting in the area. This activity plan details the methods and procedures that will be used to implement these nesting deterrents.

  15. A Large Specific Deterrent Effect of Arrest for Patronizing a Prostitute

    PubMed Central

    Brewer, Devon D.; Potterat, John J.; Muth, Stephen Q.; Roberts, John M.

    2006-01-01

    Background Prior research suggests that arrest, compared with no police detection, of some types of offenders does not decrease the chances they will reoffend. Methodology/Principal Findings We assessed the specific deterrent effect of arrest for patronizing a street prostitute in Colorado Springs by comparing the incidence of arrest for clients of prostitutes first detected through public health surveillance with the incidence of rearrest for clients first detected by police arrest. Although these sets of clients were demographically and behaviorally similar, arrest reduced the likelihood of a subsequent arrest by approximately 70%. In other areas of the United States, arrest did not appear to displace a client's patronizing. Conclusions/Significance Our results suggest that apprehending clients decreases their patronizing behavior substantially. PMID:17183691

  16. Oviposition deterrence associated with larval frass of the Japanese pine sawyer, Monochamus alternatus (Coleoptera: Cerambycidae).

    PubMed

    Anbutsu, H; Togashi, K

    2002-04-01

    To determine the effect of larval frass of Monochamus alternatus on oviposition preference of the female adults, three tests were performed in the laboratory. Individual females were provided with a frass-coated, Pinus densiflora bolt and an untreated bolt simultaneously and were allowed to oviposit for 24 h. They deposited a significantly smaller number of eggs on frass-coated bolts. The females supplied with frass-coated bolts deposited no eggs on them, indicating that the larval frass deterred the females from oviposition. When individual females were provided simultaneously with a pine bolt applied with a methanol extract of larval frass and another bolt applied with methanol alone, they deposited a significantly smaller number of eggs on frass extract-applied bolts for 24 h. These results suggest the presence of a putative oviposition deterrent in larval frass of M. alternatus. Each test was replicated 19-20 times using different females.

  17. Wind Energy Industry Eagle Detection and Deterrents: Research Gaps and Solutions Workshop Summary Report

    SciTech Connect

    Sinclair, Karin; DeGeorge, Elise

    2016-04-13

    The Bald and Golden Eagle Protection Act (BGEPA) prohibits the 'take' of these birds. The act defines take as to 'pursue, shoot, shoot at, poison, wound, kill, capture, trap, collect, destroy, molest or disturb.' The 2009 Eagle Permit Rule (74 FR 46836) authorizes the U.S. Fish and Wildlife Service (USFWS) to issue nonpurposeful (i.e., incidental) take permits, and the USFWS 2013 Eagle Conservation Plan Guidance provides a voluntary framework for issuing programmatic take permits to wind facilities that incorporate scientifically supportable advanced conservation practices (ACPs). Under these rules, the Service can issue permits that authorize individual instances of take of bald and golden eagles when the take is associated with, but not the purpose of, an otherwise lawful activity, and cannot practicably be avoided. To date, the USFWS has not approved any ACPs, citing the lack of evidence for 'scientifically supportable measures.' The Eagle Detection and Deterrents Research Gaps and Solutions Workshop was convened at the National Renewable Energy Laboratory in December 2015 with a goal to comprehensively assess the current state of technologies to detect and deter eagles from wind energy sites and the key gaps concerning reducing eagle fatalities and facilitating permitting under the BGEPA. During the workshop, presentations and discussions focused primarily on existing knowledge (and limitations) about the biology of eagles as well as technologies and emerging or novel ideas, including innovative applications of tools developed for use in other sectors, such as the U.S. Department of Defense and aviation. The main activity of the workshop was the breakout sessions, which focused on the current state of detection and deterrent technologies and novel concepts/applications for detecting and minimizing eagle collisions with wind turbines. Following the breakout sessions, participants were asked about their individual impressions of the relative priority of each of

  18. Evaluation of deterrent impact of Ontario's Street Racing and Stunt Driving Law on extreme speeding convictions.

    PubMed

    Meirambayeva, Aizhan; Vingilis, Evelyn; Zou, Guangyong; Elzohairy, Yoassry; McLeod, A Ian; Xiao, Jinkun

    2014-01-01

    The purpose of this study was to conduct a process and outcome evaluation of the deterrent impact of Ontario's street racing and stunt driving legislation, introduced in September 2007, on extreme speeding convictions. It was hypothesized that because males are much more likely to engage in speeding, street racing, and stunt driving, the new law would have more impact in reducing extreme speeding in males compared to females. Descriptive statistics and time series plots were used for the suspensions data. Interrupted time series analysis with autoregressive integrated moving average (ARIMA) modeling was applied to the monthly extreme speeding convictions in Ontario for the period of January 1, 2003, to December 31, 2011, to assess the impact of the new legislation, separately for male drivers (intervention group) and female drivers (comparison group). The results indicated that per licensed driver, 1.21 percent of 16- to 24-year-old male drivers and 0.37 percent of 25- to 64-year-old male drivers had their licenses suspended between September 2007 and December 2011. This is in contrast to female drivers: 0.21 percent of 16- to 24-year-old female drivers and 0.07 percent of 25- to 64-year-old female drivers had their licenses suspended during the same time period. A significant intervention effect of reduced extreme speeding convictions was found in the male driver group, though no corresponding effect was observed in the female driver group. The findings of this study are consistent with previous research on demographics of street racers and stunt drivers. These findings are congruent with deterrence theory that certain, swift, and severe sanctions can deter risky driving behavior and support the hypothesis that legal sanctions can have an impact on the extreme speeding convictions of the intervention group.

  19. Fern-synthesized silver nanocrystals: Towards a new class of mosquito oviposition deterrents?

    PubMed

    Rajaganesh, Rajapandian; Murugan, Kadarkarai; Panneerselvam, Chellasamy; Jayashanthini, Sudalaimani; Aziz, Al Thbiani; Roni, Mathath; Suresh, Udaiyan; Trivedi, Subrata; Rehman, Hasibur; Higuchi, Akon; Nicoletti, Marcello; Benelli, Giovanni

    2016-12-01

    Mosquitoes act as vectors of devastating pathogens and parasites, representing a key threat for millions of humans and animals worldwide. Eco-friendly control tools are urgently required. We proposed a novel method of fern-mediated biosynthesis of silver nanoparticles (AgNP) using Dicranopteris linearis, acting as a reducing and capping agent. AgNP were characterized by UV-vis spectroscopy, Fourier transform infrared (FTIR) spectroscopy, scanning electron microscopy (SEM), energy-dispersive X-ray spectroscopy (EDX), X-ray diffraction (XRD), zeta potential and particle size analysis. In mosquitocidal assays, the LC50 of D. linearis extract against Aedes aegypti ranged from 165.213 (larva I) to 255.055ppm (pupa). LC50 of D. linearis-synthesized AgNP ranged from 18.905 (larva I) to 29.328ppm (pupa). In the field, the application of D. linearis extract and AgNP (10×LC50) led to 100% larval reduction after 72h. Smoke toxicity experiments conducted against A. aegypti adults showed that D. linearis leaf-, stem- and root-based coils evoked mortality rates comparable to the permethrin-based positive control (58%, 47%, 34%, and 48% respectively). In ovicidal experiments, egg hatchability was reduced by 100% after treatment with 25ppm of AgNP and 300ppm of D. linearis extract. Interestingly, oviposition deterrent assays highlighted that 100ppm of fern extract reduced oviposition rates of more than 65%, while 10ppm of fern-fabricated AgNP reduced oviposition rates of more than 70% in A. aegypti (OAI were -0.52 and -0.55, respectively). Overall, our results highlighted that D. linearis-synthesized AgNP could be useful candidates to develop nano-formulated oviposition deterrents effective against dengue vectors.

  20. Systemic deterrence of aphid probing and feeding by novel β-damascone analogues.

    PubMed

    Gabryś, Beata; Dancewicz, Katarzyna; Gliszczyńska, Anna; Kordan, Bożena; Wawrzeńczyk, Czesław

    β-Damascone appeared a weak attractant close to not active to Myzus persicae, but modifications of its structure caused the avoidance of treated leaves by aphids during settling and reluctance to probe in simple choice- and no-choice experiments in previous studies. Here, the electrical penetration graph (EPG) technique, which allows monitoring of aphid probing within plant tissues, was applied to explore the biological background and localisation in plant tissues of the deterrent activities of β-damascone and its analogues. Activity of β-damascone and β-damascone-derived compounds depended on their substituents, which was manifested in the variation in the potency of the behavioural effect and differences in aphid probing phases that were affected. β-Damascone appeared a behaviourally inactive compound. The moderately active β-damascone ester affected aphid activities only during the phloem phase. The highly active deterrents-dihydro-β-damascol, β-damascone acetate, δ-bromo-γ-lactone, and unsaturated γ-lactone-affected pre-phloem and phloem aphid probing activities. The most effective structural modification that evoked the strongest negative response from M. persicae was the transformation of β-damascone into δ-bromo-γ-lactone. The behavioural effect of this transformation was demonstrated in frequent interruption of probing in peripheral tissues, which caused repeated failures in finding sieve elements, and reduction in the ingestion time during the phloem phase in favour of watery salivation. The inhibition of aphid probing at both the pre-phloem and phloem levels reveals the passage of the compounds studied through the plant surface and their distribution within plant tissues in a systemic way, which may reduce the risk of the transmission of non-persistent and persistent viruses.

  1. Western European Nuclear Forces. A British, a French, and an American View.

    DTIC Science & Technology

    1995-01-01

    Secretary, the emphasis within the Pentagon on matters of nuclear policy seems to have shifted from the radical (or at least provocative) to the cautious...is that the French deterrence concept has outlived its political and military relevance, and that unless it undergoes radical change, it is...security of Europe radically different from that of its partners (even if the reality of French analyses and policies was de facto closer to theirs

  2. No First Use: The Next Step for U.S. Nuclear Policy

    DTIC Science & Technology

    2010-01-01

    Affairs, Vol. 72, No. 2 (Spring 1993), pp. 140–155. For excellent analysis of the NFU debate, see Peter J. Liberman and Neil R . Thomason, “No-First-Use...Benjamin Bilski and Douglas Murray , Towards a Grand Strategy for an Uncertain World: Renewing Transatlantic Partnership (Lunteren, Netherlands: Noaber...Michael R . Gordon, “Nuclear Arms for Deterrence or Fighting?” New York Times, March 11, 2002; Roger Speed and Michael May, “Dan- gerous Doctrine,” Bulletin

  3. Confronting Emergent Nuclear-Armed Regional Adversaries: Prospects for Neutralization, Strategies for Escalation Management

    DTIC Science & Technology

    2015-01-01

    Scenarios, New York: Praeger, 1965. Kaplan , Morton, “The Calculus of Deterrence,” World Politics Vol. 11, No. 1, October 1958. Kaufman, William W ., ed...Dickens, Derek Eaton, C. Christine Fair, Nina Hachigian, Theodore W . Karasik, Rollie Lal, Rachel M. Swanger, Gregory F. Treverton, and Charles Wolf...until U.S. or coalition forces arrived and explode one or more of them in their paths as they advance . Neutralizing an Adversary’s Nuclear-Armed

  4. The Politics of Modernizing Short-Range Nuclear Forces in West Germany

    DTIC Science & Technology

    1989-09-01

    peace movement, mass demonstrations, and the Soviet campaign to prevent Euromissile deployment have faded , the divisive debates of the early 1980s...traditionally pronuclear Christian Democratic Union/Christian Social Union (CDU/CSU) were evenly split in hvor and spinet the civilian use of nuclear powe...a balanced deterrent-elements so characteristic of Helmut Schmidt’s thinking- have rapidly faded with the departure of the former chancellor. Under

  5. Isolation and identification of mosquito (Aedes aegypti) biting deterrent fatty acids from male inflorescences of breadfruit (Artocarpus altilis (Parkinson)Fosberg)

    USDA-ARS?s Scientific Manuscript database

    Dried male inflorescences of breadfruit (Artocarpus altilis, Moraceae) are burned in communities throughout Oceania to repel flying insects, including mosquitoes. This study was conducted to identify chemicals responsible for mosquito deterrence. Various crude extracts were evaluated, and the most a...

  6. Security or armageddon: Israel's nuclear strategy

    SciTech Connect

    Beres, L.R.

    1986-01-01

    This book closely examines Israel's strategic choices and the probable impact of those choices on American and Soviet foreign policy. The contributors of this debate both Israeli and American, represent a very distinguished group of scholars, all well-known specialists on international security affairs. The author addresses such critical issues as Israel's dilemma of either continuing with its ''bomb in the basement'' policy or disclosing its nuclear capabilities; the long-term prospects for security through conventional deterrence; the probability of nuclear and other highly destructive forms of terrorism; the creation of a regional non-proliferation treaty for the Middle East; the role of international law; the effect of superpower relations on regional stability; the relevance of Jewish history; and the problem of regional proliferation.

  7. To discuss illicit nuclear trafficking

    SciTech Connect

    Balatsky, Galya I; Severe, William R; Wallace, Richard K

    2010-01-01

    The Illicit nuclear trafficking panel was conducted at the 4th Annual INMM workshop on Reducing the Risk from Radioactive and Nuclear Materials on February 2-3, 2010 in Washington DC. While the workshop occurred prior to the Nuclear Security Summit, April 12-13 2010 in Washington DC, some of the summit issues were raised during the workshop. The Communique of the Washington Nuclear Security Summit stated that 'Nuclear terrorism is one of the most challenging threats to international security, and strong nuclear security measures are the most effective means to prevent terrorists, criminals, or other unauthorized actors from acquiring nuclear materials.' The Illicit Trafficking panel is one means to strengthen nuclear security and cooperation at bilateral, regional and multilateral levels. Such a panel promotes nuclear security culture through technology development, human resources development, education and training. It is a tool which stresses the importance of international cooperation and coordination of assistance to improve efforts to prevent and respond to incidents of illicit nuclear trafficking. Illicit trafficking panel included representatives from US government, an international organization (IAEA), private industry and a non-governmental organization to discuss illicit nuclear trafficking issues. The focus of discussions was on best practices and challenges for addressing illicit nuclear trafficking. Terrorism connection. Workshop discussions pointed out the identification of terrorist connections with several trafficking incidents. Several trafficking cases involved real buyers (as opposed to undercover law enforcement agents) and there have been reports identifying individuals associated with terrorist organizations as prospective plutonium buyers. Some specific groups have been identified that consistently search for materials to buy on the black market, but no criminal groups were identified that specialize in nuclear materials or isotope smuggling

  8. Tactical nuclear weapons in the post cold war era: Implications for the Operational Commander. Final report

    SciTech Connect

    Tunstall, S.

    1993-01-01

    The United States and the former Soviet Union have made and continue to make historic progress toward nuclear weapons disarmament. In 1991, Presidents Bush and Gorbachev decided to destroy or withdraw (FROM FORWARD-DEPLOYED UNITS) all land and sea-based tactical nuclear weapons. This paper examines why Regional CINCs must retain a substrategic nuclear weapons capability until substantial improvements are made in our anti-tactical missile defense systems. The threat of nuclear proliferation and the deterrent value of tactical nuclear weapons are discussed. The paper also addresses the issue of tactical nuclear weapons as a warfighting capability and concludes that Combatant Commanders won't need this capability once we improve our theater-based missile defense systems..... Tactical Nuclear Weapons in the Post Cold War Era: Implications for the Operational Commander.

  9. Nuclear Forensics International Technical Working Group (ITWG): a collaboration of scientists, law enforcement officials, and regulators working to combat nuclear terrorism and proliferation

    SciTech Connect

    Schwantes, Jon M.

    2013-10-25

    Founded in 1996 upon the initiative of the “Group of 8” governments (G8), the Nuclear Forensics International Technical Working Group (ITWG) is an ad hoc organization of official Nuclear Forensics practitioners (scientists, law enforcement, and regulators) that can be called upon to provide technical assistance to the global community in the event of a seizure of nuclear or radiological materials. The ITWG is supported by and is affiliated with nearly 40 countries and international partner organizations including the International Atomic Energy Agency (IAEA), EURATOM, INTERPOL, EUROPOL, and the United Nations Interregional Crime and Justice Research Institute (UNICRI) (Figure 1). Besides providing a network of nuclear forensics laboratories that are able to assist the global community during a nuclear smuggling event, the ITWG is also committed to the advancement of the science of nuclear forensic analysis, largely through participation in periodic table top and Collaborative Materials Exercises (CMXs). Exercise scenarios use “real world” samples with realistic forensics investigation time constraints and reporting requirements. These exercises are designed to promote best practices in the field and test, evaluate, and improve new technical capabilities, methods and techniques in order to advance the science of nuclear forensics. Past efforts to advance nuclear forensic science have also included scenarios that asked laboratories to adapt conventional forensics methods (e.g. DNA, fingerprints, tool marks, and document comparisons) for collecting and preserving evidence comingled with radioactive materials.

  10. Off the street and into “the cut”: Deterrence and displacement in NYC's quality of life marijuana policing

    PubMed Central

    Elliott, Luther; Golub, Andrew; Dunlap, Eloise

    2011-01-01

    This paper examines the accounts of NYC marijuana smokers about the information and values underlying decisions about where to smoke. We do so to assess the deterrent value of NYC's “quality of life” policing of marijuana in public view. Participants indicated a general awareness of escalated marijuana policing and its attendant risks and almost universally spoke of avoiding public use in high-traffic locations and in the city's cultural and commercial centres. Beyond that, however, the deterrent value of aggressive marijuana policing appears limited. Individuals without access to private space reported outdoor marijuana use as a normalized peer group activity that has increasingly been displaced to marginal and interstitial public spaces that were collectively referred to by participants as “the cut.” PMID:22001856

  11. Off the street and into "the cut": deterrence and displacement in NYC's quality of life marijuana policing.

    PubMed

    Elliott, Luther; Golub, Andrew; Dunlap, Eloise

    2012-05-01

    This paper examines the accounts of NYC marijuana smokers about the information and values underlying decisions about where to smoke. We do so to assess the deterrent value of NYC's "quality of life" policing of marijuana in public view. Participants indicated a general awareness of escalated marijuana policing and its attendant risks and almost universally spoke of avoiding public use in high-traffic locations and in the city's cultural and commercial centres. Beyond that, however, the deterrent value of aggressive marijuana policing appears limited. Individuals without access to private space reported outdoor marijuana use as a normalized peer group activity that has increasingly been displaced to marginal and interstitial public spaces that were collectively referred to by participants as "the cut." Copyright © 2011 Elsevier B.V. All rights reserved.

  12. Insecticidal, repellent and oviposition-deterrent activity of selected essential oils against Anopheles stephensi, Aedes aegypti and Culex quinquefasciatus.

    PubMed

    Prajapati, Veena; Tripathi, A K; Aggarwal, K K; Khanuja, S P S

    2005-11-01

    Essential oils extracted from 10 medicinal plants were evaluated for larvicidal, adulticidal, ovicidal, oviposition-deterrent and repellent activities towards three mosquito species; Anopheles stephensi, Aedes aegypti and Culex quinquefasciatus. The essential oils of Juniperus macropoda and Pimpinella anisum were highly effective as both larvicidal and ovicidal. The essential oil of P. anisum showed toxicity against 4th instar larvae of A. stephensi and A. aegypti with equivalent LD95 values of 115.7 microg/ml, whereas it was 149.7 microg/ml against C. quinquefasciatus larvae. Essential oils of Zingiber officinale and Rosmarinus officinalis were found to be ovicidal and repellent, respectively towards the three mosquito species. The essential oil of Cinnamomum zeylanicum resulted into highest repellent (RD95) values of 49.6, 53.9 and 44.2 mg/mat against A. stephensi, A. aegypti and C. quinquefasciatus, respectively apart from oviposition-deterrent potential.

  13. Biting Deterrence, Repellency, and Larvicidal Activity of Ruta chalepensis (Sapindales: Rutaceae) Essential Oil and Its Major Individual Constituents Against Mosquitoes

    DTIC Science & Technology

    2013-01-01

    aegypti. This study revealed thatR. chalepensis essential oil and itsmajor compoundswere active biting deterrents against Ae. aegypti at higher...alternatives to insecticides to control these vectors. The genus Ruta, known as common rue, belongs to the Rutaceae family, which features many shrubby...and 2-nonanone was higher at 24-h posttreatment at the LD50 in An. quadrimaculatus than Ae. aegypti. This study revealed that R. chalepensis essential

  14. Predator-elicited foot shakes in wall lizards (Podarcis muralis): evidence for a pursuit-deterrent function.

    PubMed

    Font, Enrique; Carazo, Pau; Pérez i de Lanuza, Guillem; Kramer, Matthew

    2012-02-01

    Under certain circumstances, prey may inform potential predators of their unprofitability by means of pursuit-deterrent signals. The evidence for pursuit-deterrent signaling in reptiles is scant and taxonomically biased. Wall lizards, Podarcis muralis (Squamata: Lacertidae) produce several distinct types of stereotyped foot shake displays, of which one, performed in antipredator contexts, is a likely candidate for a pursuit-deterrent function. We investigated this possibility by recording the responses of lizards in the field to a slowly approaching human acting as a surrogate predator. In addition to starting and flight initiation distances, we measured the presence of foot shakes, the leg that was shaken, and the distance from the observer at which the display was performed (display distance). Of a total of 484 approaches, 109 (22.5%) elicited foot shake displays. Roughly half the lizards displayed from the location where they were first sighted, while the other half moved a short distance, then displayed. There was no left-right preference in the leg used to display, but most lizards displayed with the leg closer to the approaching predator. Juveniles and subadults had smaller flight initiation distances than adult lizards. There were no sex-related differences in starting or flight initiation distances, but females, for a given distance, were more likely to display than males. Foot shake display frequency declined abruptly at 1 m. If lizards waited until the surrogate predator was this close, they mostly fled without displaying. Our results show that antipredator foot shaking in P. muralis is consistent with expectations from pursuit-deterrent theory.

  15. Strategic, Tactical and Doctrinal Military Concepts. The Deterrence Concept: A Synthesis Based on a Survey of the Literature.

    DTIC Science & Technology

    1980-04-01

    thi report) UNCLASS IFI ED 15- DECLASSIFICATION DOWNGRADING N/ A 16 DISTRIBUTION STATEMENT (of this Report) Approved for public release; distribution...attack on NATO is clearly perceived by the US leadership and attentive public to be in a different category from attacks on other non-US territory, and...deterrence, the preparedness trend played a role also. In the United States and Western Europe there had been a strong body of public opinion in the

  16. Sustained reduction of diversion and abuse after introduction of an abuse deterrent formulation of extended release oxycodone.

    PubMed

    Severtson, Stevan Geoffrey; Ellis, Matthew S; Kurtz, Steven P; Rosenblum, Andrew; Cicero, Theodore J; Parrino, Mark W; Gilbert, Michael K; Buttram, Mance E; Dasgupta, Nabarun; BucherBartelson, Becki; Green, Jody L; Dart, Richard C

    2016-11-01

    The development of abuse deterrent formulations is one strategy for reducing prescription opioid misuse and abuse. A putative abuse deterrent formulation of oxycodone extended release (OxyContin(®)) was introduced in 2010. Early reports demonstrated reduced abuse and diversion, however, an analysis of social media found 32 feasible methods to circumvent the abuse deterrent mechanism. We measured trends of diversion, abuse and street price of OxyContin to assess the durability of the initial reduction in abuse. Data from the Poison Center Program, Drug Diversion Program, Opioid Treatment Program, Survey of Key Informant Patients Program and StreetRx program of the Researched Abuse, Diversion, and Addiction-Related Surveillance (RADARS(®)) System were used. The average quarterly rates of abuse and diversion for OxyContin were compared from before reformulation to the rate in second quarter 2015. Rates were adjusted for population using US Census data and drug availability. OxyContin abuse and diversion declined significantly each quarter after reformulation and persisted for 5 years. The rate of abuse of other opioid analgesics increased initially and then decreased, but to lesser extent than OxyContin. Abuse through both oral and non-oral routes of self-administration declined following the reformulation. The geometric mean difference in the street price of reformulated OxyContin was 36% lower than the reformulated product in the year after reformulation. Despite methods to circumvent the abuse deterrent mechanism, abuse and diversion of OxyContin decreased promptly following the introduction of a crush- and solubility- resistant formulation and continued to decrease over the subsequent 5 years. Copyright © 2016 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  17. International perceptions of US nuclear policy.

    SciTech Connect

    Stanley, Elizabeth A. (Georgetown Universtiy, Washington, DC)

    2006-02-01

    The report presents a summary of international perceptions and beliefs about US nuclear policy, focusing on four countries--China, Iran, Pakistan and Germany--chosen because they span the spectrum of states with which the United States has relationships. A paradox is pointed out: that although the goal of US nuclear policy is to make the United States and its allies safer through a policy of deterrence, international perceptions of US nuclear policy may actually be making the US less safe by eroding its soft power and global leadership position. Broadly held perceptions include a pattern of US hypocrisy and double standards--one set for the US and its allies, and another set for all others. Importantly, the US nuclear posture is not seen in a vacuum, but as one piece of the United States behavior on the world stage. Because of this, the potential direct side effects of any negative international perceptions of US nuclear policy can be somewhat mitigated, dependent on other US policies and actions. The more indirect and long term relation of US nuclear policy to US international reputation and soft power, however, matters immensely to successful multilateral and proactive engagement on other pressing global issues.

  18. Nuclear Naval Propulsion: A Feasible Proliferation Pathway?

    SciTech Connect

    Swift, Alicia L.

    2014-01-31

    There is no better time than now to close the loophole in Article IV of the Nuclear Non-proliferation Treaty (NPT) that excludes military uses of fissile material from nuclear safeguards. Several countries have declared their intention to pursue and develop naval reactor technology, including Argentina, Brazil, Iran, and Pakistan, while other countries such as China, India, Russia, and the United States are expanding their capabilities. With only a minority of countries using low enriched uranium (LEU) fuel in their naval reactors, it is possible that a state could produce highly enriched uranium (HEU) under the guise of a nuclear navy while actually stockpiling the material for a nuclear weapon program. This paper examines the likelihood that non-nuclear weapon states exploit the loophole to break out from the NPT and also the regional ramifications of deterrence and regional stability of expanding naval forces. Possible solutions to close the loophole are discussed, including expanding the scope of the Fissile Material Cut-off Treaty, employing LEU fuel instead of HEU fuel in naval reactors, amending the NPT, creating an export control regime for naval nuclear reactors, and forming individual naval reactor safeguards agreements.

  19. Ovicidal and Oviposition Deterrent Activities of Medicinal Plant Extracts Against Aedes aegypti L. and Culex quinquefasciatus Say Mosquitoes (Diptera: Culicidae)

    PubMed Central

    Reegan, Appadurai Daniel; Gandhi, Munusamy Rajiv; Paulraj, Micheal Gabriel; Ignacimuthu, Savarimuthu

    2014-01-01

    Objectives To evaluate the ovicidal and oviposition deterrent activities of five medicinal plant extracts namely Aegle marmelos (Linn.), Limonia acidissima (Linn.), Sphaeranthus indicus (Linn.), Sphaeranthus amaranthoides (burm.f), and Chromolaena odorata (Linn.) against Culex quinquefasciatus and Aedes aegypti mosquitoes. Three solvents, namely hexane, ethyl acetate, and methanol, were used for the preparation of extracts from each plant. Methods Four different concentrations—62.5 parts per million (ppm), 125 ppm, 250 ppm, and 500 ppm—were prepared using acetone and tested for ovicidal and oviposition deterrent activities. One-way analysis of variance (ANOVA) was used to determine the significance of the treatments and means were separated by Tukey's test of comparison. Results Among the different extracts of the five plants screened, the hexane extract of L. acidissima recorded the highest ovicidal activity of 79.2% and 60% at 500 ppm concentration against the eggs of Cx. quinquefasciatus and Ae. aegypti, respectively. Similarly, the same hexane extract of L. acidissima showed 100% oviposition deterrent activity at all the tested concentrations against Cx. quinquefasciatus and Ae. aegypti adult females. Conclusion It is concluded that the hexane extract of L. acidissima could be used in an integrated mosquito management program. PMID:25737834

  20. Motivators and deterrents to blood donation among Black South Africans: a qualitative analysis of focus group data

    PubMed Central

    Muthivhi, T. N.; Olmsted, M. G.; Park, H.; Sha, M.; Raju, V.; Mokoena, T.; Bloch, E. M.; Murphy, E. L.; Reddy, R.

    2015-01-01

    SUMMARY Background and Objectives South Africa has a markedly skewed representation where the majority of blood (62%) is presently collected from an ethnically White minority. This study seeks to identify culturally specific factors affecting motivation of donors in South Africa. Materials and Methods We performed a qualitative study to evaluate motivators and deterrents to blood donation among Black South Africans. A total of 13 focus groups, comprising a total of 97 Black South Africans, stratified by age and geographic location were conducted. Transcripts of the interviews were analysed using a coding framework by Bednall & Bove. Results Participants made 463 unique comments about motivators focusing primarily on promotional communications (28%), incentives (20%) and prosocial motivation (16%). Participants made 376 comments about deterrents which focused primarily on fear (41%), negative attitudes (14%) and lack of knowledge (10%). Conclusion Although prosocial motivation (altruism) was the most frequently mentioned individual motivator, promotional communication elicited more overall comments by participants. As reported by many authors, fear and lack of awareness were strong deterrents, but scepticism engendered by perceived racial discrimination in blood collection were unique to the South African environment. PMID:26104809